Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays

Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays DOWNLOAD PROJECT SYNOPSIS It is well known that the data transport capacity of a wireless network can be increased by leveraging the spatial and frequency diversity of the wireless transmission medium. This has motivated the recent surge of research in cooperative and dynamic-spectrum-access (which we also refer to as cognitive spectrum access) networks. Still, as of today, a key open research challenge is to design distributed control strategies to dynamically jointly assign: 1) portions of the spectrum and 2)…

Read More

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing CSPR, a compressive-sensing based approach is proposed for path reconstruction in wireless sensor networks. By viewing the whole network as a path representation space, an arbitrary routing path can be represented by a path vector in the space. As path length is usually much smaller than the network size, such path vectors are sparse, i.e., the majority of elements are zeros. By encoding sparse path representation into packets, the path vector can be recovered from a small amount of packets…

Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based…

Read More

Real-time query scheduling for wireless sensor networks

Real-time query scheduling for wireless sensor networks Technology Implementation: JAVA Recent years have seen the emergence of wireless sensor network systems that must support high data rate and realtime queries of physical environments. This paper proposes Real-Time Query Scheduling (RTQS), a novel approach to conflict-free transmission scheduling for real-time queries in wireless sensor networks. First, we show that there is an inherent trade-off between prioritization and throughput in conflict-free query scheduling. We then present three new real-time scheduling algorithms. The non-preemptive query scheduling algorithm achieves high throughput while introducing priority…

Read More

A Decentralized Service Discovery Approach on Peer-to-Peer Network

A Decentralized Service Discovery Approach on Peer-to-Peer Network March 2013 Technology Used: Java Service-oriented computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable and robust service discovery mechanism. However, traditional service discovery methods using centralized registries can easily suffer from problems such as performance bottleneck and vulnerability to failures in large scalable service networks, thus functioning abnormally. To address these problems, this paper proposes a peer to- peer based decentralized service discovery approach named Chord4S. Chord4S…

Read More

Cross-domain privacy-preserving cooperative firewall optimization

Cross-domain privacy-preserving cooperative firewall optimization Technology Used: Java Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the packet based on its policy. Optimizing firewall policies is crucial for improving network performance. Prior work on firewall optimization focuses on either intra-firewall or inter-firewall optimization within one administrative domain where the privacy of firewall policies is not a concern. Inter-firewall optimization is considered across administrative domains for the first time. The key technical…

Read More

Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network

Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network Scheduling different types of packets, such as realtime and non-real-time data packets, at sensor nodes with resource constraints in Wireless Sensor Networks (WSN) is of vital importance to reduce sensors energy consumptions and end-to-end data transmission delays. Most of the existing packet-scheduling mechanisms of WSN use First Come First Served (FCFS), non-preemptive priority and preemptive priority scheduling algorithms. These algorithms incur a high processing overhead and long end-to-end data transmission delay due to the FCFS concept, starvation of high priority…

Read More