Cross-layer geodiverse protocol stack for resilient multipath transport and routing using OpenFlow

Author(s):  
Yufei Cheng ◽  
Truc Anh N. Nguyen ◽  
Md. Moshfequr Rahman ◽  
Siddharth Gangadhar ◽  
James P.G. Sterbenz
2017 ◽  
Vol 24 (3) ◽  
pp. 8-9
Author(s):  
Abderrahim Benslimane ◽  
Hassnaa Moustafa ◽  
Ying-Dar Lin ◽  
Milena Radenkovic

Author(s):  
Sara Hebal ◽  
Lemia Louail ◽  
Saad Harous

Protocols for wireless sensor networks are generally designed following the layered protocol stack where layers are independent. Uncorrelated decisions coming from different layers may affect certain metrics such as the latency of communications, the energy consumption, etc. Cross-layer approaches overcome this problem by exploiting the dependencies between the layers. In this article, the authors propose latency and energy mac-aware routing for wireless sensor networks (LEMAR-WSN), a new cross-layer routing approach using information of the TDMA schedule and exploiting the information of the energy consumed by each node in order to optimize the latency of communications and the energy consumption when relaying information to the sink in a wireless sensor network. Simulation results show that the proposed approach improves the average latency of communications up to 20% and the average.


2017 ◽  
Vol 92 ◽  
pp. 3-19 ◽  
Author(s):  
Sarang C. Dhongdi ◽  
Pritish Nahar ◽  
Rishabh Sethunathan ◽  
Lucy J. Gudino ◽  
K.R. Anupama

2014 ◽  
Vol 11 (1) ◽  
pp. 1-30 ◽  
Author(s):  
Heikki Karvonen ◽  
Carlos Pomalaza-Ráez ◽  
Matti Hämäläinen

Cross-layer planes design is relatively new security approach for future technological era in which different parameters are analyzed across protocols stack, so that the internet connected exchange their information with utmost security. The traditional existing approaches operates at single layer security and across few cross layers on TCP/IP model. Hence intruder can monitor loop holes on victim nodes in Wireless Sensor Network (WSN), which is serious issue for sensitive data. For example, Intrusion Detection System (IDS) operates on network layer and identifies routing attacks, but it does not react to physical layer, MAC layer and transport layers anomalies. Cross-layer design among few layers can monitor and detect some intrusions but this consumes more energy at node and node will become inactive early in the network. Hence, in this article, we are proposing Cross-layer Planes Framework for Detecting Malicious Activities (CPFDMA) at different layers is proposed to secure the WSN as viable security framework is based on the Cross-layer planes which interact attributes in different layers of the protocol stack and monitor & analyze anomaly patterns, notifying them to avoid their malicious activities from the network


1970 ◽  
Vol 108 (2) ◽  
pp. 39-42
Author(s):  
Z. Velickovic ◽  
M. Jevtovic

In order to satisfy QoS demands of wireless multimedia application it is necessary to make an optimization on several ISO-OSI layers in the protocol stack. In this paper an optimization cross-layer algorithm has been applied based on Markov decision process (MDP). The wireless communication system with one user has been optimized by the transmitting policies in order to maximize the throughput along with the optimization of the average value of the engaged power, satisfying the demanded BER and the average value of rejected packets. Simulation results show that the application of cross-layer design based on MDP is justified. Ill. 2, bibl. 9 (in English; abstracts in English and Lithuanian).http://dx.doi.org/10.5755/j01.eee.108.2.141


Ubiquity ◽  
2015 ◽  
Vol 2015 (December) ◽  
pp. 1-18 ◽  
Author(s):  
Bogdan Pavkovic ◽  
Marko Batic ◽  
Nikola Tomasevic
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document