27,001 Hits in 3.6 sec

Wireless networks with symmetric demands

Sudeep Kamath, Sreeram Kannan, Pramod Viswanath
2012 2012 IEEE International Symposium on Information Theory Proceedings  
In this paper, we show that the approximate optimality continues to hold even for wireless networks modeled as directed graphs as long as there is a symmetric demand constraint: every demand from source  ...  It has been shown recently that a simple layering principle -local physical-layer schemes combined with global routing -can achieve approximately optimal performance in wireless networks.  ...  Directed Graph with Symmetric Demands We review the directed wireline network problem with symmetric demands.  ... 
doi:10.1109/isit.2012.6283993 dblp:conf/isit/KamathKV12 fatcat:afjeh2vg4vdfte2oh3b6sunoyi

Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey

Heena Dogra, Jyoti Kohli
2016 Indian Journal of Science and Technology  
Method: The ongoing developments of the wireless sensor networks and its applications demands for the efficient and secure communication.  ...  Improvement: This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.  ...  node connectivity is sometimes fixed service or is on demand service to provide such services and demands needs in a network at any time availability parameter in a network is used. • Quality of Service  ... 
doi:10.17485/ijst/2015/v8i1/106883 fatcat:7fqcjplssngptlhmy5ttdhobfm

Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions

Daniel Costa, Solenir Figuerêdo, Gledson Oliveira
2017 Cryptography  
Wireless multimedia sensor networks will play a central role in the Internet of Things world, providing content-rich information for an uncountable number of monitoring and control scenarios.  ...  In this context, this article presents the state-of-the-art of cryptography in wireless multimedia sensor networks, surveying innovative works in this area and discussing promising research directions.  ...  Security Defenses The numerous security threats in wireless sensor networks have demanded the use of defense mechanisms.  ... 
doi:10.3390/cryptography1010004 fatcat:diu2u5rq25dzlg4nqo5cwulgnq

When Network Effect Meets Congestion Effect

Xiaowen Gong, Lingjie Duan, Xu Chen
2015 Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc '15  
This boosts the demand for wireless services yet may challenge the limited wireless capacity.  ...  The recent development of social services tightens wireless users' social relationships and encourages them to generate more data traffic under network effect.  ...  The symmetric setting of social networks is of great interests.  ... 
doi:10.1145/2746285.2746315 dblp:conf/mobihoc/GongDC15 fatcat:o4337znturg7jfrczjrq7vqyli

Energy Saving in Fixed Wireless Broadband Networks [chapter]

David Coudert, Napoleão Nepomuceno, Issam Tahiri
2011 Lecture Notes in Computer Science  
In this paper, we present a mathematical formulation for saving energy in fixed broadband wireless networks by selectively turning off idle communication devices in low-demand scenarios.  ...  This problem relies on a fixed-charge capacitated network design (FCCND), which is very hard to optimize. We then propose heuristic algorithms to produce feasible solutions in a short time.  ...  We assume that H is symmetric since in the type of studied networks, radio links are usually symmetric.  ... 
doi:10.1007/978-3-642-21527-8_53 fatcat:foyiv5ulsbda3komnynr7aurtm

Safe Data Transfer Using Logic Gate Based Cryptographic Technique in Wireless Sensor Network

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Applications of wireless sensor networks demands for the well-organized and secure communication.  ...  Wireless Sensor Networks consist of independent sensor nodes attached to one base station.  ...  INTRODUCTION Wireless Sensor Networks (WSNs) The WSN is a wide network of wireless sensor nodes which sense the data from external sources.  ... 
doi:10.30534/ijatcse/2021/351042021 fatcat:j5c3ao7rxjhsvixsw4exqjwrfi

Securing DSR with mobile agents in wireless ad hoc networks

Ahmed Abosamra, Mohamed Hashem, Gamal Darwish
2011 Egyptian Informatics Journal  
Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure.  ...  Dynamic Source Routing (DSR) protocol is a popular routing protocol designed for use in wireless ad hoc networks.  ...  Introduction Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure while having the capability of delivering packets through routes  ... 
doi:10.1016/j.eij.2011.02.003 fatcat:5dg4z26pkbeshe4xc6t7zhff5u

Topological Interference Management Through Index Coding

Syed Ali Jafar
2014 IEEE Transactions on Information Theory  
This work studies linear interference networks, both wired and wireless, with no channel state information at the transmitters (CSIT) except a coarse knowledge of the end-to-end one-hop topology of the  ...  An interference alignment perspective is then used to translate the existing index coding solutions into the wired network capacity and wireless network DoF solutions, as well as to find new and unified  ...  Wired Networks with Linear Network Coding The preceding observations are not restricted to wireless networks.  ... 
doi:10.1109/tit.2013.2285151 fatcat:nkj6paddh5ayxnzhnko2haxjse

Smartphone data usage: downlink and uplink asymmetry

Bowei Yang, Siyi Wang, Yanliang Jin, Weisi Guo
2016 Electronics Letters  
The current data demand over 2G networks remains largely symmetric with strong temporal variations, whereas the demand over 3G networks is asymmetric with surprisingly weak temporal variations is shown  ...  This Letter analyses 2.1 million smartphone usage data values and explore the current wireless downlink-uplink demand asymmetry for different time periods and across different radio access networks.  ...  The vast majority of the data demand records are displaying a reasonably symmetric behaviour in both downloading and uploading content, with 97% of demands below the asymmetric levels of video (ζ = 8 −  ... 
doi:10.1049/el.2015.3249 fatcat:ywnvqina7jbcrahdct2wmoziiu

Research on backbone node deployment for Wireless Mesh Networks in dynamic environments

Meiyi Li, Shengling Cao
2017 Journal of Physics, Conference Series  
Wireless Mesh Network is a type of wireless networks in which demands of bandwidth for users has mobility.  ...  MG is a special kind of MR, it not only has the function of MR in wireless Mesh network, also assume the connection task with Internet by wired connection.  ...  Definitions and Variables It is assumed that the wireless network communication is reliable, and the communication between nodes does not interfere with each other, then set the following variables. c  ... 
doi:10.1088/1742-6596/887/1/012035 fatcat:32ffqegtbvdmhatfus5t6sryku

Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks

Sumathy S, Upendra Kumar B
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
The nodes are organized in spanning tree fashion, as they avoid forming cycles and exchange of key occurs only with authenticated neighbors in ad hoc networks, where nodes join or leave the network dynamically  ...  The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks.  ...  The main advantage of ad hoc network is its economically less demanding deployment.  ... 
doi:10.5121/jgraphhoc.2010.2102 fatcat:36xuwegfkzbdtnrm3itill2avq

A Clean Slate Approach to Secure Wireless Networking

Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar
2015 Foundations and Trends® in Networking  
routing protocols with symmetric encryption [4] [16] [43] , and secure routing protocols with symmetric encryption for limited topologies such as between nodes and a base station [32] , or between  ...  In this monograph, we confront the challenge of designing protocols for wireless ad-hoc networks infiltrated with adversarial nodes.  ... 
doi:10.1561/1300000037 fatcat:sgv7uboe4zb2xmqmqiw4gtarfq

Understanding the Impact of Neighborhood Information on End-to-End Fairness in Multi-Hop Wireless Networks

Jia Bai, Yuan Xue
2011 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)  
Index Terms-End-to-end fairness, price-based resource allocation, multi-hop wireless network  ...  Fair resource allocation for end-to-end flows is an important yet challenging problem in multi-hop wireless networks.  ...  INTRODUCTION A multi-hop wireless network consists of a collection of wireless nodes without a fixed infrastructure.  ... 
doi:10.1109/icccn.2011.6005888 dblp:conf/icccn/BaiX11 fatcat:lfc5rfw44bft7oahtdcsreubdq

A Survey of Image Security in Wireless Sensor Networks

Danilo Gonçalves, Daniel Costa
2015 Journal of Imaging  
Most traditional security mechanisms for popular networks, like the Internet, are not suitable for wireless sensor networks, demanding proper investigation in this area.  ...  Wireless sensor networks are increasingly gaining attention. In recent years, a great deal of monitoring, control and tracking applications have been designed for different scenarios.  ...  Actually, authenticity will be a central concern, since there will be a demand for trustworthy wireless visual sensor networks.  ... 
doi:10.3390/jimaging1010004 fatcat:bpjvbfew7fco5kt5diberowvde

Multiple Prime Expansion Channel Hopping for Blind Rendezvous in a Wireless Sensor Network

Zhou Zhixin, Yanjun Deng, Zhang Xiaohong, Zhang Xianfei, Hu Liqin, Zhao Zhidong, Liqin Shi
2022 Wireless Communications and Mobile Computing  
In this context, blind rendezvous is the process of selecting a common available channel and establishing a communication link for wireless devices in a wireless sensor network.  ...  In a final simulation study, we compare the performance of the MPE with other existing algorithms in an asymmetric and heterogeneous scenario.  ...  greatly enhanced the demand for the number of wireless devices in WSN and hence wireless spectrum. is has led to a dramatic increase in demand for wireless spectra and so this has become a scarce resource  ... 
doi:10.1155/2022/7061573 fatcat:7wgtb56deffjdbve32cxjtaleu
« Previous Showing results 1 — 15 out of 27,001 results