• Title/Summary/Keyword: wireless ad hoc

Search Result 865, Processing Time 0.04 seconds

Optimal Power Allocation for Wireless Uplink Transmissions Using Successive Interference Cancellation

  • Wu, Liaoyuan;Wang, Yamei;Han, Jianghong;Chen, Wenqiang;Wang, Lusheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2081-2101
    • /
    • 2016
  • Successive interference cancellation (SIC) is considered to be a promising technique to mitigate multi-user interference and achieve concurrent uplink transmissions, but the optimal power allocation (PA) issue for SIC users is not well addressed. In this article, we focus on the optimization of the PA ratio of users on an SIC channel and analytically obtain the optimal PA ratio with regard to the signal-to-interference-plus-noise ratio (SINR) threshold for successful demodulation and the sustainable demodulation error rate. Then, we design an efficient resource allocation (RA) scheme using the obtained optimal PA ratio. Finally, we compare the proposal with the near-optimum RA obtained by a simulated annealing search and the RA scheme with random PA. Simulation results show that our proposal achieves a performance close to the near-optimum and much higher performance than the random scheme in terms of total utility and Jain's fairness index. To demonstrate the applicability of our proposal, we also simulate the proposal in various network paradigms, including wireless local area network, body area network, and vehicular ad hoc network.

Intrusion Detection System based on Cluster (클러스터를 기반으로 한 침입탐지시스템)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.479-484
    • /
    • 2009
  • Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

  • PDF

Cluster-Based Node Management Algorithm for Energy Consumption Monitoring in Wireless Mobile Ad Hoc Networks (무선 모바일 애드혹 네트워크상에서 에너지 소모 감시를 위한 클러스터 기반의 노드 관리 알고리즘)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.309-315
    • /
    • 2016
  • The node mobility in the wireless mobile network environment increases the energy consumption. This paper proposes a CNMA (cluster-based node management algorithm) to reduce the energy consumption caused by node mobility, and to prolong the life cycle for cluster member nodes. The proposed CNMA traces the mobility for nodes between cluster header and member, and it analyses the energy capacity as monitoring periodically their relationship. So, it makes a division and merges by analysing the state transition for nodes. This paper is to reduce the energy consumption due to the node mobility. The simulation results show that the proposed CNMA can efficiently control the energy consumption caused by mobility, and it can improve the energy cycle.

Flooding Level Cluster-based Hierarchical Routing Algorithm For Improving Performance in Multi-Hop Wireless Sensor Networks (멀티홉 무선 센서 네트워크 환경에서 성능 향상을 위한 플러딩 레벨 클러스터 기반 계층적 라우팅 알고리즘)

  • Hong, Sung-Hwa;Kim, Byoung-Kug;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.123-134
    • /
    • 2008
  • In this paper, a routing algorithm for wireless sensor networks is proposed to improve the efficiency of energy consumption in sensor nodes. Each sensor node has the value called ‘Flooding Level’ obtained through the initial flooding from a sink node instead of sending beacon messages in multi-hop sensor field. This value can be used for guaranteeing the sensor nodes to connect with a sink node and determining the roles of cluster-head and cluster-gateway node efficiently and simply during the clustering. If different algorithms are added to our protocol, it will work better in the side of energyefficiency. This algorithm is evaluated through analysis and extensive simulations.

The Implement of Medium Access Control Protocol with Energy Efficiency in Multi-hop Sensor network (에너지 효율을 고려한 다중홉 센서망에서의 MAC 프로토콜 구현)

  • 김동일;송창안
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.793-797
    • /
    • 2004
  • Wireless sensor networks use battery-operated computing and sensing devices. And It can be expected to be deployed in an ad hoc networs. MAC is different from traditional wireless MACs such as IEEE 802.11 in almost every way. so self-configuration and power saving in sensor network are very important goals, while per-node fairness and latency are less important. In this paper, so we use a given prototype for efficient energy conservation to reduce power consumtion that is one of the important character in sensor network and compare energy consumption and collision with IEEE 802.11 MAC. finally we conclude the paper and analyze it.

Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare (유비쿼터스 헬스케어를 위한 저비용, 수동형 실내 위치추적 시스템)

  • Chung Wan-Young;Singh Vinay Kumar;Lim Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.430-433
    • /
    • 2006
  • Wireless sensor network plays a prominent role in tracking the location of the target outdoor and indoor. This paper describes the implementation of the passive indoor location tracking system using ultrasonic and RF technologies that provides accurate location in the form of user space and position in three dimensions. Our system used a combination of RF and ultrasonic technologies to provide a location-support service to users and applicants. Ceiling-mounted beacons were spread through the building, publishing location information on an RF signal. The person carried a listener and the listener determined the location by calculating the distance from three beacons using triangulation algorithm.

  • PDF

Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare (유비쿼터스 헬스케어를 위한 저비용, 수동형 실내 위치추적 시스템)

  • Chung Wan-Young;Singh Vinay Kumar;Lim Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1119-1123
    • /
    • 2006
  • Wireless sensor network plays a prominent role in tracking the location of the target outdoor or indoor. This paper describes the implementation of the passive indoor location tracking system using ultrasonic and RF technologies that provides accurate location in the form of user space and position in three dimensions. Our system used a combination of RF and ultrasonic technologies to provide a location-support service to users and applicants. Ceiling-mounted beacons were spread through the building, publishing location information on an RF signal. The person carried a listener and the listener determined the location by calculating the distance from three beacons using triangulation algorithm.

The Implement of Medium Access Control Protocol with Energy Efficiency in Multi-hop Sensor network (에너지 효율을 고려한 다중홉 센서망에서의 MAC 프로토콜 구현)

  • 송창안;이우철;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.182-185
    • /
    • 2004
  • Wireless sensor networks use battery-operated computing and sensing devices. And It can be expected to be deployed in an ad hoc networs. MAC is different from traditional wireless MACs such as IEEE 802.11 in almost every way. so self-configuration and power saving in sensor network are very important goals, while per-node fairness and latency are less important. In this paper, so we use a given prototype for efficient energy conservation to reduce power consumtion that is one of the important character in sensor network and compare energy consumption and collision with IEEE 802.11 MAC. Finally we conclude the paper and analyze it.

  • PDF

Multi-channel and Multi-hop transmission scheme for cognitive radio networks (인지무선네트워크에서 멀티채널 멀티홉 전송 기법)

  • Kwon, Youngmin;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.609-610
    • /
    • 2017
  • Cognitive radio communication techniques have been attracting attention to efficiently use the scarce spectrum as the wireless communication service increases. In cognitive radio communication, efforts to minimize interference to the primary user are important technical factors. In a multi-hop wireless ad hoc network, multi-hop transmission requires path and channel selection considering channel interference as well as collision with primary users. In the multi-channel environment, cognitive radio network has different capacities depending on the inter-channel interference and collision with the main users. In this paper, we propose a multi-hop transmission scheme that minimizes inter-channel interference and reduce collision with primary users.

  • PDF

A Routing Algorithm with Small Routing Traffic (작은 라우팅 구성 트래픽을 가지는 라우팅 알고리즘)

  • Choi, Ick-Sung;Kwark, Gwang-Hoon;Kim, Geun-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.279-286
    • /
    • 2011
  • This paper proposes techniques for wireless sensor network routing algorithm with small routing traffics. It reduces routing traffic by gathering routing messages for fixed duration of time and the routing message for the configuration result is sent once. The routing traffic gathering technique has disadvantage of longer network configuration time. To overcome this, first one or first few routing messages are delivered immediately and later routing messages are gathered for fixed duration of time. The proposed scheme was modelled and implemented in Qualnet simulator using C language. Experimental results show that the proposed techniques are effective for reducing routing traffics.