[Show abstract][Hide abstract] ABSTRACT: We study the maximization of throughput and energy utilization in noisy wireless channels by adjusting packet length adaptively to network instant statistics. The optimal packet length adaptation (PLA) for throughput and energy utilization in wireless networks with and without re-transmission is respectively derived and developed. As more noises introducing more energy consumptions, the noises are equivalently regarded as lengthening of transmission distances. Therefore, an equivalent distance model of noisy channels is developed for more accurate estimation of the dissipated proportion in the residual energy such that further improvement of energy utilization and throughput is obtained. We integrate the PLA with the energy-proportional routing (EPR) algorithm for best balance of energy load. Therefore, performance metrics such as lifetime extension, throughput, and energy utilization are maximized even the distribution of channel noise is so un-predictable. Since the equivalent distance is dynamic, we believe that it is useful for network topology re-organization and will be useful in the future work of mobile ad-hoc networks.
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings; 01/2006
[Show abstract][Hide abstract] ABSTRACT: Service-oriented device anycasting using quality first search (DA-QFS) approach is proposed to coordinate various portable
devices for providing wireless personal area network (WPAN) services. We adopt a cross-layer design standing on not only the
lower (network and data link) layer’s point of view but also higher (application) layer’s point of view to provide quality
WPAN services. In DA-QFS the service profile (SP) of a WPAN service is well-represented by the proposed characterized task
graph (CTG). The proposed weighted device anycasting (WDA) process then takes connectivity, implicit distance, work degree,
and mobility as the criteria to select the most quality device according to the information embedded in CTG. The simulation
results on energy consumption, packet loss rate, average delay, and re-start time show that DA-QFS is an efficient approach,
especially in the environment with highly mobile devices and multiple users.
Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings; 01/2006
[Show abstract][Hide abstract] ABSTRACT: In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads (CHs) and member nodes according to their importance. When monitoring CHs, member nodes of a CH take turns to monitor this CH. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, CHs have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using CHs to monitor member nodes instead of using all the member nodes to monitor each other. Finally, simulations are performed and compared with LEACH, based on an ns2 LEACH CAD tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attack.
Wireless Communications and Networking Conference, 2005 IEEE; 04/2005