Efficient multi-UAV Relay Nodes Placement Scheme in Wireless Networks

Author(s):  
Hassen Redwan Hussen ◽  
Sung-Chan Choi ◽  
Jong-Hong Park ◽  
Il-Yeop Ahn
2011 ◽  
Vol 55-57 ◽  
pp. 555-560
Author(s):  
Xin Yan ◽  
Jia Gen Du

Topology clustering, constructing overlay graphs, adding relay nodes, or creating a “small-world” network by building some shortcuts etc, topology control schemes are able to achieve the scalability, resilience, and fault-tolerance for wireless communication networks. In this article, we take a different approach to reach such aim for heterogeneous integrated wireless networks by generating a topology such that the resulting network is “scale-free”. Thereby we propose a topology control algorithm based on the “scale-free” complex network concept and directed proximity graph theory for integrated wireless networks with non-uniform transmission ranges. In this algorithm, the topology is also generated by new nodes’ growth and preferential attachment procedure, but where each new node connects to the existing nodes in its directed attachable proximity in terms of certain probability at each time step. Each node’s directed attachable proximity graph is generated from its directed reachable proximity graph that is built by regulating its transmission power based on locally collected information. The simulation experiments are provided to validate our claims.


2015 ◽  
Vol 9 (2) ◽  
pp. 31-59
Author(s):  
Weidong Yang ◽  
Liming Sun ◽  
Zhenqiang Xu

The wireless information-theoretic security from inter-session interference has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However, the authentication error always exists in the node authentication process in Two-Hop wireless networks. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.


Sign in / Sign up

Export Citation Format

Share Document