Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic...
详细信息
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm which supports data transmission by broadcasting. The algorithm is similar with the mechanism in NbIA algorithm (1,2) in neighbour discovery, but differs a lot in collision detection and slot allocation. Our algorithm can dynamically allocate slots according to the demand of nodes and ensures every node get at least one slot a cycle. Based on spatial reuse, idle slots might be found and be used as extra slots of nodes which can promote throughput of our algorithm. After the network converges, only a few nodes need to adjust their slots to adapt to topology changes, while most of the nodes maintain their slots to transmit data. The performance of our algorithm and NbIA algorithm are compared with OPNET simulation. The results show that our algorithm outperforms NbIA especially in convergence time and average throughput of nodes. (C) 2017 The Authors. Published by Elsevier B.V.
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic...
详细信息
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm which supports data transmission by broadcasting. The algorithm is similar with the mechanism in NbIA algorithm 1,2 in neighbour discovery, but differs a lot in collision detection and slot allocation. Our algorithm can dynamically allocate slots according to the demand of nodes and ensures every node get at least one slot a cycle. Based on spatial reuse, idle slots might be found and be used as extra slots of nodes which can promote throughput of our algorithm. After the network converges, only a few nodes need to adjust their slots to adapt to topology changes, while most of the nodes maintain their slots to transmit data. The performance of our algorithm and NbIA algorithm are compared with OPNET simulation. The results show that our algorithm outperforms NbIA especially in convergence time and average throughput of nodes.
Nanofluids hold great promise in improving transport processes in energy systems including hybrid fuel cells. In this present work, a mathematical model is developed for laminar free convection flow of Ag-water nano-a...
详细信息
Nanofluids hold great promise in improving transport processes in energy systems including hybrid fuel cells. In this present work, a mathematical model is developed for laminar free convection flow of Ag-water nano-additives in an enclosure in a porous medium with complex boundary conditions. Additionally, heat generation/absorption and viscous dissipation effects are included. Via appropriate scaling transformations, the conservation equations for mass, primary and secondary momentum, energy, and nanoparticle vorticity with wall boundary conditions are rendered dimensionless. A finite-difference computational scheme known as the marker and cell (mac) method, developed by Harlow and Welch, is occupied to solve the dimensionless, nonlinear coupled boundary value problem. A mesh independence study is included. The impact of parameters such as Eckert number (Ec), Darcy number (Da), Grashof number (Gr), Prandtl number (Pr), Reynolds number (Re), and Richardson number (Ri) are observed with physical framework. Graphical plots are presented for the impact of key control parameters on streamline contours, isotherm contours, and local Nusselt number. By heat sink (absorption), the Nusselt number is increased, whereas by heat generation it is reduced since there is a decrease in heat transferred to the boundary. The presence of viscous dissipation effects moves the streamlines toward the blue core and allows the temperature to increase in the neighborhood of the hot wall of the envelope. An increase in Richardson number induces a flip in vortex cell structures from an initially strong circulation cell on the left and weaker cell on the right, to the opposite distribution. Significant cooling is also induced in the core zone with an increasing Richardson number, and a decrease in vorticity is observed.
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X...
详细信息
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols-based on the Elliptic Curve Digital Signature algorithm (ECDSA)-are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (mac). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.
Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast pro...
详细信息
Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast processing, which are special properties for V2X. Most of the previous authentication protocols assume that a Certificate Authority (CA) is present within the communication range from all the vehicles, which is not practical for moving vehicles. We propose a light-weight security protocol for authentication and privacy protection for V2X. It employs two security hardware devices, Biometric Device (BD) and Tamper Proof Device (TPD), which verifies the driver and securely keeps the keys, respectively. It decentralizes the CA's tasks by locally generating pseudo-identity and private keys to preserve privacy and provide authentication in Vehicle-to-Vehicle (V2V) communication. In addition, we propose an authentication signature protocol using a notion of hash-chain key generation. We implemented the proposed key generation and authentication protocol using NS-3 simulator. Our extensive simulations demonstrated that the proposed authentication protocol significantly enhances the security level while protecting the conditional privacy of vehicles by utilizing anonymous identities. The proposed protocol has a 20% similar to 85% less communication overhead compared with the previous protocols.
The augment of heat transfer and intensity of fluid has wide range of application in science and engineering. The buoyancy-driven flow of Casson viscoelastic fluid in a square cavity in the presence of external magnet...
详细信息
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modify...
详细信息
ISBN:
(纸本)9781538632109
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modifying the mac algorithm and AES cryptography, the proposed network allows users to utilize the power efficiently, provide high level of security and can be applied to a variety of applications.
Wireless Sensor Networks (WSNs) have promising and valuable applications. More and more researchers have conducted research in this area. Because sensor nodes are small and cheap, they usually use battery to provide e...
详细信息
ISBN:
(纸本)9783319111971;9783319111964
Wireless Sensor Networks (WSNs) have promising and valuable applications. More and more researchers have conducted research in this area. Because sensor nodes are small and cheap, they usually use battery to provide energy. However, as a great number of nodes are arranged in the network and the working environment is bad, it is difficult to replace batteries or recharge. How to make full use of network resources to ensure the high quality of the network and achieve a balanced network is a problem to be faced. This paper focuses on improvement in wireless sensor networks by improving the mac protocol. mac protocols are basic protocols in WSNs and they influence the performance of network a lot. In those networks that need to track mobile targets, how to achieve the goal of increasing the monitor rate and balance the consumption of network are two very important objectives focused by modifying the mac protocols. In this paper, we proposed the IMMA to improve the efficiency of the network. The core of this algorithm is by changing the cycle of the state to balance the energy consumption, and increase the monitor rate. IMMA balances energy consumption and enhances the monitor rate of the moving targets. Theoretical and experimental results show that the algorithm improved network efficiency a lot.
since text in faxed document can be altered by malicious person who can get the faxed document directly from fax machine without permission from the real recipient, the method of text integrity verification for faxed ...
详细信息
ISBN:
(纸本)9781479905461;9781479905454
since text in faxed document can be altered by malicious person who can get the faxed document directly from fax machine without permission from the real recipient, the method of text integrity verification for faxed document is proposed to detect any modification of text content in the faxed document. To solve such problem, digital camera is first employed to capture the faxed document in order to obtain a faxed document image. However, there will be some RST (rotation, scaling and translation) distortions occurring in that captured image, which consequently affects the accuracy of text integrity verification, we thus propose pixel reorganizing technique to reduce such distortions. Text content in the faxed document image is then verified based on the use of mac algorithm in order to detect any altered text in the faxed document. The experimental results show the efficiency of our proposed method with various text font sizes in detecting altered text content in the faxed documents.
The study aims to report an algorithm based on co-ordinate transformation to compute complex flows. A two-dimensional computational code is developed using transformation of governing incompressible flow equations by ...
详细信息
The study aims to report an algorithm based on co-ordinate transformation to compute complex flows. A two-dimensional computational code is developed using transformation of governing incompressible flow equations by employing body-fitted co-ordinates. The complex flows may involve external flows past obstacles having curved surfaces or internal flows confined in curved domains. The transformed governing equations are discretized using mac algorithm. The code has been validated by comparing variation of Strouhal number with Reynolds number for flow past a circular cylinder.
暂无评论