Wireless Mesh Network

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 17730 Experts worldwide ranked by ideXlab platform

Nei Kato - One of the best experts on this subject based on the ideXlab platform.

  • on the partially overlapped channel assignment on Wireless Mesh Network backbone a game theoretic approach
    IEEE Journal on Selected Areas in Communications, 2012
    Co-Authors: Pedro B F Duarte, Zubair Md Fadlullah, Athanasios V Vasilakos, Nei Kato
    Abstract:

    The Wireless Mesh Network (WMN) has already been recognized as a promising broadband access Network technology from both academic and commercial perspective. In order to improve the performance of WMNs, extensive research efforts have been dedicated towards finding means to increase the number of simultaneous transmissions in the Network while avoiding signal interference among radios. In case of WMNs based on IEEE 802.11 b/g standards, most recent research works have relied upon the usage of orthogonal channels for solving the Channel Assignment (CA) problem. In this paper, we explore the possibility of exploiting Partially Overlapped Channels (POCs) by introducing a novel game theoretic distributed CA algorithm. Our proposed algorithm outperforms both the conventional orthogonal channel approach and the recent heuristic CA algorithms using POC. The proposed algorithm is shown to achieve near-optimal performance in the average case. In addition, the upper bound Price of Anarchy for Multi-Radio Multi-Channel (MRMC) Networks is derived to evaluate the effectiveness of the proposed approach.

  • partially overlapped channel assignment on Wireless Mesh Network backbone
    Global Communications Conference, 2010
    Co-Authors: Pedro B F Duarte, Zubair Md Fadlullah, Kazuo Hashimoto, Nei Kato
    Abstract:

    The Wireless Mesh Network (WMN) has already been recognized as a promising technology as broadband access Network from both academic and industry points of view. In order to improve its performance, research has been carried on how to increase the number of simultaneous transmissions in the Network while avoiding signal interference among radios. Considering WMNs based upon IEEE 802.11 b/g standards, lately most of researchers have been relying on the usage of orthogonal channels for solving the Channel Assignment (CA) problem. However, in this paper, we introduce a novel CA algorithm exploiting partially overlapped channels (POC) that overcome the common orthogonal channel approach and also a recent proposed CA algorithm using POC.

Tzi-cker Chiueh - One of the best experts on this subject based on the ideXlab platform.

  • Architecture and algorithms for an IEEE 802.11-based multi-channel Wireless Mesh Network
    Proceedings - IEEE INFOCOM, 2005
    Co-Authors: Ashish Raniwala, Tzi-cker Chiueh
    Abstract:

    Even though multiple non-overlapped channels exist in the 2.4 GHz and 5 GHz spectrum, most IEEE 802.11-based multi-hop ad hoc Networks today use only a single channel. As a result, these Networks rarely can fully exploit the aggregate bandwidth available in the radio spectrum provisioned by the standards. This prevents them from being used as an ISP's Wireless last-mile access Network or as a Wireless enterprise backbone Network. In this paper, we propose a multi-channel Wireless Mesh Network (WMN) architecture (called Hyacinth) that equips each Mesh Network node with multiple 802.11 Network interface cards (NICs). The central design issues of this multi-channel WMN architecture are channel assignment and routing. We show that intelligent channel assignment is critical to Hyacinth's performance, present distributed algorithms that utilize only local traffic load information to dynamically assign channels and to route packets, and compare their performance against a centralized algorithm that performs the same functions. Through an extensive simulation study, we show that even with just 2 NICs on each node, it is possible to improve the Network throughput by a factor of 6 to 7 when compared with the conventional single-channel ad hoc Network architecture. We also describe and evaluate a 9-node Hyacinth prototype that Is built using commodity PCs each equipped with two 802.11a NICs.

  • evaluation of a Wireless enterprise backbone Network architecture
    High Performance Interconnects, 2004
    Co-Authors: Ashish Raniwala, Tzi-cker Chiueh
    Abstract:

    IEEE 802.11 Wireless LAN technology is mainly used as an access Network within corporate enterprises. All the WLAN access points are eventually connected to a wired backbone to reach the Internet or enterprise computing resources. We aim to expand WLAN into an enterprise-scale backbone Network technology by developing a multichannel Wireless Mesh Network architecture called Hyacinth. Hyacinth equips each node with multiple IEEE 802.11a/b NICs and supports distributed channel assignment/routing to increase the overall Network throughput. We present the results of a detailed performance evaluation study on the multichannel Mesh Networking aspect of Hyacinth, based on both NS-2 simulations and empirical measurements collected from a 9-node Hyacinth prototype testbed. A key result of this study is that equipping each node of a Hyacinth Network with just 3 NICs can increase the total Network bandwidth by a factor of 6 to 7, as compared with single-channel Wireless Mesh Network architecture.

Pedro B F Duarte - One of the best experts on this subject based on the ideXlab platform.

  • on the partially overlapped channel assignment on Wireless Mesh Network backbone a game theoretic approach
    IEEE Journal on Selected Areas in Communications, 2012
    Co-Authors: Pedro B F Duarte, Zubair Md Fadlullah, Athanasios V Vasilakos, Nei Kato
    Abstract:

    The Wireless Mesh Network (WMN) has already been recognized as a promising broadband access Network technology from both academic and commercial perspective. In order to improve the performance of WMNs, extensive research efforts have been dedicated towards finding means to increase the number of simultaneous transmissions in the Network while avoiding signal interference among radios. In case of WMNs based on IEEE 802.11 b/g standards, most recent research works have relied upon the usage of orthogonal channels for solving the Channel Assignment (CA) problem. In this paper, we explore the possibility of exploiting Partially Overlapped Channels (POCs) by introducing a novel game theoretic distributed CA algorithm. Our proposed algorithm outperforms both the conventional orthogonal channel approach and the recent heuristic CA algorithms using POC. The proposed algorithm is shown to achieve near-optimal performance in the average case. In addition, the upper bound Price of Anarchy for Multi-Radio Multi-Channel (MRMC) Networks is derived to evaluate the effectiveness of the proposed approach.

  • partially overlapped channel assignment on Wireless Mesh Network backbone
    Global Communications Conference, 2010
    Co-Authors: Pedro B F Duarte, Zubair Md Fadlullah, Kazuo Hashimoto, Nei Kato
    Abstract:

    The Wireless Mesh Network (WMN) has already been recognized as a promising technology as broadband access Network from both academic and industry points of view. In order to improve its performance, research has been carried on how to increase the number of simultaneous transmissions in the Network while avoiding signal interference among radios. Considering WMNs based upon IEEE 802.11 b/g standards, lately most of researchers have been relying on the usage of orthogonal channels for solving the Channel Assignment (CA) problem. However, in this paper, we introduce a novel CA algorithm exploiting partially overlapped channels (POC) that overcome the common orthogonal channel approach and also a recent proposed CA algorithm using POC.

Nan Guo - One of the best experts on this subject based on the ideXlab platform.

  • Anonymous authentication scheme based on identity-based proxy group signature for Wireless Mesh Network
    EURASIP Journal on Wireless Communications and Networking, 2016
    Co-Authors: Tianhan Gao, Fangting Peng, Nan Guo
    Abstract:

    Access security is the key obstacle of the rapid popularization of Wireless Mesh Network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only simplifies the complex management of PKI but also guarantees anonymous authentication and owns high handover authentication efficiency. Performance and security analysis show that the scheme in this paper is efficient and resilient to a series of security and anonymity attacks.

  • Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless Mesh Network
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
    Co-Authors: Tianhan Gao, Qidi Miao, Nan Guo
    Abstract:

    Wireless Mesh Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a Wireless multi-hop Network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.

  • LEAS: Localized efficient authentication scheme for multi-operator Wireless Mesh Network with identity-based proxy signature
    Mathematical and Computer Modelling, 2013
    Co-Authors: Tianhan Gao, Nan Guo, Kangbin Yim
    Abstract:

    Abstract Aiming at establishing secure access and communications for a multi-operator Wireless Mesh Network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between Mesh client and access Mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the Mesh client side and Mesh router side. As a byproduct, key agreement among Network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.

Yuan Xue - One of the best experts on this subject based on the ideXlab platform.

  • Providing survivability against jamming attack for multi-radio multi-channel Wireless Mesh Networks
    Journal of Network and Computer Applications, 2011
    Co-Authors: Shanshan Jiang, Yuan Xue
    Abstract:

    Built upon a shared Wireless medium, Wireless Mesh Network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of service degradation is a crucial aspect in the design of a Wireless Mesh Network. To address this issue, this paper investigates the Network restoration solutions via the joint design of traffic rerouting, channel re-assignment, and scheduling over a multi-radio multi-channel Wireless Mesh Network. Efficient routing and channel assignment schemes can relieve the interference caused by both the normal Network nodes and the jamming nodes. Therefore, based on the necessary conditions of schedulability, we first formulate the optimal Network restoration problem as linear programming problem, which gives an upper bound on the achievable Network throughput. After we solve the LP problems, we have a set of flows assigned to edges that have been assigned to different channels. And based on the LP solutions, we provide a greedy scheduling algorithm using dynamic channel assignment, which schedules both the Network traffic and the jamming traffic. And we further provide a greedy static edge channel assignment algorithm, where a channel is assigned to an edge at the beginning and will remain fixed over all time slots. In particular, we consider two strategies, namely global restoration and local restoration, which can support a range of tradeoffs between the restoration latency and Network throughput after restoration. To quantitatively evaluate the impact of jamming attacks during and after restoration, we define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI). Finally, extensive performance evaluations are performed to study the impact of various jamming scenarios in an example Wireless Mesh Network.