Current Search: Wireless communication systems -- Technological innovations (x) » Design and construction (x)
View All Items
Pages
- Title
- Application of video error resilience techniques for mobile broadcast multicast services (MBMS).
- Creator
- Furht, Borko, Praveenkumar, Sanigepalli, Kalva, Hari
- Abstract/Description
-
With data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We...
Show moreWith data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We discuss the issue of video error resilience in such services that is critical to maintain consistent quality for terminals. The error resilience techniques currently used in video streamingservices are not suitable for MBMS services. We analyze the error resilience techniques that are applicable within the context of MBMS standard and present our early research in this area.
Show less - Date Issued
- 2004-12-13 - 2004-12-15
- PURL
- http://purl.flvc.org/fcla/dt/347823
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations., Wireless communication systems., Multimedia communications.
- Format
- Document (PDF)
- Title
- Impact of interference on connectivity and outage performances in wireless communication networks: interference-based channel models.
- Creator
- Mukasa, Constantine, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We...
Show moreIn recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We investigate the effect of interference using device isolation probability or outage probability in presence Rayleigh and Nakagami-m fading at the physical layer and the impact of lognormal shadowing. We assume that the devices are either deterministically placed or randomly distributed according to a Poisson point process. We derive explicit expressions for the isolation probability and outage probability that give insight into how these channel impairments affect communication in these applications. We use computer simulations to validate our analytical results.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362551
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless communication systems, Mathematical models, Orthogonal frequency division multiplexing
- Format
- Document (PDF)
- Title
- Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks.
- Creator
- AL-Ghanem, Waleed Khalid, Ilyas, Mohammad, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay,...
Show moreThe growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay, throughput and packet loss for different classes of service. In this dissertation work, the performance of uplink schedulers at the fixed WiMAX MAC layer has been considered, we proposed an Adaptive Hierarchical Weighted Fair Queuing Scheduling algorithm, the new scheduling algorithm adapts to changes in traffic, at the same time; it is able to heuristically enhance the performance of WiMAX network under most circumstances. The heuristic nature of this scheduling algorithm enables the MAC layer to meet the QoS requirements of the users. The performance of this adaptive WiMAX Uplink algorithm has been evaluated by simulation using MATLAB. Results indicate that the algorithm is efficient in scheduling the Base Stations’ traffic loads, and improves QoS. The utilization of relay stations is studied and simulation results are compared with the case without using relay stations. The results show that the proposed scheduling algorithm improves Quality of Service of WiMAX system.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004178, http://purl.flvc.org/fau/fd/FA00004178
- Subject Headings
- Computer networks -- Technological innovations, Optical fiber communication, Wireless communication systems -- Technological innovations, Wireless metropolitan area networks -- Security measures
- Format
- Document (PDF)
- Title
- Cross-domain authentication for multi-protocol phones.
- Creator
- Thakker, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to...
Show moreThe last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to extra costs for the company. Thus for the integrated networks to have an impact on the market some issues such as simpler authentication and registration must be resolved. Therefore we propose a new inter-working model that shall addresses the authentication and registration problem for an integrated network for voice and data. The Single authentication system of the new inter-working model, shall authenticate the user in an integrated network using the SIM credentials, this authentication shall be valid for both voice and data. Also registration costs will be saved by preventing separate registration of users in the WLAN and Cellular domain.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13260
- Subject Headings
- Integrated services digital networks, Digital telephone systems, Wireless communication systems--Technological innovations, Mobile communication systems--Technological innovations
- Format
- Document (PDF)
- Title
- Key management in mobile ad hoc networks.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In...
Show moreIn mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k. Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12234
- Subject Headings
- Electronic commerce--Technological innovations, Mobile commerce--Technological innovations, Wireless communication systems--Management, Mobile communication systems--Management
- Format
- Document (PDF)
- Title
- A Phased Approach to Evaluate the Performance of Handoff by Mobile Handsets.
- Creator
- Siddiqui, Arjumand Fatima, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover...
Show moreThe ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover is delayed or the mobile handset drags its base station, it is more probable that either the call will drop or the quality of the call will be compromised. The last thing a mobile handset user would want is to experience any of these two consequences. In this thesis we study the methods to analyze the performance ofhandover by the mobile handsets in the drive setup under test. This thesis presents a model for analyzing the performance ofhandoffbased on the measurements ofthe received signal strength indicator and the color code recorded by the mobile handset in the drive test field path. The model from the simulations is seen to yield results that agree with other research about the performance of mobile handsets.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012551
- Subject Headings
- Mobile communication systems--Design, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Studies on performance aspects of smart wireless devices and related network services.
- Creator
- Noori, Aziz Ulhaq, Neelakanta, Perambur S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This study is a focused effort on elucidating the performance aspects of modern, handheld wireless devices and associated mobile network services. Specifically addressed thereof are: (i) Assessing the performance details on certain hardware sections of smart handheld devices and (ii) determining the performance profile of market penetration considerations vis-à-vis provisioning mobile networks. To meet the scope of this research, the projected efforts are exercised in compiling relevant...
Show moreThis study is a focused effort on elucidating the performance aspects of modern, handheld wireless devices and associated mobile network services. Specifically addressed thereof are: (i) Assessing the performance details on certain hardware sections of smart handheld devices and (ii) determining the performance profile of market penetration considerations vis-à-vis provisioning mobile networks. To meet the scope of this research, the projected efforts are exercised in compiling relevant literature and deciding the said hardware and technoeconomic performance issues. Hence, written in two parts, Part A is devoted to hardware performance details of smart, handheld devices relevant to (a) delay issues in PCB layouts; (b) crosstalk problems at the baseband level (audio/multimedia) using EMI concepts and (c) ascertaining non-catastrophic EMP/EMI effects at the RF-sections so as to implement protection strategies via compensating networks. Part B is concerned with the technoeconomics of wireless networks in supporting mobile (handheld devices). Correspondingly, two market related considerations versus service performance details are considered. The first one refers to deducing a relative performance index that includes technology (mobile speed) details plus economics profiles of the users in the service area. The second task refers to elucidating a performance index of such services in terms of hedonic pricing heuristics. The theoretical aspects of the test studies as above are supplemented with experimental and/or simulation details as appropriate. Hence, the efficacy of performance details are discussed in real-world applications. Lastly, possible research items for future studies are identified as open-questions.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004395, http://purl.flvc.org/fau/fd/FA00004395
- Subject Headings
- Mobile communication systems -- Standards, Network performance (Telecommunications), Smartphones, Technoeconomcs, Wireless communication systems -- Technological innovations
- Format
- Document (PDF)
- Title
- Knowledge Discovery Through Drive Test Data Visualization.
- Creator
- Saxena, Shalini, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by...
Show moreWith the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by means of drive test data visualization. Our target was to identify poor mobility decisions that are made by the handsets in calls. Premature, delayed or exceedingly sensitive decisions are considered poor mobility decisions. The goal was to compare a set of behaviors from a baseline unit (one accepted to generally operate well). We were able to identify a particular call that was exhibiting a different path (talking to a different cell than expected or taking longer to move to a new cell). We designed a chi-square statistical test to evaluate the performance of specific mobile handset models. We also developed a mobility tool that evaluated the handset's performance by means of mapping the handoffs on the Google Maps. The mapping of the handoffs by means of the Google Maps were very powerful in identifying the above mentioned mobility patterns.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012548
- Subject Headings
- Mobile communication systems--Quality control, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Investigation of debonding failures in sandwich constructions.
- Creator
- Sendlein, Lyle Scott., Florida Atlantic University, Merry, Stephanie L., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Debonding failure of cored marine composite materials is investigated. A new test method that subjects the bond line between the core and the face sheets to a shear stress singularity is presented and studied analytically by laminated beam shear deformation theory, numerically by the finite element method, and experimentally with specimens of glass/polyester face sheets on balsa wood or PVC core sandwich beams.
- Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/14519
- Subject Headings
- Mobile communication systems--Design, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Resilient system design and efficient link management for the wireless communication of an ocean current turbine test bed.
- Creator
- Marcus, Anthony M., Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
To ensure that a system is robust and will continue operation even when facing disruptive or traumatic events, we have created a methodology for system architects and designers which may be used to locate risks and hazards in a design and enable the development of more robust and resilient system architectures. It uncovers design vulnerabilities by conducting a complete exploration of a systems’ component operational state space by observing the system from multi-dimensional perspectives and...
Show moreTo ensure that a system is robust and will continue operation even when facing disruptive or traumatic events, we have created a methodology for system architects and designers which may be used to locate risks and hazards in a design and enable the development of more robust and resilient system architectures. It uncovers design vulnerabilities by conducting a complete exploration of a systems’ component operational state space by observing the system from multi-dimensional perspectives and conducts a quantitative design space analysis by means of probabilistic risk assessment using Bayesian Networks. Furthermore, we developed a tool which automated this methodology and demonstrated its use in an assessment of the OCTT PHM communication system architecture. To boost the robustness of a wireless communication system and efficiently allocate bandwidth, manage throughput, and ensure quality of service on a wireless link, we created a wireless link management architecture which applies sensor fusion to gather and store platform networked sensor metrics, uses time series forecasting to predict the platform position, and manages data transmission for the links (class based, packet scheduling and capacity allocation). To validate our architecture, we developed a link management tool capable of forecasting the link quality and uses cross-layer scheduling and allocation to modify capacity allocation at the IP layer for various packet flows (HTTP, SSH, RTP) and prevent congestion and priority inversion. Wireless sensor networks (WSN) are vulnerable to a plethora of different fault types and external attacks after their deployment. To maintain trust in these systems and increase WSN reliability in various scenarios, we developed a framework for node fault detection and prediction in WSNs. Individual wireless sensor nodes sense characteristics of an object or environment. After a smart device successfully connects to a WSN’s base station, these sensed metrics are gathered, sent to and stored on the device from each node in the network, in real time. The framework issues alerts identifying nodes which are classified as faulty and when specific sensors exceed a percentage of a threshold (normal range), it is capable of discerning between faulty sensor hardware and anomalous sensed conditions. Furthermore we developed two proof of concept, prototype applications based on this framework.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004035
- Subject Headings
- Fault tolerance (Engineering), Reliability (Engineering), Sensor networks -- Security measures, Systems engineering, Wireless communication systems -- Technological innovations
- Format
- Document (PDF)
- Title
- Design and implementation of efficient routing protocols in delay tolerant networks.
- Creator
- Liu, Cong., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Delay tolerant networks (DTNs) are occasionally-connected networks that may suffer from frequent partitions. DTNs provide service despite long end to end delays or infrequent connectivity. One fundamental problem in DTNs is routing messages from their source to their destination. DTNs differ from the Internet in that disconnections are the norm instead of the exception. Representative DTNs include sensor-based networks using scheduled intermittent connectivity, terrestrial wireless networks...
Show moreDelay tolerant networks (DTNs) are occasionally-connected networks that may suffer from frequent partitions. DTNs provide service despite long end to end delays or infrequent connectivity. One fundamental problem in DTNs is routing messages from their source to their destination. DTNs differ from the Internet in that disconnections are the norm instead of the exception. Representative DTNs include sensor-based networks using scheduled intermittent connectivity, terrestrial wireless networks that cannot ordinarily maintain end-to-end connectivity, satellite networks with moderate delays and periodic connectivity, underwater acoustic networks with moderate delays and frequent interruptions due to environmental factors, and vehicular networks with cyclic but nondeterministic connectivity. The focus of this dissertation is on routing protocols that send messages in DTNs. When no connected path exists between the source and the destination of the message, other nodes may relay the message to the destination. This dissertation covers routing protocols in DTNs with both deterministic and non-deterministic mobility respectively. In DTNs with deterministic and cyclic mobility, we proposed the first routing protocol that is both scalable and delivery guaranteed. In DTNs with non-deterministic mobility, numerous heuristic protocols are proposed to improve the routing performance. However, none of those can provide a theoretical optimization on a particular performance measurement. In this dissertation, two routing protocols for non-deterministic DTNs are proposed, which minimizes delay and maximizes delivery rate on different scenarios respectively. First, in DTNs with non-deterministic and cyclic mobility, an optimal single-copy forwarding protocol which minimizes delay is proposed., In DTNs with non-deterministic mobility, an optimal multi-copy forwarding protocol is proposed. which maximizes delivery rate under the constraint that the number of copies per message is fixed . Simulation evaluations using both real and synthetic trace are conducted to compare the proposed protocols with the existing ones.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210522
- Subject Headings
- Computer network protocols, Computer networks, Reliability, Computer algorithms, Wireless communication systems, Technological innovations
- Format
- Document (PDF)
- Title
- Probabilistic predictor-based routing in disruption-tolerant networks.
- Creator
- Yuan, Quan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Disruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the...
Show moreDisruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the network stays connected. Thus, routing in DTNs becomes a challenging problem, due to the temporal scheduling element in a dynamic topology. One of the solutions is prediction-based, where nodes mobility is estimated with a history of observations. Then, the decision of forwarding messages during data delivery can be made with that predicted information. Current prediction-based routing protocols can be divided into two sub-categories in terms of that whether they are probability related: probabilistic and non-probabilistic. This dissertation focuses on the probabilistic prediction-based (PPB) routing schemes in DTNs. We find that most of these protocols are designed for a specified topology or scenario. So almost every protocol has some drawbacks when applied to a different scenario. Because every scenario has its own particular features, there could hardly exist a universal protocol which can suit all of the DTN scenarios. Based on the above motivation, we investigate and divide the current DTNs scenarios into three categories: Voronoi-based, landmark-based, and random moving DTNs. For each category, we design and implement a corresponding PPB routing protocol for either basic routing or a specified application with considering its unique features., Specifically, we introduce a Predict and Relay routing protocol for Voronoi-based DTNs, present a single-copy and a multi-copy PPB routing protocol for landmark-based DTNs, and propose DRIP, a dynamic Voronoi region-based publish/subscribe protocol, to adapt publish/subscribe systems to random moving DTNs. New concepts, approaches, and algorithms are introduced during our work.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359928
- Subject Headings
- Routers (Computer networks), Computer network protocols, Computer networks, Reliability, Computer algorithms, Wireless communication systems, Technological innovations
- Format
- Document (PDF)
- Title
- Reliable, energy-aware cross-layer protocol for wireless sensor networks.
- Creator
- Badi, Ahmed., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back...
Show moreThis research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back-off algorithm that dynamically adjusts to the data messages reliability needs. Other cross-layer techniques that the protocol introduces are dynamic MAC retry limit and dynamic transmission power setting that is also based on the messages reliability requirements. Cross layer design is defined as the interaction between the different stack layers with the goal of improving performance. It has been used in ad hoc wireless systems to improve throughput, latency, and quality of service (QoS). The improvements gained in performance come at a price. This includes decreased architecture modularity and designs may be hard to debug, maintain or upgrade. Cross-layer design is valuable for wireless sensor networks due to the severe resource constraints. The proposed protocol uses cross-layer design as a performance and energy optimization technique. Nevertheless, the protocol avoids introducing layer interdependencies by preserving the stack architecture and optimizes the overall system energy and reliability performance by information sharing. The information is embedded as flags in the data and control messages that are moving through the stack. Each layer reads these flags and adjusts its performance and handling of the message accordingly. The performance of the proposed protocol is evaluated using simulation modeling. The reference protocol used for evaluation is APTEEN., We developed simulation programs for the proposed protocol and for APTEEN protocol using the JiST/SWANS simulation tool. The performance evaluation results show that the proposed protocol achieves better energy performance than the reference protocol. Several scalability experiments show that the proposed protocol scales well and has better performance for large networks. Also, exhaustive bandwidth utilization experiments show that for heavily-utilized or congested networks, the proposed protocol has high reliability in delivering messages classified as important.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359921
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Power resources, Efficiency
- Format
- Document (PDF)
- Title
- Implementations Of The DTM, DADCQ And SLAB VANET Broadcast Protocols For The Ns-3 Simulator.
- Creator
- Alwakeel, Ahmed M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean...
Show moreThis work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean to determine if a node should rebroadcast or not. We then implement the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol, which uses node distribution, channel quality and distance to determine if a node should favor rebroadcasting. The third protocol, Statistical Location-Assisted Broadcast protocol (SLAB), is an improvement of DADCQ which automates the threshold function design using machine learning. Our NS-3 implementations of the three protocols have been validated against their JiST/SWANS implementations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004565, http://purl.flvc.org/fau/fd/FA00004565
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Wireless communication systems--Technological innovations., Mobile communication systems--Technological innovations., Mobile computing., Intelligent transportation systems--Mathematical models., Routing protocols (Computer network protocols)
- Format
- Document (PDF)
- Title
- Web-based wireless sensor network monitoring using smartphones.
- Creator
- Marcus, Anthony M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem....
Show moreThis thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem. We developed this architecture for web-based wireless sensor network monitoring and have implemented a prototype that uses Crossbow Mica sensors and Android smartphones for bridging the wireless sensor network with the web services for data storage and retrieval. Our application has the ability to retrieve sensed data directly from a wireless senor network composed of Mica sensors and from a smartphones onboard sensors. The data is displayed on the phone's screen, and then, via Internet connection, they are forwarded to a remote database for manipulation and storage. The attributes sensed and stored by our application are temperature, light, acceleration, GPS position, and geographical direction. Authorized personnel are able to retrieve and observe this data both textually and graphically from any browser with Internet connectivity or through a native Android application. Web-based wireless sensor network architectures using smartphones provides a scalable and expandable solution with applicability in many areas, such as healthcare, environmental monitoring, infrastructure health monitoring, border security, and others.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171682
- Subject Headings
- Smartphones, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer networks, Security measures, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- An uncertainty-aware reputation system in mobile networks: analysis and applications.
- Creator
- Li, Feng., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on...
Show moreMany emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on evaluating and quantifying trust to stimulate collaboration in mobile networks, introducing uncertainty concepts and metrics, as well as providing the various analysis and applications of uncertainty-aware reputation systems. Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include it in the reputation system. Specifically, we use an uncertainty metric to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information may affect uncertainty in nodes' opinions. Higher uncertainty leads to higher transaction cost and reduced acceptance of communication. We exploit mobility to efficiently reduce uncertainty and to speed up trust convergence. We also apply the new reputation system to enhance the analysis of the interactions among mobile nodes, and present three sample uncertainty-aware applications. We integrate the uncertainty-aware reputation model with game theory tools, and enhance the analysis on interactions among mobile nodes., Instead of reactively protecting the mobile networks from existing attacks as in the traditional security paradigms, the analysis in this dissertation gives more insights on nodes' rationality in the interaction, which will enable the mechanism design in mobile networks to be security and incentive compatible. Moreover, we present three sample applications, in which we clearly identify the challenges, specifically formalize the problems, and cleverly employ the uncertainty mitigation schemes. These applications show that the uncertainty definition and mitigation schemes can benefit a broad range of applications, including fields such as security, network services, and routing.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210520
- Subject Headings
- Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer network architectures, Mobile computing, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Joint TCP congestion control and wireless-link scheduling for mobile Internet applications.
- Creator
- Li, Zhaoquan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362481
- Subject Headings
- Wireless communication systems, Quality control, Mobile communication systems, Technological innovations, TCP/IP (Computer network protocol), Ad hoc networks (Computer networks), Computer network protocols, Wireless Internet
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)
- Title
- Reputation and trust-based security in wireless sensor networks.
- Creator
- Srinivasan, Avinash., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology...
Show moreThis dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology without first addressing the security and privacy challenges to ensure that it does not turn against those whom it is meant to benefit. The core application of WSNs is to detect and report events, be it military or civilian applications. The building blocks of a WSN are small, battery-powered, lowcost, self-contained devices called "sensors" that measure factors like light, temperature, pressure, vibration, motion, etc. A WSN usually consists of hundreds of thousands of sensors that operate in unattended, hostile territories to monitor a given geographical area. Once deployed, the wireless sensors self-organize into ad-hoc wireless networks in order to cope with the dynamics of the surveillance field. During the post deployment phase, the wireless sensors aggregate data, then process and generate a report, which is subsequently relayed from one sensor to the next using secure multi-hop routing until the data reaches its desired destination, which is usually the sink. Since sensors operate in unattended and hostile territories, the adversary can capture a sensor node physically and extract all the information stored onboard, including cryptographic keying material. With this unique situation, WSNs are subject to a unique attack referred to as an "Insider Attack," in which the adversary becomes a legitimate member of the network being represented by the captured node., To overcome this unique situation, a distributed Reputation and Trust-based Monitoring System (RTMS) is required. The most critical contribution of this dissertation work has been the proposal and design of a novel, clique-based, distributed group-key establishment protocol with specific application to RTMSs. We have also proposed and evaluated the application of RTMS models for securing beacon-based localization in WSNs addressing information asymmetry attacks, and proposed a novel k-parent tree model for securing broadcast communication in WSNs with an underlying RTMS model. Other issues addressed in this dissertation work include the proposal of a Connected Dominating Set (CDS) based reputation dissemination and bootstrapping model. This model also enables secure, certificateless node mobility and enables the model to be robust to ID Spoofing and node replication attacks.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77652
- Subject Headings
- Sensor networks, Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Adaptive Routing Protocols for VANET.
- Creator
- Skiles, Joanne, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing...
Show moreA Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing protocol in VANETs which is able to tolerate low and high-density network tra c with little throughput and delay variation. This dissertation proposes three Geographic Ad-hoc On-Demand Distance Vector (GEOADV) protocols. These three GEOADV routing protocols are designed to address the lack of exibility and adaptability in current VANET routing protocols. The rst protocol, GEOADV, is a hybrid geographic routing protocol. The second protocol, GEOADV-P, enhances GEOADV by introducing predictive features. The third protocol, GEOADV-PF improves optimal route selection by utilizing fuzzy logic in addition to GEOADV-P's predictive capabilities. To prove that GEOADV and GEOADV-P are adaptive their performance is demonstrated by both urban and highway simulations. When compared to existing routing protocols, GEOADV and GEOADV-P lead to less average delay and a higher average delivery ratio in various scenarios. These advantages allow GEOADV- P to outperform other routing protocols in low-density networks and prove itself to be an adaptive routing protocol in a VANET environment. GEOADV-PF is introduced to improve GEOADV and GEOADV-P performance in sparser networks. The introduction of fuzzy systems can help with the intrinsic demands for exibility and adaptability necessary for VANETs. An investigation into the impact adaptive beaconing has on the GEOADV protocol is conducted. GEOADV enhanced with an adaptive beacon method is compared against GEOADV with three xed beacon rates. Our simulation results show that the adaptive beaconing scheme is able to reduce routing overhead, increase the average delivery ratio, and decrease the average delay.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004926, http://purl.flvc.org/fau/fd/FA00004926
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Routing protocols (Computer network protocols), Wireless sensor networks., Computer algorithms., Mobile computing., Mobile communication systems--Technological innovations., Wireless communication systems--Technological innovations., Intelligent transportation systems--Mathematical models.
- Format
- Document (PDF)