Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks

Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks PDF Author: Faisal Al Mahrouqi
Publisher: LAP Lambert Academic Publishing
ISBN: 9783659490118
Category :
Languages : en
Pages : 68

Get Book Here

Book Description
This project investigates the relation between the energy as a performance measurement and the security level as well as the QoS routing and power consumption correlation when the security and routing protocols are applied. A mobile device has the drawback of battery sise limitation. The solution to the power limitation is to have the device components use power efficiently.. The elements related to the networks, such as the transceiver and CPU, consume high levels of power at the hardware level. On the other hand, applied software levels such as protocols and algorithms also consume large amounts of power. This project studies the security and routing protocols and finds that the protocols are different from each other in terms of power consumption based on the algorithms and techniques applied. The security protocols examined are Wired Equivalent Protocol, WiFi Protected Access, and Counter CBC-MAC Protocol, indicate that power consumption varies. Power saving also varied based on the investigation between the routing protocols, which were Power Aware Multi Access Protocol with Signalling, Minimum Total Transmission Power Routing and Min-Max Battery Cost Routing.

Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks

Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks PDF Author: Faisal Al Mahrouqi
Publisher: LAP Lambert Academic Publishing
ISBN: 9783659490118
Category :
Languages : en
Pages : 68

Get Book Here

Book Description
This project investigates the relation between the energy as a performance measurement and the security level as well as the QoS routing and power consumption correlation when the security and routing protocols are applied. A mobile device has the drawback of battery sise limitation. The solution to the power limitation is to have the device components use power efficiently.. The elements related to the networks, such as the transceiver and CPU, consume high levels of power at the hardware level. On the other hand, applied software levels such as protocols and algorithms also consume large amounts of power. This project studies the security and routing protocols and finds that the protocols are different from each other in terms of power consumption based on the algorithms and techniques applied. The security protocols examined are Wired Equivalent Protocol, WiFi Protected Access, and Counter CBC-MAC Protocol, indicate that power consumption varies. Power saving also varied based on the investigation between the routing protocols, which were Power Aware Multi Access Protocol with Signalling, Minimum Total Transmission Power Routing and Min-Max Battery Cost Routing.

Exploring Tradeoffs in Wireless Networks Under Flow-level Traffic

Exploring Tradeoffs in Wireless Networks Under Flow-level Traffic PDF Author: Hongseok Kim (Ph.D.)
Publisher:
ISBN:
Category :
Languages : en
Pages : 324

Get Book Here

Book Description
Wireless resources are scarce, shared and time-varying making resource allocation mechanisms, e.g., scheduling, a key and challenging element of wireless system design. In designing good schedulers, we consider three types of performance metrics: system capacity, quality of service (QoS) seen by users, and the energy expenditures (battery lifetimes) incurred by mobile terminals. In this dissertation we investigate the impact of scheduling policies on these performance metrics, their interactions, and/or tradeoffs, and we specifically focus on flow-level performance under stochastic traffic loads. In the first part of the dissertation we evaluate interactions among flow-level performance metrics when integrating QoS and best effort flows in a wireless system using opportunistic scheduling. We introduce a simple flow-level model capturing the salient features of bandwidth sharing for an opportunistic scheduler which ensures a mean throughput to each QoS stream on every time slot. We show that the integration of QoS and best effort flows results in a loss of opportunism, which in turn results in a reduction of the stability region, degradation in system capacity, and increased file transfer delay. In the second part of the dissertation we study several ways in which mobile terminals can backoff on their uplink transmit power (thus slow down their transmissions) in order to extend battery lifetimes. This is particularly effective when a wireless system is underloaded, so the degradation in the users' perceived performance can be negligible. The challenge, however, is developing a mechanism that achieves a good tradeoff among transmit power, idling/circuit power, and the performance customers will see. We consider systems with flow-level dynamics supporting either real-time or best effort (e.g., file transfers) sessions. We show that significant energy savings can be achieved by leveraging dynamic spare capacity. We then extend our study to the case where mobile terminals have multiple transmit antennas. In the third part of the dissertation we develop a framework for user association in infrastructure-based wireless networks, specifically focused on adaptively balancing flow loads given spatially inhomogeneous traffic distributions. Our work encompasses several possible user association objective functions resulting in rate-optimal, throughput-optimal, delay-optimal, and load-equalizing policy, which we collectively denote [alpha]-optimal user association. We prove that the optimal load vector that minimizes this function is the fixed point of a certain mapping. Based on this mapping we propose an iterative distributed user association policy and prove that it converges to the globally optimal decision in steady state. In addition we address admission control policies for the case where the system cannot be stabilized.

A Study of Cross Layer Tradeoffs in QoS and Security of Wireless Networks

A Study of Cross Layer Tradeoffs in QoS and Security of Wireless Networks PDF Author: Mohamed A. Haleem
Publisher:
ISBN:
Category : Wireless communication systems
Languages : en
Pages : 0

Get Book Here

Book Description


International Conference on Innovative Computing and Communications

International Conference on Innovative Computing and Communications PDF Author: Deepak Gupta
Publisher: Springer Nature
ISBN: 9811925356
Category : Technology & Engineering
Languages : en
Pages : 835

Get Book Here

Book Description
This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19–20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.

Wireless Sensor Networks

Wireless Sensor Networks PDF Author: Kazem Sohraby
Publisher: John Wiley & Sons
ISBN: 0470112751
Category : Technology & Engineering
Languages : en
Pages : 325

Get Book Here

Book Description
Infrastructure for Homeland Security Environments Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way towards a large plethora of new applications in such areas as infrastructure protection and security, healthcare, energy, food safety, RFID, ZigBee, and processing. Unlike other books on wireless sensor networks that focus on limited topics in the field, this book is a broad introduction that covers all the major technology, standards, and application topics. It contains everything readers need to know to enter this burgeoning field, including current applications and promising research and development; communication and networking protocols; middleware architecture for wireless sensor networks; and security and management. The straightforward and engaging writing style of this book makes even complex concepts and processes easy to follow and understand. In addition, it offers several features that help readers grasp the material and then apply their knowledge in designing their own wireless sensor network systems: * Examples illustrate how concepts are applied to the development and application of * wireless sensor networks * Detailed case studies set forth all the steps of design and implementation needed to solve real-world problems * Chapter conclusions that serve as an excellent review by stressing the chapter's key concepts * References in each chapter guide readers to in-depth discussions of individual topics This book is ideal for networking designers and engineers who want to fully exploit this new technology and for government employees who are concerned about homeland security. With its examples, it is appropriate for use as a coursebook for upper-level undergraduates and graduate students.

Energy-Aware Routing and QoS-Guaranteed Scheduling in Mobile Wireless Networks

Energy-Aware Routing and QoS-Guaranteed Scheduling in Mobile Wireless Networks PDF Author: 李振維
Publisher:
ISBN:
Category :
Languages : en
Pages : 147

Get Book Here

Book Description


Efficient routing protocols with dependable QOS parameters for Wireless Sensor Networks

Efficient routing protocols with dependable QOS parameters for Wireless Sensor Networks PDF Author: Dr.D.Usha
Publisher: SK Research Group of Companies
ISBN: 9391077943
Category : Technology & Engineering
Languages : en
Pages : 106

Get Book Here

Book Description
Dr.D.Usha, Assistant Professor, Department of Computer Science, Mother Teresa Womens University, Kodaikanal, Tamil Nadu, India

Security Issues for Wireless Sensor Networks

Security Issues for Wireless Sensor Networks PDF Author: Parag Verma
Publisher: CRC Press
ISBN: 1000544761
Category : Computers
Languages : en
Pages : 271

Get Book Here

Book Description
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task. This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.

Multimedia-enabled Sensors in IoT

Multimedia-enabled Sensors in IoT PDF Author: Fadi Al-Turjman
Publisher: CRC Press
ISBN: 1351166034
Category : Computers
Languages : en
Pages : 315

Get Book Here

Book Description
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.

Guide to Wireless Sensor Networks

Guide to Wireless Sensor Networks PDF Author: Sudip Misra
Publisher: Springer Science & Business Media
ISBN: 1848822189
Category : Computers
Languages : en
Pages : 725

Get Book Here

Book Description
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.