Throughput Analysis and Routing Security Discussions of Mobile Access Coordinated Wireless Sensor Networks

Size: px
Start display at page:

Download "Throughput Analysis and Routing Security Discussions of Mobile Access Coordinated Wireless Sensor Networks"

Transcription

1 Throughput Analyss and Routng Securty Dscussons of Moble Access Coordnated Wreless Sensor Networks Ma Abdelhakm Jan Ren Tongtong L Department of Electrcal & Computer Engneerng, Mchgan State Unversty, East Lansng, MI 48824, USA. Emal: {abdelhak, renjan, tongl}@egr.msu.edu Abstract In ths paper, we analyze the throughput of a novel moble access coordnated wreless sensor network archtecture (MC-WSN) under sngle path and multpath routng. The obtaned throughput expressons hghlght the trade-off between achevng hgh throughput performance and mprovng the network securty strength. The results reveal the mportance of: () mnmzng the number of hops n maxmzng the throughput, and () adoptng routng dversty n combatng malcous attacks and network falure condtons. We control the number of hops n data transmsson through optmal topology desgn and actve network deployment acheved by the moble access pont (MA). To combat routng attacks, we propose a secure routng path selecton approach, and show the mpact of the proposed approach on mprovng the throughput performance under malcous attacks. Index Terms Wreless sensor networks, moble access coordnator, throughput, routng securty. I. INTRODUCTION Wreless sensor network has receved sgnfcant research attentons due to ther paramount mpact on varous crtcal mltary and cvlan applcatons. The adopted archtecture largely mpacts the performance of the network. For example, n random ad-hoc networks, t was shown n [1] that the average throughput of a node vanshes as the number of nodes n the network ncreases. Ths ndcates that for effcent communcatons, the network should not be completely structureless. In [2], throughput of multhop many-to-one network wth unformly deployed nodes and tme dvson multple access (TDMA) protocol s nvestgated, and t was shown that clusterng the network can potentally mprove the throughput. Incorporatng moblty n the network archtecture could mprove the throughput performance. For example, when the network nodes are moble and the packets are splt over multple moble relays, the acheved throughput can be hgher than that of fxed ad-hoc networks [3]. The drawback, though, s hgher energy consumpton, whch s a bg challenge for sensor networks. When the snks or access ponts are moble, lke n Sensor Networks wth Moble Access Ponts (SENMA) [4], the capacty of a node havng a drect communcaton wth the snk s sgnfcantly superor to that of ad-hoc sensor networks. However, snce the sources wat for an access pont s vst, the throughput s lmted by the traversal speed and trajectory length of the access pont. In ths paper, we consder the novel Moble Access Coordnated Wreless Sensor Network Archtecture (MC-WSN). In MC-WSN, multple snks are utlzed for data collecton. There exst a powerful center cluster head () located n the mddle of each cell, and powerful rng cluster heads (s) that are unformly placed on a crcular rng n each cell. Data transmsson goes through smple routng from each sensor to the and/or s. MC-WSN also explots moble access ponts (MAs) to coordnate the network by deployng sensors nodes and cluster heads, rechargng low-power nodes, as well as detectng malcous sensors and replacng them. MAs collects data from the sensors through the and S. The MA can also traverse the cell f the routng paths do not work. The feasblty of ths desgn s supported by the recent advances n unmanned aeral vehcle technology [5]. In ths paper, we extend our prevous work n [6], and calculate the throughput of the MC-WSN. We start by analyzng the throughput from an nformaton theoretc perspectve, then obtan the throughput expressons under both sngle path and multplath routng scenaros. Moreover, we dscuss routng securty n MC-WSN. Sensor networks are vulnerable to malcous attacks that could severely degrade the network performance. Among the dfferent attacks, the compromsaton of authentcated nodes poses serous securty threats. Ths ncludes routng attacks, where malcous nodes can modfy and drop packets that are beng routed to the snk [7]. In ths paper, we propose a secure routng path selecton mechansm to mtgate routng attacks n MC-WSN, and hghlght the nherent securty features of MC-WSN n combatng these attacks. We then dscuss the throughput lmtaton of MC- WSN under routng attacks, and the mprovements acheved through employng the proposed secure routng path selecton approach. II. THE MOBILE ACCESS COORDINATED WIRELESS SENSOR NETWORK (MC-WSN) In ths secton, we descrbe the MC-WSN archtecture, present ts major advantages and features, and dscuss the hop number control. A. Descrpton of the Archtecture In MC-WSN, we assume the network s dvded nto cells each of radus d. Each cell contans a sngle powerful moble /14/$ IEEE 4814

2 access pont (MA) and n unformly deployed sensor nodes (SNs) that are arranged nto K CH clusters. Each cluster s managed by a cluster head (CH), to whch all the cluster members report ther data. CHs then route the data to the MA. A powerful center cluster head () s employed n the mddle of each cell, and K powerful rng cluster heads () are placed on a rng of radus R t. The and s can establsh drect communcaton wth the MA or wth other that are closer to the MA. All nodes wthn a dstance R o from the route ther data to the MA through the. All other nodes route ther data to the MA through the nearest. If a sensor s wthn the MA s coverage range, then drect communcatons can take place. After recevng the data of the sensors, the MA delvers t to a Base Staton (BS). The overall network archtecture s llustrated n Fgure 1. As wll be llustrated later, the number of hops from any sensor to the MA can be lmted to a pre-specfed number through the deployment of and s. Cluster head Moble access Pont Sensor node Base Staton Center cluster head ()/Rng cluster head () Fg. 1. Proposed MC-WSN archtecture. In the proposed MC-WSN archtecture, the MA coordnates the sensor network and resolves the node deployment ssue as well as the energy consumpton problem of wreless sensor networks. More specfcally, the MAs are responsble for () deployng nodes, () replacng and rechargng nodes, () detectng malcous sensors, then removng and replacng them, (v) collectng the nformaton from sensors and delverng t to the BS. The MAs can move on the ground, and can also fly. Each MA traverses ts cell manly for removng the malcous nodes and replacng or rechargng low-energy sensor nodes and cluster heads. It moves physcally for data collecton only n the case when the routng paths do not work. Data transmsson from any SN to the MA goes through smple routng, ether wth the or the s. Let the communcaton range of each sensor node and CH be r c and R c, respectvely. SNs only communcate wth ther correspondng CH, whch then routes ther data to the MA. CHs have larger storage capacty and longer communcaton range than SNs,.e., R c >r c. The man advantages of MC-WSN le n: the multfunctonalty of the moble access, the hop number control through topology desgn, and herarchcal and heterogeneous sensor deployment. MC-WSN has the followng features: Controlled network development and prolonged network lfetme Tme-senstve data transmsson Enhanced network securty Effcent energy consumpton Enhanced network reslence, relablty and scalablty: Due to the actve network deployment feature n the proposed archtecture, we can assume that the nodes are unformly dstrbuted n the network. It s also reasonable to place the powerful s at evenly spaced locatons on the rng R t. Fgure 2 shows an example of the MC-WSN wth four s. Under normal network condtons,.e., wthout malcous attacks, to maxmze the throughput and mnmze the delay of data transmsson from the sensors to the MA, the number of hops needed n routng should be mnmzed. In Secton II-B, we consder topology desgn for hop number mnmzaton. B. Hop Number Mnmzaton In ths subsecton, we obtan the optmal radus R o and the rng radus R t that mnmze the average number of hops from any CH to ts nearest snk. Assumng multple paths are present due to network dversty, ths topology desgn wll ensure that at least one of the paths from any node to a snk has mnmum number of hops,.e., shortest path. Shortest path routng results n hgher throughput performance under normal network condtons as wll be llustrated n Secton III. Note that under shortest path routng, the number of hops s proportonal to the dstance between the source and the snk. To mnmze the number of hops, we desgn the topology such that the average dstance between a cluster head and ts nearest snk s mnmzed. We calculate the average squared dstance between any source and the correspondng snk (/) d 2 accordng to Fg.2, o =0, d t =0, and get the followng result: Proposton 1: Assumng a crcular cell of radus d, to mnmze the number of hops n the MC-WSN archtecture wth one and K s, where K>1, data transmsson should be arranged as follows: (1) The CHs wthn a dstance R o =0.366 d from the center of the cell delver ther data to the MA through the. (2) The CHs at a dstance x from, where R o apple x<d, delver ther data to the MA through the nearest on the rng of radus R t =0.233K sn( K )d. The average number of hops along the shortest path routng can be expressed as N hop = d R c, where R c s the communcaton range of the cluster heads. Note that as K ncreases, d and consequently N hop decrease. On the other hand, f the cell radus d decreases, then also d and N hop decrease. As can be seen, the maxmum number of hops can be lmted to a pre-specfed number through actve deployment of s. 4815

3 d Fg. 2. R o = 2 /K R t R t x R t sn /K (x 2-2xR t cos +R t 2 ) 1/2 MC-WSN wth four powerful s. III. THROUGHPUT ANALYSIS In ths secton, we analyze the throughput of the multhop MC-WSN archtecture. We frst ntroduce the defnton of the throughput n the sngle hop case, then analyze the multhop throughput under both sngle path and multpath routng. A. Bref Overvew As an mportant measure of network performance, throughput s generally defned as the amount of nformaton that can be successfully transmtted over a network, and s largely determned by the network model and transmsson protocols. Exstng work on throughput analyss s versatle [1], [8], [9], ncludng one-hop centralzed cases [8], [9] and ad-hoc cases [1]. There are also research on systems wth moble nodes [3] and systems wth moble access ponts, lke SENMA [4]. In SENMA, as there s a drect lnk between each sensor and the moble snk, the system throughput s sgnfcantly superor to that of ad-hoc sensor networks [4]. In [1], the throughput of random ad-hoc networks s studed. It was shown that the throughput obtaned by each node vanshes as the number of nodes n the network ncreases. More specfcally, for an ad-hoc network contanng n nodes, the throughput obtanable by each node s O( W p n ) bt-meters/sec, where W s the maxmum capacty of each lnk n the network. Note that the sze or densty of an ad-hoc network or a wreless sensor network plays a crtcal role n network performance. Ths result ndcates that for relable and effcent communcatons, the network cannot be completely structureless, but should have a well-defned structure whle mantanng suffcent flexblty. Ths thought has actually been reflected n the mergng of centralzed and ad-hoc networks, leadng to adhoc networks wth structures, known as hybrd networks [10]. As can be seen, the proposed MC-WSN s also an example of hybrd network: t has a herarchcal structure supported by the, s, and CHs; at the same tme, t also allows partally ad-hoc routng for network flexblty and dversty. B. Defnton of the Throughput We start wth the sngle hop case. Assumng node s transmttng to snk k, where k 2{0, 1,...,K}. The throughput =0 of node to snk k, T,k, s defned as the average number of packets per slot that are ntated by node and successfully delvered to the ntended recever k. Defne RS k ( ) as the set of nodes that have ther packets successfully delvered to snk k n slot, where S s the set of nodes scheduled to transmt. P Then, 1 T T,k can be expressed as: T,k =lm T!1 T =1 Pr{ 2 RS k ( )} [11]. Assumng that the packet recepton from slot to slot s an..d process, then the throughput can be formulated usng two bnary flags t k and r k, where tk s a bnary flag ndcatng that node transmts data to snk k and r k s a bnary flag ndcatng that the data of node s successfully receved at the ntended destnaton k ( or ). It follows that: T,k = Pr{r k =1 t k =1}Pr{t k =1}. (1) Note that the transmsson from the powerful / to the MA can be made at hgh-power and hgh-rate. Also, wth the actve network deployment performed by the MA, the data from each sensor to ts CH can be transmtted over a sngle hop usng a collson-free MAC protocol. Thus, we focus on data transmsson from the CH of the orgnatng node to ts correspondng /. In the followng, we analyze T,k from the nformaton theory perspectve, by dscussng the relatonshp between T,k and the mutual nformaton between the packet transmtted from CH and the packet receved at snk k. For each slot, defne X k as the transmtted packet from CH to snk k, where X k = 0 means that node s not transmttng. Let Xk be the non-zero packets of X k, then X k = t k X k [8]. Assumng that snk k receves packets from multple nodes. Defne Y k as the receved vector at snk k, where the th element n Y k s the receved packet from CH. Let r k be the vector whose th element s r k. It has been shown n [8] that the mutual nformaton between X k and Y k can be wrtten as a functon of the throughput of CH to snk k (T,k ) as follows: I(X k, Y k )=I(t k, r k )+H( X k )T,k, (2) where I(x, y) s the mutual nformaton between x and y, and H(x) s the entropy of x. Let I k p = I(X k, Yk )/H( X k), whch s measured n number of packets per slot. In general, T,k apple I k p. Note that t k s bnary,.e., H(t k ) apple 1, whch mples that I(t k, rk ) apple H(t k ) apple 1. As a result, f the packet length gets large,.e., H( X k)!1, then we have T,k ' I k p. From the nformaton theory perceptve, ths shows that: T,k s the average normalzed nformaton (measured n packets per slot) passed through the channel between CH and snk k. C. Multhop Sngle Path Routng Case Consder that CH requres N k hops to reach snk k. N k s based on the network archtecture, topology, and routng scheme. Let the deal or shortest path from CH to snk k be N k! N k 1!... 1! 0, where N k s the source CH and 0 s the snk k. Let t k,h be a bnary flag at hop h, ndcatng that CH h s scheduled to relay a packet of CH 4816

4 to CH h 1 along the route to snk k. Also, let r,h k be a bnary flag ndcatng that the data of CH s successfully receved at CH h 1 along the same route to snk k. It follows that, at each partcular tme slot, we have: Pr{r k,h =1} = Pr{r k,h =1 t k,h =1}Pr{t k,h =1}. (3) Consder that a packet of CH s receved at snk k n slot. Ths mples that there exsts a schedulng slot vector =[ N k 1,..., 1, ], such that all nodes along the routng path from to the snk successfully transmt the packet of node. More specfcally, node h s scheduled to transmt n slot h 1, where x > y, 8x > y and 0 =0. Along slot vector, defne the transmsson flag of CH as t k ( ), such that tk ( ) =[1,..,1] when CH transmts a packet to snk k and the transmsson at the last hop (at CH 1 ) occurs n slot. Note that f the relay at the last hop along the transmsson path from to the snk transmts the packet of node, then t mples that all ntermedate hops were scheduled to transmt n pror slots. That s, we have Pr{t k ( ) =1} = Pr{t k,1( ) =1,...,t k,n k ( N k 1 )=1}. (4) Omt the slot ndex, (4) can be smplfed as: Pr{t k =1} = Pr{t k,1 =1,...,tk =1}.,N k For the throughput calculaton here, we do not consder retransmssons of packets. Assumng that there exsts a schedule such that the source CH and all ts ntermedate relays are assgned tme slots to transmt/forward the source s data, and assumng that the transmssons n all slots are..d, then we can drop the slot ndex from the throughput expresson. In the case when the amplfy-and-forward protocol s adopted n the relayng process, whch mples that r,h k s are ndependent at dfferent hops, t follows from (1) and (3) that: N k Y T,k = Pr{t k =1} Pr{r,h k =1 t k,h =1}. (5) h=1 The probablty of transmsson Pr(t k = 1), depends on the schedulng scheme adopted n the network. When TDMA protocol s used, each node connected to snk k can transmt wth a probablty Pr(t k 1 = 1) N ntf n k, where n k s the number of CHs connected to snk k and N ntf as the mnmum separaton between lnks for bandwdth reuse. That s, when a transmsson s made by a CH, other nodes wthn a dstance of N ntf R c from the transmttng CH should reman slent or use another orthogonal channel. The probablty of successful recepton, under normal network condtons, can be vewed as a condton on the receved sgnal to nterference and nose rato SINR. Assume the SINR threshold for successful recepton s, then we have Pr{r,h k = 1 tk,h = 1} = Pr{SINR h, h 1 > }, 8, h. In structured networks, the assgnment of channels and tme slots can be managed to mnmze the nterference; hence the nterference term becomes neglgble, and we can wrte SINR,j = L,j P N o, where L,j s the dstance between nodes and j, s the path loss exponent, P s the transmtted power, and N o s the nose power. Assumng that the power s exponentally dstrbuted wth mean P for all nodes, then by lettng,h = N o Lh, h 1 we have Pr{SINR h, h 1 > } = Pr{P h >,h } = exp. (6) No P Lh, h From the dscusson above, we get the followng result: Theorem 1: In a multhop MC-WSN network, assumng exponentally dstrbuted transmt powers, the throughput of CH along a predefned sngle routng path to snk k s: 8 9 < N k T,k = Pr{t k =1} exp : apple X = Lh, h 1 ;, (7) h=1 where N k s the number of hops n CH s transmsson, Pr{t k =1} s the probablty that CH and all ts ntermedate relayng nodes are scheduled to transmt the data of CH to snk k, s the path loss exponent of the channel, L x,y s the dstance between nodes x and y, and apple = No P. Remark 1: It can be seen from Theorem 1 that f the hops are equdstant, the throughput wll decrease as the number of hops ncreases. More specfcally, when L h 1, h = L, 8h 2{1, 2,..,N k}, we get T,k / exp{ N k }. It follows that lm N k!1 T,k =0. Ths result justfes our motvaton of lmtng the number of hops n the topology desgn and the and s deployment. D. Multhop Multpath Routng Case In the prevous subsecton, we consdered the case when there s a sngle pre-defned path between a CH and a snk. Note that, n general, the transmsson can go through multpaths due to the exstence of network dversty. Multpath routng would also ncrease the securty strength aganst malcous routng attacks as wll be llustrated n Secton IV. In ths secton, we formulate the throughput for the multpath case. Theorem 2: Let N be the maxmum number of hops from a CH to a snk along any routng path, and N k (p) apple N s the number of hops from CH to snk k along path p. Consder that for each hop number l 2 {1, 2,...,N}, there are P,l possble l-hop paths from CH to the snk(s). Let T ( N k(p) = l, P k = p) be the throughput that can be acheved along one of the l-hop paths from source to snk k assumng the path P k = p. Hence, the throughput of node to snk k can be calculated as: P NX X,l T,k = T ( N k (p) =l, P k = p)pr{p k = p, N k (p) =l} l=1 p=1 Here, l-hop path means a path that conssts of l hops. It s noted that T ( N k = l, P k = p) can be obtaned from Theorem 1 by substtutng N k = l, whch s the number of hops along the partcular path P k = p. The term Pr{P k = p N k = l} depends on the routng protocol. It should be emphaszed that when multple routes are enabled, 1 (8) 4817

5 the utlzed schedulng protocol, and hence P (t k = 1), could be dfferent than that n the sngle routng path case. E. Total Network Throughput The network throughput,, s defned as the average number of packets receved successfully from all clusters per unt tme. Let N k be the set of CHs that transmt to snk k. Followng Theorems 1 and 2, the total throughput of the proposed MC- WSN archtecture wth K s and a can be obtaned as: KX X = = = T,k k=0 2N k KX X k=0 2N k l=1 p=1 KX X k=0 2N k l=1 p=1 P NX X,l T ( N k = l, P k = p) Pr{P k = p N k = l} Pr{N k = l} P NX X,l ( lx h ) p k (p)exp apple L k h, k h 1(p) h=1 Pr{P k = p N k = l} Pr{N k = l}, (9) where n k s the number of nodes connected to snk k, L k h, (p) s the length between CHs k k h 1 h and k h 1 along path p, and p k (p) s the transmsson probablty of CH along path p to snk k. IV. ROUTING SECURITY FOR MC-WSN A. Secure Routng Path Selecton In a multhop routng scheme, a compromsed node along any routng path can launch routng attack by droppng packets or modfyng ther contents as they are beng forwarded to a snk. Routng attacks could not be completely resolved through cryptographc approaches solely. To combat ths type of routng attack, we propose to use multpath dversty n combnaton wth ntegrty check. More specfcally, we propose the followng: Each node establshes multple, preferably dsjont, routes to snk(s). Every packet s transmtted on a randomly selected route. Recall that the probablty that node selects path p to snk k s Pr{P k = p N k (p) =l}, where N k (p) s the correspondng number of hops along the path. Note that the number of hops n any path should be lmted to a pre-specfed number to mprove the network throughput performance as llustrated n the prevous secton. Each transmtted packet has a sequence number, whch s ncluded n the packet header. To ensures that packets have not been modfed by malcous nodes along the routng paths, data ntegrty s checked through a cryptographc keyed Hash functon. Assume that each source shares a secret key wth the snk(s) t communcates wth. A Hash functon uses the shared key to produces a fxed sze fngerprnt for each packet. The keyed Hash functon enables the snk to mmedately verfy data ntegrty. Along wth the sequence number check, the snk can adjust the routng probabltes (Pr{P k = p N k (p) =l}) accordngly, then notfy the correspondng source. More specfcally, we have the followng: () If n p packets receved through routng path p are erroneous (checked through the Hash functon) then Pr{P k = p N k(p) =l} decreases by l. If over multple observaton perods n p or more packets are receved through path p wth no errors, then ths path s consdered relable and Pr{P k = p N k(p) =l} ncreases by h. l and h are the decrement and ncrement step szes, respectvely, and they should be tuned along wth n p to take nto account errors resultng from possble poor envronmental condtons. The tunng of l and h s subject to the constrant that the sum of probablty over all possble paths always equals to 1. After suffcent observatons, only the relable routes wll be chosen for data delvery. Note that h could depend on the number of hops along the path. For example, f two paths have shown to be equally relable, hgher h can be used for the path wth lower number of hops. That s, gven that paths p 1 and p 2 are equally relable, f l 1 <l 2, then choose h1 and h2 such that: Pr{P k1 = p 1 N k1 (p 1 )=l 1 } > Pr{P k2 = p 2 N k2 (p 2 ) = l 2 }. That s, we choose the shortest path for throughput maxmzaton. We would analyze the selecton of optmal l and h from an nformaton theoretc perspectve n future work. () Smlarly, through sequence number check, a packet drop along any of the paths can be detected. The snk consequently decreases the probablty that the source transmts over the correspondng path. The sequence number check can be verfed at the MA, then notfed to the ndvdual snks (/). B. Dscussons on Throughput In ths subsecton, we dscuss the effect of routng attacks on the throughput, then show that the proposed secure routng selecton approach can lead to an mproved performance under malcous attacks. We start wth a sngle routng path case, where CH establshes a sngle path to ts (nearest) snk k,.e., P,l =1. Note that a routng path s sad to be compromsed f one or more nodes along ths path s compromsed. Let an ntermedate node at hop level h be compromsed to drop or manpulate packets that are beng relayed through t. Therefore, the probablty of successful recepton Pr{r,h k =1} =0, and thus, by referrng to (5), the overall throughput of node wll be zero. On the other hand, snce packets routed along a compromsed path wll not reach the snk, then ths means that the average delay per packet s nfnte. In other words, wthout routng dversty, routng attacks can lead to a zero throughput and nfnte delay. Let the number of compromsed paths between node and the snk(s) be P c; hence, there are P b = P,l P c paths 4818

6 that do not nvolve any compromsed nodes. Followng the proposed approach for routng securty, f there s at least one path between a CH and a snk has no compromsed nodes,.e., P b 1, then a non-zero throughput can be guaranteed for the node. Let S b be the set of non-compromsed paths, and Sc be the set of compromsed paths. Therefore, we have: T = X NX X T ( N k (p) =l, Pk = p) k l=1 = X k p2s b,sc Pr{P k = p, N k (p) =l}. NX X T ( N k (p) =l, Pk = p)pr{pk = p, N k (p) =l}. l=1 p2s b (10) From the equaton above, t s clear that to ncrease the throughput, packets should be transmtted through relable paths only by choosng Pr{P k = p N k(p) =l} =08p 2 Sc. Note that Pr{P k = p N k (p) = l} can be regarded as the weght of choosng path p. Therefore, to maxmze the throughput, we need P p2s Pr{P k b = p N k (p) =l} =1. Through the keyed hash functon and sequence number check, the unrelable paths can be detected and the snk updates Pr{P k = p, N k (p) = l} by lowerng the probabltes that P a compromsed path s selected. Eventually, we get: p2s Pr{P k b = p N k (p) = l} = 1, whch mproves the throughput as can be seen n (10). V. SIMULATION RESULT In ths secton, we llustrate the effect of the number of hops and the malcous attacks on the throughput. Three cases are consdered: shortest path routng n the absence of malcous attacks, multpath routng under malcous attacks wth and wthout the secure routng path selecton approach. Assume three paths (p 1,p 2,p 3 ) are avalable, wth number of hops N m, N m +1, N m +2, respectvely, and path p 2 s compromsed. The throughput versus the number of hops N m s plotted n Fgure 3. Wthout the secure route selecton scheme, all paths are selected wth equal probablty. When routng path selecton s utlzed, data s transmtted on the un-compromsed paths p 1 and p 2, wth hgher probablty for the shorter path p 1. Here, Pr{p 1,N m } = 0.8 and Pr{p 3,N m +2} = 0.2. It can be seen that usng secure routng path selecton, the throughput performance under malcous attack s sgnfcantly mproved compared to the case when routng path selecton approach s not adopted. It s also clear that the throughput decreases as the number of hops ncreases. Ths echoes our theoretcal analyss. VI. CONCLUSIONS In ths paper, we analyzed the throughput of the MC- WSN archtecture under sngle path and multpath routng. The obtaned throughput expressons revealed the mpact of the number of hops on the attaned throughput performance, and llustrated the trade-off between throughput effcency and securty strength. It was concluded that the shortest path Throughput 4.5 x No malcous attacks, shortest path routng Under malcous attack, multpath, wthout routng path selecton Under malcous attack, multpath, wth routng path selecton Mnmum number of hops (N m ) Fg. 3. Throughput versus number of hops. Here, SINR = R c P =8dB, N o =5dB, Pr(t k =1)=0.02. routng mproves the throughput. However, under routng attacks, shortest path routng cannot be optmal f compromsed. To combat routng attacks, we presented a secure routng path selecton approach, and showed that t can mprove the network throughput performance. ACKNOWLEDGEMENT Ths research s partally supported by NSF under awards ECCS , CNS and CNS REFERENCES [1] P. Gupta and P. Kumar, The capacty of wreless networks, IEEE Transactons on Informaton Theory, vol. 46, no. 2, pp , Mar [2] E. J. Duarte-Melo and M. Lu, Data-gatherng wreless sensor networks: organzaton and capacty, Computer Networks, vol. 43, no. 4, pp , 2003, wreless Sensor Networks. [Onlne]. Avalable: [3] M. Grossglauser and D. Tse, Moblty ncreases the capacty of ad hoc wreless networks, IEEE/ACM Transactons on Networkng, vol. 10, no. 4, pp , Aug [4] G. Mergen, Z. Qng, and L. Tong, Sensor networks wth moble access: Energy and capacty consderatons, IEEE Transactons on Communcatons, vol. 54, no. 11, pp , Nov [5] I. Maza, F. Caballero, J. Captan, J. Martnez-de Dos, and A. Ollero, A dstrbuted archtecture for a robotc platform wth aeral sensor transportaton and self-deployment capabltes, Journal of Feld Robotcs, vol. 28, no. 3, pp , [Onlne]. Avalable: [6] M. Abdelhakm, J. Ren, J. Ren, and T. L, Moble access coordnated wreless sensor networks topology desgn and throughput analyss, IEEE Global Communcatons Conference, GLOBECOM 13, [7] C. Karlof and D. Wagner, Secure routng n wreless sensor networks: attacks and countermeasures, IEEE Internatonal Workshop on Sensor Network Protocols and Applcatons, pp , May [8] J. Luo and A. Ephremdes, On the throughput, capacty, and stablty regons of random multple access, IEEE Transactons on Informaton Theory, vol. 52, no. 6, pp , Jun [9] G. Mergen and L. Tong, Maxmum asymptotc stable throughput of opportunstc slotted ALOHA and applcatons to CDMA networks, IEEE Transactons on Wreless Communcatons, vol. 6, no. 4, pp , Apr [10] H. Wu, C. Qao, S. De, and O. Tonguz, Integrated cellular and ad hoc relayng systems: CAR, IEEE Journal on Selected Areas n Communcatons,, vol. 19, no. 10, pp , [11] V. Naware, G. Mergen, and L. Tong, Stablty and delay of fnte-user slotted ALOHA wth multpacket recepton, Cornell Unversty, Ithaca, NY., Techncal Report, ACSP-TR ,

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network Self-Motvated Relay Selecton for a Generalzed Power Lne Montorng Network Jose Cordova and Xn Wang 1, Dong-Lang Xe 2, Le Zuo 3 1 Department of Electrcal and Computer Engneerng, State Unversty of New York

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Energy Efficient Multi Hop Clustering Protocol for Wireless Networks

Energy Efficient Multi Hop Clustering Protocol for Wireless Networks Internatonal Journal of Scentfc and Research Publcatons, Volume 2, Issue 6, June 2012 1 Energy Effcent Mult Hop Clusterng Protocol for Wreless Networks M.Shankar, G.JegaJoth, S. Karthgaven, M.Ganesan,

More information

Load Balanced Rendezvous Data Collection in Wireless Sensor Networks

Load Balanced Rendezvous Data Collection in Wireless Sensor Networks 2011 Eghth IEEE Internatonal Conference on Moble Ad-Hoc and ensor ystems Load Balanced endezvous Data Collecton n Wreless ensor Networks Luo Ma 1, Longfe hangguan 1, Chao Lang 1, Junzhao Du 1, Hu Lu 1,

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535 VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

On Multi-controller Placement Optimization in Software Defined Networking - based WANs

On Multi-controller Placement Optimization in Software Defined Networking - based WANs On Mult-controller Placement Optmzaton n Software Defned Networkng - based WANs Eugen Borcoc, Radu Badea, Serban Georgca Obreja, Marus Vochn Unversty POLITEHNICA of Bucharest - UPB Bucharest, Romana eugen.borcoc@elcom.pub.ro,

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information