Current Search: Department of Computer and Electrical Engineering and Computer Science (x) » Wireless communication systems (x)
View All Items
Pages
- Title
- Analysis of quality of service (QoS) in WiMAX networks.
- Creator
- Talwalkar, Rohit., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In last few years there has been significant growth in the area of wireless communication. Quality of Service (QoS) has become an important consideration for supporting variety of applications that utilize the network resources. These applications include voice over IP, multimedia services, like, video streaming, video conferencing etc. IEEE 802.16/WiMAX is a new network which is designed with quality of service in mind. This thesis focuses on analysis of quality of service as implemented by...
Show moreIn last few years there has been significant growth in the area of wireless communication. Quality of Service (QoS) has become an important consideration for supporting variety of applications that utilize the network resources. These applications include voice over IP, multimedia services, like, video streaming, video conferencing etc. IEEE 802.16/WiMAX is a new network which is designed with quality of service in mind. This thesis focuses on analysis of quality of service as implemented by the WiMAX networks. First, it presents the details of the quality of service architecture in WiMAX network. In the analysis, a WiMAX module developed based on popular network simulator ns-2, is used. Various real life scenarios like voice call, video streaming are setup in the simulation environment. Parameters that indicate quality of service, such as, throughput, packet loss, average jitter and average delay, are analyzed for different types of service flows as defined in WiMAX. Results indicate that better quality of service is achieved by using service flows designed for specific applications.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/flaent/EN00154040/68_2/98p0143h.pdf, http://purl.flvc.org/FAU/58012
- Subject Headings
- Wireless communication systems, Broadband communication systems, Wireless LANs, Design and construction, Computer networks, Management, Quality control
- Format
- Document (PDF)
- Title
- Channel assignment in multi-radio networks.
- Creator
- Mihnea, Amalya, Cardei, Mihaela, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Channel assignment in multi-radio networks is a topic of great importance because the use of multiple channels and multiple radios reduces interference and increases the network throughput. The goal of our research is to design algorithms that maximize the use of available resources while providing robustness to primary users that could reclaim one or more channels. Our algorithms could be used in ad hoc networks, mesh networks, and sensor networks where nodes are equipped with multiple...
Show moreChannel assignment in multi-radio networks is a topic of great importance because the use of multiple channels and multiple radios reduces interference and increases the network throughput. The goal of our research is to design algorithms that maximize the use of available resources while providing robustness to primary users that could reclaim one or more channels. Our algorithms could be used in ad hoc networks, mesh networks, and sensor networks where nodes are equipped with multiple radios. We design algorithms for channel assignment which provide robustness to primary users without assuming an accurate primary user behavior model. We also compute bounds for capacity in grid networks and discuss how the capacity of a network changes when multiple channels are available. Since preserving energy is very important in wireless networks, we focus on algorithms that do not require powerful resources and which use a reduced number of messages.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004393, http://purl.flvc.org/fau/fd/FA00004393
- Subject Headings
- Adaptive signal processing, Long Term Evolution (Telecommunications), MIMO systems, Mobile communication systems, Wireless communication systems, Wireless sensor networks
- Format
- Document (PDF)
- Title
- Design and implementation of efficient routing protocols in delay tolerant networks.
- Creator
- Liu, Cong., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Delay tolerant networks (DTNs) are occasionally-connected networks that may suffer from frequent partitions. DTNs provide service despite long end to end delays or infrequent connectivity. One fundamental problem in DTNs is routing messages from their source to their destination. DTNs differ from the Internet in that disconnections are the norm instead of the exception. Representative DTNs include sensor-based networks using scheduled intermittent connectivity, terrestrial wireless networks...
Show moreDelay tolerant networks (DTNs) are occasionally-connected networks that may suffer from frequent partitions. DTNs provide service despite long end to end delays or infrequent connectivity. One fundamental problem in DTNs is routing messages from their source to their destination. DTNs differ from the Internet in that disconnections are the norm instead of the exception. Representative DTNs include sensor-based networks using scheduled intermittent connectivity, terrestrial wireless networks that cannot ordinarily maintain end-to-end connectivity, satellite networks with moderate delays and periodic connectivity, underwater acoustic networks with moderate delays and frequent interruptions due to environmental factors, and vehicular networks with cyclic but nondeterministic connectivity. The focus of this dissertation is on routing protocols that send messages in DTNs. When no connected path exists between the source and the destination of the message, other nodes may relay the message to the destination. This dissertation covers routing protocols in DTNs with both deterministic and non-deterministic mobility respectively. In DTNs with deterministic and cyclic mobility, we proposed the first routing protocol that is both scalable and delivery guaranteed. In DTNs with non-deterministic mobility, numerous heuristic protocols are proposed to improve the routing performance. However, none of those can provide a theoretical optimization on a particular performance measurement. In this dissertation, two routing protocols for non-deterministic DTNs are proposed, which minimizes delay and maximizes delivery rate on different scenarios respectively. First, in DTNs with non-deterministic and cyclic mobility, an optimal single-copy forwarding protocol which minimizes delay is proposed., In DTNs with non-deterministic mobility, an optimal multi-copy forwarding protocol is proposed. which maximizes delivery rate under the constraint that the number of copies per message is fixed . Simulation evaluations using both real and synthetic trace are conducted to compare the proposed protocols with the existing ones.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210522
- Subject Headings
- Computer network protocols, Computer networks, Reliability, Computer algorithms, Wireless communication systems, Technological innovations
- Format
- Document (PDF)
- Title
- Exploring the electromagnetics of millimeter-wave through terahertz spectrum: de novo studies vis-à-vis materials science, biomedical applications and wireless communication.
- Creator
- Sharma, Bharti, Neelakanta, Perambur S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The present research is a targeted endeavor to study the underlying characteristics and novel applications of millimeter (mm) wave through terahertz (THz) spectrum of electromagnetic (EM) energy. Focused thereof are the following specific tasks broadly considered pertinent to the said EM spectral range: (i) To elucidate the material characteristics vis-à-vis the interaction with EM energy at the test frequencies; (ii) to identify biomedical applications based on the material characteristics...
Show moreThe present research is a targeted endeavor to study the underlying characteristics and novel applications of millimeter (mm) wave through terahertz (THz) spectrum of electromagnetic (EM) energy. Focused thereof are the following specific tasks broadly considered pertinent to the said EM spectral range: (i) To elucidate the material characteristics vis-à-vis the interaction with EM energy at the test frequencies; (ii) to identify biomedical applications based on the material characteristics studied and applied to biomedia; and (iii) to model the wireless communication channels supporting EM waves at the test frequency bands of interest. Commensurate with the scope as above, the objectives of the research are as follows:
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004330, http://purl.flvc.org/fau/fd/FA00004330
- Subject Headings
- Electromagnetic waves -- Scattering, Pattern recognition systems, Scattering (Physics), Terahertz technology, Wireless communication systems
- Format
- Document (PDF)
- Title
- Indoor localization using Wi-Fi fingerprinting.
- Creator
- Mirzaei, Azandaryani Saeid, Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Nowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name,...
Show moreNowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name, floor number, and room number where the user is located based on a Wi-Fi access point signal fingerprint pattern matching. We designed and evaluated a new machine learning algorithm, KRedpin, and developed a new web-services architecture for indoor localization based on J2EE technology with the Apache Tomcat web server for managing Wi-Fi signal data from the FAU WLAN. The prototype localization client application runs on Android cellphones and operates in the East Engineering building at FAU. More sophisticated classifiers have also been used to improve the localization accuracy using the Weka data mining tool.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004038
- Subject Headings
- Location based services, Mobile geographic information systems, Wireless LANs, Wireless communication systems
- Format
- Document (PDF)
- Title
- Impact of interference on connectivity and outage performances in wireless communication networks: interference-based channel models.
- Creator
- Mukasa, Constantine, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We...
Show moreIn recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We investigate the effect of interference using device isolation probability or outage probability in presence Rayleigh and Nakagami-m fading at the physical layer and the impact of lognormal shadowing. We assume that the devices are either deterministically placed or randomly distributed according to a Poisson point process. We derive explicit expressions for the isolation probability and outage probability that give insight into how these channel impairments affect communication in these applications. We use computer simulations to validate our analytical results.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362551
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless communication systems, Mathematical models, Orthogonal frequency division multiplexing
- Format
- Document (PDF)
- Title
- Implementation of a mobile data collector in wireless sensor networks for energy conservation.
- Creator
- Heshike, Pedro L., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks....
Show moreA Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks. The implementation of the mobile data collector in our study consists of combining two different platforms: the Crossbow sensor hardware and the NXT Legos. We developed an application for data collection and sensor querying support. Another important contribution is designing a semi-autonomous robot control. This hardware prototype implementation shows the benefits of using a mobile data collector in WSN. It also serves as a reference in developing future applications for mobile WSNs.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171401
- Subject Headings
- Wireless communication systems, Technological innovations, Sensor networks, Design and construction, Compter network protocols, Ad hoc networks (Computer networks), Technological innovations
- Format
- Document (PDF)
- Title
- Performance analyses of Slotted ALOHA protocol in a Weibull fading environment.
- Creator
- Rene, Jean N., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In past and recent literature, random access protocols have been investigated with growing interest. In particular, the Slotted ALOHA protocol has been extensively used in satellite communications, and has also attracted considerable attention in many areas of wireless communication systems, especially in the cellular mobile environment. In this thesis, we investigate the performance of Slotted ALOHA, an effective random access protocol, in a Weibull fading environment. We study the...
Show moreIn past and recent literature, random access protocols have been investigated with growing interest. In particular, the Slotted ALOHA protocol has been extensively used in satellite communications, and has also attracted considerable attention in many areas of wireless communication systems, especially in the cellular mobile environment. In this thesis, we investigate the performance of Slotted ALOHA, an effective random access protocol, in a Weibull fading environment. We study the performance metrics based on the signal-to-interference-and-noise ratio (SINR) model, in a cellular network system, assuming two captures models. The capture effect, also called co-channel interference tolerance, is the ability to correctly receive a strong signal from one transmitter despite significant interference from other transmitters. We derive closed-formed expressions and numerical evaluations for both the capture probability and the system throughput. he analytical results will be validated with computer simulations. Finally, to mitigate the effects of Weibull fading channel we also consider the effect of dual selection diversity that will increase the capture probability and the system throughput.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362567
- Subject Headings
- Multiple access protocols (Computer network protocols), Wireless communication systems, Packet switching (Data transmission), Computer simulation, Radio frequency identification systems, Computer simulation
- Format
- Document (PDF)
- Title
- Web-based wireless sensor network monitoring using smartphones.
- Creator
- Marcus, Anthony M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem....
Show moreThis thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem. We developed this architecture for web-based wireless sensor network monitoring and have implemented a prototype that uses Crossbow Mica sensors and Android smartphones for bridging the wireless sensor network with the web services for data storage and retrieval. Our application has the ability to retrieve sensed data directly from a wireless senor network composed of Mica sensors and from a smartphones onboard sensors. The data is displayed on the phone's screen, and then, via Internet connection, they are forwarded to a remote database for manipulation and storage. The attributes sensed and stored by our application are temperature, light, acceleration, GPS position, and geographical direction. Authorized personnel are able to retrieve and observe this data both textually and graphically from any browser with Internet connectivity or through a native Android application. Web-based wireless sensor network architectures using smartphones provides a scalable and expandable solution with applicability in many areas, such as healthcare, environmental monitoring, infrastructure health monitoring, border security, and others.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171682
- Subject Headings
- Smartphones, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer networks, Security measures, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- A patient-centric hurricane evacuation management system.
- Creator
- Ambrose, Arny Isonja, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The use of wireless sensor networks for a myriad of applications is increasing. They can be used in healthcare for emergency management. In Florida, hurricanes are the main source of natural disasters. There has been a high incidence of hurricanes over the past decade. When a hurricane warning is issued it is important that people who live in potentially dangerous areas, such as along the coast, evacuate for their safety. Nursing homes and other care facilities for elderly or disabled people...
Show moreThe use of wireless sensor networks for a myriad of applications is increasing. They can be used in healthcare for emergency management. In Florida, hurricanes are the main source of natural disasters. There has been a high incidence of hurricanes over the past decade. When a hurricane warning is issued it is important that people who live in potentially dangerous areas, such as along the coast, evacuate for their safety. Nursing homes and other care facilities for elderly or disabled people experience difficulty with the evacuation as their residents require additional assistance. The characteristics and challenges of a hurricane evacuation are investigated. A patient-centric hurricane evacuation management system is proposed to allow healthcare providers the ability to continuously monitor and track patients. During a hurricane there are usually scarce energy resources and a loss of basic communication services such as cellular service and Internet access. We propose the architecture of the system that allows it to operate in the absence of these services. The hardware and software architectures are also presented along with the main phases of operation. The system was then validated and the performance evaluated via simulation using the OPNET Modeler.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3329832
- Subject Headings
- Emergency management, Planning, Evacuation of civilians, Planning, Emergency medical services, Planning, Disaster medicine, Planning, Medical informatics, Wireless communication systems, Internet in medicine, Telecommunication in medicine
- Format
- Document (PDF)
- Title
- An uncertainty-aware reputation system in mobile networks: analysis and applications.
- Creator
- Li, Feng., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on...
Show moreMany emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on evaluating and quantifying trust to stimulate collaboration in mobile networks, introducing uncertainty concepts and metrics, as well as providing the various analysis and applications of uncertainty-aware reputation systems. Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include it in the reputation system. Specifically, we use an uncertainty metric to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information may affect uncertainty in nodes' opinions. Higher uncertainty leads to higher transaction cost and reduced acceptance of communication. We exploit mobility to efficiently reduce uncertainty and to speed up trust convergence. We also apply the new reputation system to enhance the analysis of the interactions among mobile nodes, and present three sample uncertainty-aware applications. We integrate the uncertainty-aware reputation model with game theory tools, and enhance the analysis on interactions among mobile nodes., Instead of reactively protecting the mobile networks from existing attacks as in the traditional security paradigms, the analysis in this dissertation gives more insights on nodes' rationality in the interaction, which will enable the mechanism design in mobile networks to be security and incentive compatible. Moreover, we present three sample applications, in which we clearly identify the challenges, specifically formalize the problems, and cleverly employ the uncertainty mitigation schemes. These applications show that the uncertainty definition and mitigation schemes can benefit a broad range of applications, including fields such as security, network services, and routing.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210520
- Subject Headings
- Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer network architectures, Mobile computing, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- A utility-based routing scheme in multi-hop wireless networks.
- Creator
- Lu, Mingming., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-hop wireless networks are infrastructure-less networks consisting of mobile or stationary wireless devices, which include multi-hop wireless mesh networks and multi-hop wireless sensor networks. These networks are characterized by limited bandwidth and energy resources, unreliable communication, and a lack of central control. These characteristics lead to the research challenges of multi-hop wireless networks. Building up routing schemes with good balance among the routing QoS (such as...
Show moreMulti-hop wireless networks are infrastructure-less networks consisting of mobile or stationary wireless devices, which include multi-hop wireless mesh networks and multi-hop wireless sensor networks. These networks are characterized by limited bandwidth and energy resources, unreliable communication, and a lack of central control. These characteristics lead to the research challenges of multi-hop wireless networks. Building up routing schemes with good balance among the routing QoS (such as reliability, cost, and delay) is a paramount concern to achieve high performance wireless networks. These QoS metrics are internally correlated. Most existing works did not fully utilize this correlation. We design a metric to balance the trade-off between reliability and cost, and build up a framework of utility-based routing model in multi-hop wireless networks. This dissertation focuses on the variations with applications of utility-based routing models, designing new concepts, and developing new algorithms for them. A review of existing routing algorithms and the basic utility-based routing model for multi-hop wireless networks has been provided at the beginning. An efficient algorithm, called MaxUtility, has been proposed for the basic utility-based routing model. MaxUtility is an optimal algorithm that can find the best routing path with the maximum expected utility., Various utility-based routing models are extended to further enhance the routing reliability while reducing the routing overhead. Besides computing the optimal path for a given benefit value and a given source-destination pair, the utility-based routing can be further extended to compute all optimal paths for all possible benefit values and/or all source-destination pairs. Our utility-based routing can also adapt to different applications and various environments. In the self-organized environment, where network users are selfish, we design a truthful routing, where selfish users have to tell the truth in order to maximize their utilities. We apply our utility-based routing scheme to the data-gathering wireless sensor networks, where a routing scheme is required to transmit data sensed by multiple sensor nodes to a common sink node.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77647
- Subject Headings
- Wireless communication systems, Security measures, Computer network protocols, Computer algorithms, Computer networks, Security measures
- Format
- Document (PDF)
- Title
- Joint TCP congestion control and wireless-link scheduling for mobile Internet applications.
- Creator
- Li, Zhaoquan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362481
- Subject Headings
- Wireless communication systems, Quality control, Mobile communication systems, Technological innovations, TCP/IP (Computer network protocol), Ad hoc networks (Computer networks), Computer network protocols, Wireless Internet
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)
- Title
- Scheduling for composite event detection in wireless sensor networks.
- Creator
- Ambrose, Arny Isonja, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are used in areas that are inaccessible, inhospitable or for continuous monitoring. The main use of such networks is for event detection. Event detection is used to monitor a particular environment for an event such as fire or flooding. Composite event detection is used to break down the detection of the event into the specific conditions that need to be present for the event to occur. Using this method, each sensor node does not need to carry every sensing component...
Show moreWireless sensor networks are used in areas that are inaccessible, inhospitable or for continuous monitoring. The main use of such networks is for event detection. Event detection is used to monitor a particular environment for an event such as fire or flooding. Composite event detection is used to break down the detection of the event into the specific conditions that need to be present for the event to occur. Using this method, each sensor node does not need to carry every sensing component necessary to detect the event. Since energy efficiency is important the sensor nodes need to be scheduled so that they consume [sic] consume as little energy as possible to extend the network lifetime. In this thesis, a solution to the sensor Scheduling for Composite Event Detection (SCED) problem will be presented as a way to improve the network lifetime when using composite event detection.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/dt/186333
- Subject Headings
- Sensor networks, Wireless communication systems, Embedded computer systems, Computer systems, Reliability
- Format
- Document (PDF)
- Title
- Statistical broadcast protocol design for VANET.
- Creator
- Slavik, Michael J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and...
Show moreThis work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and entertainment. A critical component of these data dissemination schemes is the multi-hop wireless broadcast protocol. Multi-hop broadcast protocols for these schemes must reliably deliver broadcast packets to vehicles in a geographically bounded region while consuming as little wireless bandwidth as possible. This work contains substantial research results related to development of multi-hop broadcast protocols for VANET, culminating in the design of SLAB. Many preliminary research and development efforts have been required to arrive at SLAB. First, a high-level wireless broadcast simulation tool called WiBDAT is developed. Next, a manual optimization procedure is proposed to create efficient threshold functions for statistical broadcast protocols. This procedure is then employed to design the Distribution-Adaptive Distance with Channel Quality (DADCQ) broadcast protocol, a preliminary cousin of SLAB. DADCQ is highly adaptive to node density, node spatial distribution pattern, and wireless channel quality in realistic VANET scenarios. However, the manual design process used to create DADCQ has a few deficiencies. In response to these problems, an automated design procedure is created that uses a black-box global optimization algorithm to search for efficient threshold functions that are evaluated using WiBDAT. SLAB is finally designed using this procedure., Expansive simulation results are presented comparing the performance of SLAB to two well-published VANET broadcast protocols, p -persistence and Advanced Adaptive Gossip (AAG), and to DADCQ. The four protocols are evaluated under varying node density and speed on five different road topologies with varying wireless channel fading conditions. The results demonstrate that unlike p-persistence and AAG, SLAB performs well across a very broad range of environmental conditions. Compared to its cousin protocol DADCQ, SLAB achieves similar reachability while using around 30% less wireless bandwidth, highlighting the improvement in the automated design methodology over the manual design.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172947
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Design and construction, Vehicular ad-hoc networks (Computer networks), Technological innovations, Wireless communication systems, Technological innovations, Wireless communication systems, Security measures, Mobile communication systems, Evaluation
- Format
- Document (PDF)
- Title
- QUIC-TCP: validation of QUIC-TCP through network simulations.
- Creator
- Boughen, Brian, Wang, Xin, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The scalability of QUIC-TCP was examined by expanding previous developmental 11-node, 4-flow topology to over 30 nodes with 11 flows to validate QUIC-TCP for larger networks. The topology was simulated using ns-2 network simulator with the same ns-2 module of FAST-TCP modified to produce QUIC-TCP agent that the original development used. A symmetrical topology and a random topology were examined. Fairness, aggregate throughput and the object of the utility function were used as validation...
Show moreThe scalability of QUIC-TCP was examined by expanding previous developmental 11-node, 4-flow topology to over 30 nodes with 11 flows to validate QUIC-TCP for larger networks. The topology was simulated using ns-2 network simulator with the same ns-2 module of FAST-TCP modified to produce QUIC-TCP agent that the original development used. A symmetrical topology and a random topology were examined. Fairness, aggregate throughput and the object of the utility function were used as validation criteria. It was shown through simulation that QUICTCP optimized the utility function and demonstrated a good balance between aggregate throughput and fairness; therefore QUIC-TCP is indeed scalable to larger networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004007
- Subject Headings
- Ad hoc networks (computer networks), Embedded computer systems -- Programming, QUIC TCP (Computer network protocol), Wireless communication systems
- Format
- Document (PDF)
- Title
- Probabilistic predictor-based routing in disruption-tolerant networks.
- Creator
- Yuan, Quan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Disruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the...
Show moreDisruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the network stays connected. Thus, routing in DTNs becomes a challenging problem, due to the temporal scheduling element in a dynamic topology. One of the solutions is prediction-based, where nodes mobility is estimated with a history of observations. Then, the decision of forwarding messages during data delivery can be made with that predicted information. Current prediction-based routing protocols can be divided into two sub-categories in terms of that whether they are probability related: probabilistic and non-probabilistic. This dissertation focuses on the probabilistic prediction-based (PPB) routing schemes in DTNs. We find that most of these protocols are designed for a specified topology or scenario. So almost every protocol has some drawbacks when applied to a different scenario. Because every scenario has its own particular features, there could hardly exist a universal protocol which can suit all of the DTN scenarios. Based on the above motivation, we investigate and divide the current DTNs scenarios into three categories: Voronoi-based, landmark-based, and random moving DTNs. For each category, we design and implement a corresponding PPB routing protocol for either basic routing or a specified application with considering its unique features., Specifically, we introduce a Predict and Relay routing protocol for Voronoi-based DTNs, present a single-copy and a multi-copy PPB routing protocol for landmark-based DTNs, and propose DRIP, a dynamic Voronoi region-based publish/subscribe protocol, to adapt publish/subscribe systems to random moving DTNs. New concepts, approaches, and algorithms are introduced during our work.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359928
- Subject Headings
- Routers (Computer networks), Computer network protocols, Computer networks, Reliability, Computer algorithms, Wireless communication systems, Technological innovations
- Format
- Document (PDF)
- Title
- Remote gaming on resource constrained devices.
- Creator
- Reza, Waazim., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Games have become important applications on mobile devices. A mobile gaming approach known as remote gaming is being developed to support games on low cost mobile devices. In the remote gaming approach, the responsibility of rendering a game and advancing the game play is put on remote servers instead of the resource constrained mobile devices. The games rendered on the servers are encoded as video and streamed to mobile devices. Mobile devices gather user input and stream the commands back...
Show moreGames have become important applications on mobile devices. A mobile gaming approach known as remote gaming is being developed to support games on low cost mobile devices. In the remote gaming approach, the responsibility of rendering a game and advancing the game play is put on remote servers instead of the resource constrained mobile devices. The games rendered on the servers are encoded as video and streamed to mobile devices. Mobile devices gather user input and stream the commands back to the servers to advance game play. With this solution, mobile devices with video playback and network connectivity can become game consoles. In this thesis, we present the design and development of such a system and evaluate the performance and design considerations to maximize the end user gaming experience. A gaming user experience model capable of predicting the user experience for a given gaming session is developed and verified.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2978944
- Subject Headings
- Wireless communication systems, Mobile communication systems, Mobie computing, Programming, Application software, Development, Game theory, Mobile commerce
- Format
- Document (PDF)
- Title
- Reliable, energy-aware cross-layer protocol for wireless sensor networks.
- Creator
- Badi, Ahmed., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back...
Show moreThis research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back-off algorithm that dynamically adjusts to the data messages reliability needs. Other cross-layer techniques that the protocol introduces are dynamic MAC retry limit and dynamic transmission power setting that is also based on the messages reliability requirements. Cross layer design is defined as the interaction between the different stack layers with the goal of improving performance. It has been used in ad hoc wireless systems to improve throughput, latency, and quality of service (QoS). The improvements gained in performance come at a price. This includes decreased architecture modularity and designs may be hard to debug, maintain or upgrade. Cross-layer design is valuable for wireless sensor networks due to the severe resource constraints. The proposed protocol uses cross-layer design as a performance and energy optimization technique. Nevertheless, the protocol avoids introducing layer interdependencies by preserving the stack architecture and optimizes the overall system energy and reliability performance by information sharing. The information is embedded as flags in the data and control messages that are moving through the stack. Each layer reads these flags and adjusts its performance and handling of the message accordingly. The performance of the proposed protocol is evaluated using simulation modeling. The reference protocol used for evaluation is APTEEN., We developed simulation programs for the proposed protocol and for APTEEN protocol using the JiST/SWANS simulation tool. The performance evaluation results show that the proposed protocol achieves better energy performance than the reference protocol. Several scalability experiments show that the proposed protocol scales well and has better performance for large networks. Also, exhaustive bandwidth utilization experiments show that for heavily-utilized or congested networks, the proposed protocol has high reliability in delivering messages classified as important.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359921
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Power resources, Efficiency
- Format
- Document (PDF)