Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
|
|
|
- Anabel York
- 9 years ago
- Views:
Transcription
1 Lightweight Jammer Localization in Wireless Networks: System Design and Implementation Konstantinos Pelechrinis, Iordanis Koutsopoulos, Ioannis Broustis, Srikanth V. Krishnamurthy University of California, Riverside University of Thessaly {kpele, broustis, Abstract Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal network operations. After detecting the malicious node we want to find its position, in order for further security actions to be taken. Our goal in this paper is the design and implementation of a simple, lightweight and generic localization algorithm. Our scheme is based on the principles of the gradient descent minimization algorithm. The key observation is that the Packet Delivery Ratio (PDR) has lower values as we move closer to the jammer. Hence, the use of a gradient-based scheme, operating on the discrete plane of the network topology, can help locate the jamming device. The contributions of our work are the following: (a) We demonstrate, through analysis and experimentation, the way that the jamming effects propagate through the network in terms of the observed PDR. (b) We design a distributed, lightweight jammer localization system which does not require any modifications to the driver/firmware of commercial NICs. (c) We implement and evaluate our localization system on our indoor testbed. An attractive and important feature of our system is that it does not rely on special hardware 1. Index Terms Wireless Networks, Jamming, Gradient Descent, Location Discovery, Experimentation, Analysis. I. INTRODUCTION The widespread proliferation of wireless networks makes them an attractive target for saboteurs with jamming devices [1], [2]. Numerous jamming attacks have been reported in the recent past [3], [4], [5], [6]. A jamming device continuously emits electromagnetic energy on the medium. The effect of this behavior on a CSMA/CA network is twofold: (a) at the transmitter side it renders the medium busy resulting in large back-off times and, (b) at the receiver side it dramatically decreases the SNR resulting in a large number of packet collisions. Note that jamming effects may also occur due to accidental activation of devices that do not serve a malicious cause, such as microwave ovens, cordless phones [7], etc. Following the detection of the presence of an attacker [8], an algorithm is needed for localizing the jammer, so that further countermeasures can be taken by the network (such as deactivating the jamming device, as well as isolating the attacker, capturing, punishing or even destroying it). In this work, we design and implement a simple, lowoverhead algorithm for jammer localization. The main attribute 1 This work was done partially with support from the US Army Research Office under the Multi-University Research Initiative (MURI) grants W911NF and the NSF NeTS:WN / Cyber trust grant I. Koutsopoulos acknowledges the support of the European Commission through the OPNEX project (FP7-ICT ) and the NoE NEWCOM++ (FP7-ICT ). of our algorithm that makes it attractive to use and straightforward to implement, is that it relies on packet delivery ratio (PDR), a metric that is readily available at each node and is an indication of transmission corruption. Our technique exploits an intrinsic characteristic of the wireless medium: since the power of the jamming signal degrades with distance, farther transmitters do not sense strong jamming signals. In addition, the SNR requirement at such tranceivers is often satisfied. This cannot be concealed by the attacker. The transmitter is thereby able to send more packets, while the receiver can decode more of those, resulting in an increased PDR as we move away from the jammer. Taking this property into account we design a decentralized localization algorithm based on the gradient descent minimization method. Our algorithm progresses in a distributed manner towards the proximity of the attacker by successive forwarding of PDR measurements to neighbors. In that sense, it is reminiscent of the iterative gradient descent algorithm for identifying the minimum of a real-valued function f. This algorithm moves from one point a of the function s domain S to another b S. The point b is towards the opposite direction of the gradient of f at a; this is the direction in which f exhibits the largest decrease with regards to its value at point a. If the algorithm cannot proceed further, (at least) a local optimum is declared. Note that in our case, the domain set is the discrete locations of the nodes. Hence, our scheme can be viewed as a discretized version of a gradient descent algorithm. Our main contributions in this work can be summarized as follows: Analytical and experimental assessments for the spatial characteristics of jamming effects in a network: As previously mentioned, the jammer may affect both the transmitter and receiver operations; this has an impact on the PDR. We provide an analytical expression for quantifying the change in PDR in the different parts of the network (relative to the jammer s location). We experimentally validate the analytically computed expression on our testbed. We show that tranceivers further from the jammer exhibit lower (or no) degradation in terms of PDR as compared to tranceivers that are located closer to the jammer. Design of a fully distributed jamming localization algorithm: Having shown that PDR is minimized in the vicinity of the malicious device, we design a gradient descent based algorithm to locate the adversarial node. The main advantages of our approach (as compared to previously proposed localization approaches) are: (a) it
2 is simple, (b) it does not require any special hardware support, (c) it is distributed in nature, and (d) it can be integrated with higher layer functions, such as routing, to circumvent the jammer s location. Implementation and evaluation of our scheme on our testbed: We implement our scheme on our wireless testbed using the Click modular router [9]. We validate its performance via experimentation; our results show that a satisfactory performance is achieved by our localization strategy; we also identify and discuss scenarios where our scheme has a difficulty in localizing the jammer. Our work in perspective: Our goal is to exploit the inherent propagation characteristics of the wireless channel in order to expose the presence of jamming devices and localize them. The jamming attacker might be able to hide itself from all but the wireless channel s propagation characteristics. The attributes of the jamming signals (and in particular their spatial properties) can affect measurable attributes (such as the PDR) to varying degrees in different parts of the network, thereby revealing important information with regards to the location of the malicious device. The rest of the paper is organized as follows. Section II provides a brief description of related studies. Section III describes our analytical framework for quantifying the jamming effects on the PDR. Section IV provides a full description of our algorithm. We present our experimental set-up and evaluations in Section V. Section VI discusses issues related to our approach. Our conclusions form Section VII. II. RELATED STUDIES Signal processing localization techniques: Secure mobile device localization, and in particular jammer localization, has been studied in the literature during the past years. Various approaches have been proposed in order to locate the malicious device, such as the efforts in [10], [11], [12], [13], [14]. However, all of these studies use advanced signal processing techniques and operate at the PHY layer. In addition, they require special, additional infrastructure in order to achieve their goal (e.g. ultrasound, infrared or laser infrastructures). These features make the wide deployment of such techniques rather infeasible in currently commercial wireless networks. A detailed description of various secure positioning systems, that exclusively operate at the PHY layer, can be found in [15]. Received Signal Strength (RSS) based localization techniques: In addition to the above schemes, various studies utilize RSS measurements to discover the location of wireless devices, and in particular the positions of access points (APs). Most of these techniques require measurements of the RSS at various positions (wardriving). Some well known approaches belonging to this category are the (weighted) centroid [16] and trilateration [17]. Both these techniques combine measurements of the RSS at various locations in order to infer the position of the AP. Subramanian et al. [18] propose a localization algorithm that utilizes steerable, directional antennas in order to get information with regards to the Angle of Arrival (AoA). This can significantly reduce the localization error. In a different approach, the authors in [19] manage to derive AoA equivalent information by simply measuring the RSS. All of these schemes, require wardriving and can be considered as centralized algorithms; a set of previously collected measurements, including coordinates and the corresponding RSS, are needed in order to apply the algorithms and identify the AP s position. In a slightly different context Chen et al. [20] combine environmental information gathered from sensor networks in order to perform localization. All the data are gathered at the base station and are analyzed in order to identify the locations needed; centralized localization is again performed. Our approach is different from the previously proposed schemes. In particular it does not require additional, specialized infrastructure in order to operate (in contrast with signal processing systems). No changes at the driver/firmware of commercial NICs are required. Our localization system can be integrated with higher layers, as we discuss later in this paper. One could expect that the RSS-based algorithms could be modified in order to locate a jamming node; areas close to the jamming device might exhibit extremely high RSS values due to the jamming signals [21]. However, the advantage of our approach over the RSS-based systems is that it can be executed online and in a fully distributed manner. Gradient based routing: The idea of incorporating features from gradient optimization into network operations has been used in the past for routing. In particular, Faruque et al. [22] propose the use of a gradient based algorithm for the efficient forwarding of queries in sensor networks. Poor [23] presents an on demand routing protocol for ad hoc networks, which uses a gradient descent logic in order to forward the packets based on the cost to destination. In particular, the source broadcasts the message along with the cost, and only the nodes that have a smaller cost relay the packet. In a similar fashion, Ruhil et al. [24] forward the message to the neighbor node that is closer to the direction of the destination. III. JAMMING EFFECTS ON PDR The presence of a jammer can affect the PDR on a link. In particular there are 3 possible ways that a (successful) packet transmission can be affected: (i) the transmitter (T x ) senses the medium busy due to jamming signals, (ii) the reception at the receiver (R x ) fails due to low SNR at its antenna because of the jamming signals and (iii) the reception of the MAC layer ACK packet fails due to low SNR at the T x antenna. Since the above events are statistically independent, the PDR can be expressed in the following way: PDR = P Txsend DAT A P Rxreceive DAT A P Txreceive ACK, (1) where P Txsend DAT A is the probability that T x will sense the medium idle and transmit its packets, P Rxreceive DAT A is the probability that the the SNR requirement at R x is satisfied and P Txreceive ACK is the probability that the SNR requirement at T x (for receiving the ACK) is satisfied too. Note that, we do not include the probability that the R x is sensing the medium idle for the transmission of the MAC layer ACK; once R x correctly receives the DATA packet it does not perform carrier sensing in order to send out the ACK.
3 (a) d = 10m. (b) d = 20m. (c) d = 30m. (d) d = 40m. Fig. 1. Analytical results using Equation 1. Shorter links are more robust, while areas around the jamming device exhibit low PDR. In order to calculate these probabilities we need to incorporate a signal propagation model. A widely used model [25] calculates the received power P r at distance r relative to transmission power P to be: P r = P Y, (2) rα where α is the path loss exponent and Y is a random variable that is log-normally distributed. Y captures the shadow fading effects and has a mean value of 1 and a standard deviation equal to the shadow fading variation which we can obtain from measurements. Using this propagation model the components of Equation 1 can be expressed as follows 2 : P Txsend DAT A = P {Y < CCA ra T P J = P {P JT < CCA} = Pr{ P J r a T Y < CCA} ( } = CCA r ln( a T 2 erf P J ) μ )(3) 2 σ N u P Rxreceive DAT A = P {SNR Rx >u} = P {Y > } P d u PJ a rr a N u = ln( P PJ ) μ 2 erf da u r R a (4) 2 σ 2 Note that we consider a single rate network, and in particular a network operating at the basic rate (6 Mbps). N u P Txreceive ACK = P {SNR T x >u} = P {Y > } P d u PJ a rt ( ) a N u = ln P PJ μ 2 erf da u r T a 2 σ. (5) In the above equations, P JT is the signal strength of the jamming signal at T x, P J is the transmission power of the jammer, r T is the distance between the jammer and T x, r R is the distance between the jammer and the R x, P is the transmission power on the link, d is the distance between T x and R x, u is the SNR requirement for the particular rate used (in our case 6 Mbps), and (μ, σ) are the parameters of the log normal distribution (computed from the mean value and the standard deviation of the r.v. Y). Substituting Equation (3)-(5) in (1) provides an expression for the PDR on a link as a function of r T and r R. Figure 1 presents the PDR for various distances from the jammer and various link lengths. In generating these plots we have used the following values: (i) P = P J =18dBm, (ii) CCA = 80 dbm, (iii) shadow fading signal variation is 10 dbm (value measured on our testbed) and (iv) path loss exponent is equal to 5 (this is a typical value for the path loss exponent in indoor environments [25]).
4 There are two main observations that we can derive from these analytical results. First, areas in the vicinity of the jamming device (approximately 25-30m - one hop away), exhibit very low PDR. This forms the basis for our localization algorithm described in the following section. Second, shorter links are more robust to jamming, since they can satisfy the SNR requirements with higher probability. In Section V we present experimental results for cross validation of our analysis. IV. OUR LOCALIZATION ALGORITHM Gradient descent minimization: Gradient descent is a popular optimization method for real valued functions. In particular, let us assume that function f is defined on R n and it is convex. In order to find the minimum of this function, one may start from a point x 0 R n and continue finding a series of points using: x n+1 = x n γ n f( x n ), (6) where f( x i ) is the gradient of f. The gradient of f at point x is the direction of the maximum increase of the function at x. The idea with this algorithm is that starting from a point, we greedily move towards the direction of the maximum decrease of the function at the neighborhood of this point (- f( x n )) using a step of γ n at every iteration. After a series of iterations, the algorithm will converge to the minimum (at least a local one) of the function 3. Our localization algorithm: As seen in the previous section, the PDR value decreases as we move to within the proximity of the jammer. Hence we can modify the above gradient descent method in order to localize the jammer. Function f is the PDR, while the next candidate points x n+1 are the neighbors of the node under consideration. Since we are moving in a discrete space, the PDR differential is the discrete approximation to the gradient s magnitude of the continuous function of PDR. In particular, every node will try to find its neighbor node with the largest decrease in PDR. Algorithm 1 presents a pseudocode for the algorithm executed at every node Data: Neighbors PDR Result: Next node n closer to the jammer begin Pick k :(PDR i PDR k ) > (PDR i PDR j) j k Δ=(PDR i PDR k ) if Δ > 0 then n = k else n = i end end return end Algorithm 1: Pseudocode for the Localization Scheme for node i. 3 Depending on the initial point, the algorithm might be trapped at a local minimum. In the above notation, PDR i is the PDR of node i. However, PDR is related with a link, rather than a node. Hence, in order to calculate PDR i we can use the average value of the PDR of the links between node i and its neighbors 4. Specifically: NS m=1 PDR i = PDR im, (7) NS where NS the set of neighbors of i, PDR im is the PDR on link i-m and NS is the cardinality of set NS, i.e. the number of neighbors of node i. Using this average value makes sense since one can expect the jammer to impact the PDR on all of a victim s associated links. V. SYSTEM EVALUATION Testbed description: Our testbed is deployed in the 3 rd floor of Engineering Building 2, at the University of California, Riverside. The testbed consists of 42 nodes; 22 of them are Soekris net5501 nodes, which mount a Debian Linux distribution with kernel v2.6 over NFS and are equipped with a minipci EMP G a/g WiFi card with Atheros chipset. The other 20 nodes are Soekris net4826, they mount the same Debian Linux distribution, and are additionally equipped with an Intel-2915 mini-pci card. We use 5-dBi omnidirectional antennae for every node. We use the Madwifing driver for our Atheros based cards and a proprietary version of the ipw2200 driver/firmware of the Intel-2915 card, which allows for tuning the CCA. More details on our testbed deployment can be found in [26]. Jammer implementation: For the purposes of our work we implement our own constant/deceptive jamming utility [21]. The implementation is based on a specific configuration (CCA = 0 dbm) and a user space utility that sends broadcast packets as fast as possible. By setting the CCA threshold to such a high value, we force the device to ignore all legitimate signals even after carrier sensing; packets arrive at the jammer s circuitry with powers less than 0 dbm (even if the distances between the jammer and the legitimate transceivers are very small). In addition, having the jammer transmit broadcast packets allows the deferral of back-to-back transmissions for the minimum possible time 5 (i.e. DIFS + min BackOff ). Validation of our analytical assessments: We perform experiments on our testbed in order to validate our analytical model presented in Section III. We activate the jamming nodes (one at a time) and we measure the PDR observed on various links on our testbed. We perform our experiments late at night in order to avoid interference from other wireless LANs that are active during the day, and we also operate each link in isolation (no other link active at the same time). Table I shows a subset of our experimental results in comparison with the theoretical predictions. We observe that there is a good match between the measurements and the analysis (similar matches exist for the rest of the experiments as well). However, there are some discrepancies observed that 4 We can also pick to use the minimum or maximum value of PDR of these links. 5 Transmissions of MAC layer ACK packets are by default disabled for broadcast traffic.
5 d(m) r T (m) r R (m) PDR measured PDR analytical TABLE I OUR ANALYTICAL MODEL PREDICTS WELL THE EFFECT OF A JAMMER ON THE PDR OF A LINK. can be attributed to the fact that the path loss exponent used in the model might not match exactly with the one of the real environment. In any case (qualitative) the effects of a jammer observed on our testbed are similar with the ones expected from our analysis. System implementation details: We have implemented a prototype version of our localization scheme, using the Click Modular Router framework and the Roofnet implementation from MIT. In particular, we have modified the code at sr2ettmetric.cpp of the Roofnet software framework [27] in order to retrieve the (average) PDR for every node (with regards to its neighbors). Our algorithm uses these values in order to perform the localization of the jammer. The dissemination of the PDR information takes places along the lines of the ETT [28] functionality. In particular, a probe is transmitted every τ seconds and the PDR is calculated over a sliding window of w seconds (currently we have τ = 100ms and w =1sec). This implementation of our algorithm allows its integration with higher layer operations (and in particular routing) with no additional overhead. In the rest of this section we present some proof-of-concept experiments on our testbed and their interpretations. Experimental results: Our main goal is to observe how our algorithm progressively percolates through the network topology. Every node independently runs the localization algorithm and makes local decisions with regards to the next node that it is closer to the jammer, based on the PDR values of its neighbors. This procedure continues until a node cannot identify one of its neighbors as being closer to the jammer than itself. The complete percolation can be thought of as a route discovery propagation towards the jammer. We illustrate the functionality of our algorithm with the following sample experiment. We activate one of our jamming devices on the testbed and run our localization algorithm on the rest nodes of our testbed in order to find the routes towards the jammer. Figure 2 shows the various paths towards the jammer that were reported from our algorithm for various starting points (nodes). In this experiment, the jammer is node 50 (see figure 2). The arrows represent the route towards the jammer that our algorithm finds, for various starting points. We extract the following interesting observations: Different starting points might end up into different end points. All successful localization iterations 6 end at nodes within one hop distance from the jammer (i.e m). The paths to the jammer may be different. However, once 6 With the term successful we refer to runs of our algorithm that indeed terminate close to the malicious device. Fig. 2. Paths to the jammer (node-50), for various starting points. two paths meet at an intermediate node, they converge and follow the same path until the termination of our algorithm. Depending on the starting point, our system can be trapped at a local minimum (e.g. path ). This is an inherited feature of our scheme, from gradient descent minimization technique. In Section VI we discuss possible ways of overcoming this problem. A more detailed observation at our experimental results reveals that when we start our search from nodes 13 and 46 we end up at node 23; the latter node is one hop away from the jammer. However, the paths followed are different; and Nevertheless, we have to note that once the two paths meet at node 22, they follow the same sub-route to the jammer s location. In addition, starting from node 34, we manage to successfully localize the jammer once again, following a totally different path this time, that is, One side-effect from incorporating the gradient descent minimization method is that our scheme can be trapped to local minima. The performance of our proposed method is heavily dependent on the choice of the initial point/node. For the example in figure 2, our measurements reveal that if the localization procedure starts at node 11, it will result in a faulty localization. Specifically, our algorithm follows the path: , and falsely concludes that the jammer is in the vicinity of node 27. This can happen for various reasons. As examples: (a) The links of node 27 might be inherently of bad quality (low PDR) as compared to the other links in the neighborhood of node 27 (indeed, this was the reason for being trapped to local minima in the experiment of figure 2). (b) Large-scale temporal variations in the medium can affect the performance of our localization scheme (e.g. instantaneous PDR drop due to movement of obstacles). In
6 general, a reason for getting to local minima is the randomness of wireless channel fading. Due to channel fading randomness, it is possible that a node closer to the jammer has a higher PDR that a node further from the jammer. We elaborate on this sideeffect in the following section. VI. DISCUSSION AND FUTURE DIRECTIONS Sensitivity to local minima: A significant performance improvement can be attained with the elimination of the local minima sensitivity. Thus, intelligent ways that can help avoid local-minima regions are needed. One possible way could be to gather all the information with regards to PDR (collected by each legitimate node) and try to fuse these data. A majority rule could subsequently be used in order to decide upon the location of jammer(s). However, since dense-deployment regions might contain most of the nodes, the majority of the votes might still point to a local minimum. Therefore, what is required is a way to increase the confidence of the users decisions with regards to the location of the jammer. In particular, nodes need to be able to effectively distinguish between jamming interference and heavy, legitimate interference. Xu et al. [21] propose the use of consistency checks in order to detect the presence of a jammer. In a nutshell, if the PDR experienced is small, while the received signal strength (RSS) is high, the presence of a jammer is inferred. However, a more thorough investigation would have to be performed, since high levels of (legitimate) interference can also lead to the same observations; low PDR values in conjunction with high RSS. Future directions: Our work reveals the potential of gradient descent based localization algorithms. Using simple metrics, such as PDR, we can localize the jammer with no additional overhead. Currently, we have implemented a prototype version in order to demonstrate the potential of this approach. In the future, we plan to examine various modifications in order to decrease the sensitivity of our algorithm to local minima, thereby improving its performance. Identifying a good starting point for our algorithm is also critical for the efficacy of localization. Furthermore, we will examine the use of different definitions for PDR i. Using the ratio of PDR i under jamming to the one under benign conditions or the minimum/maximum value of PDR for the links of node i, is a possible approach. This might change the number of hops required in order to reach the jammer and/or the sensitivity to local minima; we plan to further examine the applicability of such approaches. Finally, we expect that under the presence of multiple jammers our algorithm will independently reach the proximity of each; we seek to investigate the performance of our scheme under these scenarios. VII. CONCLUSIONS We design a low-overhead, generic and distributed jammer localization algorithm. Our main observation that guides the construction of our system is related to the spatial effects of the jammer. In particular, links that are further from the adversary experience higher PDRs as compared to nodes that reside closer to the jamming device. We incorporate gradient descent methods in order for each network user to decide upon the immediate closer neighbor to the jammer node, from among its neighbors. The algorithm is greedy in nature; every node makes the locally optimal choice with regard to the direction towards the jammer. Our experiments indicate that our algorithm can indeed perform efficient and effective jammer localization. Acknowledgment: We thank Dr. K. Papagiannaki from Intel Research, for providing the source code of the prototype driver. REFERENCES [1] SESP jammers. [2] ISM Wide-band Jammers. [3] Jamming attack at hacker conference. com/p/articles/mi m0ein/is 2005 August 2/ai n [4] Techworld news. newsid = [5] RF Jamming Attack. products/wifimanager/rfjamming-attack.html. [6] ISA: Users fear wireless networks for control. [7] Dueling with Microwave Ovens. article.php/ [8] M.Li, I.Koutsopoulos, and R.Poovendran. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In IEEE INFOCOM, [9] Click Modular Router. [10] Konstantin Gromov, Dennis Akos, Sam Pullen, Per Enge, and Bradford Parkinson. GIDL: Generalized Interference Detection and Localization System. In ION GPS, Salt Lake City, UT, [11] Liu and Xiangqian. Signal Detection and Jammer Localization in Multipath Channels for Frequency Hopping Communications. In DTIC, July [12] S.D. Coutts. 3-D jammer localization using out-of-plane multipath. In RADARCON, Dallas, Texas, USA, [13] E.F. Velez and G.M. Amin. Improved jammer localization using multiple focussing. In Advanced signal-processing algorithms, architectures, and implementations, [14] A.M. Dean. Detection of active emitters using triangulation and trilateration techniques: Theory and practice. In AGARD, Radiolocation Techniques. [15] I. Broustis, M. Faloutsos, and S.V. Krisnamurthy. Overcoming the Challenges of Security in a Mobile Environment. In IPCCC, Phoenix, AZ, [16] Y. Cheng, Y. Chawathe, A. LaMarca, and J. Krumm. Accuracy characterization for metropolitan-scale Wi-Fi localization. In ACM MobiSys, Seattle, WA, [17] A. Savvides, C.C. Han, and M.B. Strivastava. Dynamic fine-grained localization in ad-hoc networks of sensors. In ACM MobiCom, Rome, IT, [18] A. Subramanian, P. Deshpande, J. Gaojgao, and S. Das. Drive-by localization of roadside WiFi networks. In IEEE INFOCOM, [19] D. Han, D.G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan. Access Point Localization using Local Signal Strength Gradient. In PAM, [20] Y. Chen, S. Chen, and W. Trappe. Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. In PerCom, [21] W. Xu, W. Trappe, Y. Zhang, and T. Wood. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In ACM MOBIHOC, [22] J. Faruque and A. Helmy. Gradient-Based Routing in Sensor Networks. In ACM MobiCom (poster session), [23] R. Poor. Gradient Routing in Ad Hoc Networks. In [24] A.P. Ruhil, D.K. Lobiyal, and I. Stojmenovic. Positioned Based Gradient Routing in Mobile Ad Hoc Networks. In ICDCIT, [25] K. Pelechrinis, G. Yan, S. Eidenbenz, and S.V. Krisnamurthy. Detecting Selfish Exploitation of Carrier Sensing in Networks. In IEEE INFOCOM, [26] The UCR testbed. [27] MIT Roofnet. [28] R. Draves, J. Padhye, and B.Zill. Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks. In ACM MOBICOM, 2004.
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Metrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Denial of Service Attacks in Wireless Networks: The case of Jammers
Denial of Service Attacks in Wireless Networks: The case of Jammers 1 Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy University of California, Riverside {kpele, marios, krish}@cs.ucr.edu
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
AS MORE WIRELESS and sensor networks are deployed,
2418 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks Yingying Chen, Member, IEEE, Jie Yang, Student
Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements
Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
Access Point Localization Using Local Signal Strength Gradient
Access Point Localization Using Local Signal Strength Gradient Dongsu Han 1, David G. Andersen 1, Michael Kaminsky 2, Konstantina Papagiannaki 2, and Srinivasan Seshan 1 1 Carnegie Mellon University 2
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of
Selfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform
Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform Ankit Sharma,VikasGelara, Shashi Raj Singh, Thanasis Korakis,PeiLiu, Shivendra Panwar Department of Electrical and Computer
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Estimation of Interference in Wi-Fi Networks
Estimation of Interference in Wi-Fi Networks Prajakta D. Patil 1, M. M. Wankhade 2 Student, E & TC, Sinhgad College of Engineering, Pune, India 1 Professor, E & TC, Sinhgad College of Engineering, Pune,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
Honours Project Report. Smart Wireless Mesh Network
Honours Project Report Smart Wireless Mesh Network Routing using I-BATMAN Richard Maliwatu Supervised by: Dr. Antoine Bagula Category Min Max Chosen 1 Requirement Analysis and Design 0 20 0 2 Theoretical
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Real-Time Traffic Support in Heterogeneous Mobile Networks
Real-Time Traffic Support in Heterogeneous Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara {suny, ebelding}@cs.ucsb.edu Xia Gao
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
