Wireless Networking for Moving Objects: Protocols, Architectures, Tools, Services and Applications

A new techno-business model, based on a personal IPv6 (PIPv6) address embedded in an X.509v3 digital certificate, is described in this chapter. The new globally significant, network-independent PIPv6 address class will enable real number ownership and full anytimeanywhere-anyhow portability for future generations of wireless networks of moving objects, such as those in vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), and other types of ad hoc networks. The unique PIPv6 address of the network node (object) could serve as its long-term identity, and enable its advanced secure mobility and participation in the variety of evolving dynamic, fluid wireless mobile network scenarios. It can also serve enhanced authentication, authorization and accounting (AAA) functionality, through which commercially viable adhoc networking and open mesh-networking solutions are realizable. In these latter, a mobile node (object) acting as a gateway (or a relay) may offer (or facilitate) wireless Internet access services casually or persistently to other mobile nodes or objects and receive credits for this service. This solution is exactly the kind of incentivised one that is required for cooperative relaying over multiple hops, i.e., that available idle mobile nodes and objects are incentivised to operate and offer service as relay nodes for other objects which are trying to reach a gateway for access to specific or general telecommunications services, such as the Internet. The idle nodes may provide this access directly if that is possible or in a dynamic collaboration via a multi-hop link.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Dominique Barthel,et al.  Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.

[3]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[4]  Basil S. Maglaris,et al.  Throughput Analysis in Multihop CSMA Packet Radio Networks , 1987, IEEE Trans. Commun..

[5]  Patrick Thiran,et al.  A Packing Approach to Compare Slotted and Non-Slotted Medium Access Control , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  A. Vinel,et al.  Performance evaluation of IEEE 802 . 11 p-enabled vehicular video surveillance system , 2014 .

[7]  Douglas R. Stinson,et al.  Combinatorial designs: constructions and analysis , 2003, SIGA.

[8]  P. Moran,et al.  Reversibility and Stochastic Networks , 1980 .

[9]  Youngmin Kim,et al.  Y-MAC: An Energy-Efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[10]  Cem Ersoy,et al.  MAC protocols for wireless sensor networks: a survey , 2006, IEEE Communications Magazine.

[11]  Fernando Boavida,et al.  Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[12]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[13]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[14]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[15]  Injong Rhee,et al.  CRAWDAD dataset ncsu/mobilitymodels (v.2009-07-23) , 2009 .

[16]  Yunhao Liu,et al.  Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation , 2010, IEEE Transactions on Parallel and Distributed Systems.

[17]  Koushik Kar,et al.  Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[18]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[19]  M. Lakshmanan,et al.  AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS , 2009 .

[20]  John Newbury,et al.  Power line communications : theory and applications for narrowband and broadband communications over power lines , 2010 .

[21]  Yevgeni Koucheryavy,et al.  An Overtaking Assistance System Based on Joint Beaconing and Real-Time Video Transmission , 2012, IEEE Transactions on Vehicular Technology.

[22]  Julien Herzen,et al.  Distributed spectrum assignment for home WLANs , 2013, 2013 Proceedings IEEE INFOCOM.

[23]  Yuguang Fang,et al.  Energy-efficient reporting mechanisms for multi-type real-time monitoring in Machine-to-Machine communications networks , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Rute C. Sofia,et al.  User-centric Wireless Local Loop Framework, ULOOP white paper 01 , 2011 .

[25]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[26]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[27]  Jorge Sá Silva,et al.  End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.

[28]  Injong Rhee,et al.  Z-MAC: a hybrid MAC for wireless sensor networks , 2005, SenSys '05.

[29]  Saikat Guha,et al.  Green Wave Sleep Scheduling: Optimizing Latency and Throughput in Duty Cycling Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[30]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[31]  J.M.H. Elmirghani,et al.  Green information and communication technology: energy efficiency in a motorway model , 2010, IET Commun..

[32]  Vincenzo Mancuso,et al.  Greening wireless communications: Status and future directions , 2012, Comput. Commun..

[33]  Dimitrios Koutsonikolas,et al.  A first look at 802.11n power consumption in smartphones , 2012, PINGEN '12.

[34]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[35]  Panos J. Antsaklis,et al.  Wireless Sensor Networks for Structural Health Monitoring: A Multi-Scale Approach , 2006 .

[36]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[37]  Sem C. Borst,et al.  Insensitivity and stability of random-access networks , 2010, Perform. Evaluation.

[38]  G. Dimitrakopoulos,et al.  Functional architecture , 2009, IEEE Vehicular Technology Magazine.

[39]  Deborah Estrin,et al.  ASCENT: adaptive self-configuring sensor networks topologies , 2004, IEEE Transactions on Mobile Computing.

[40]  Edward W. Knightly,et al.  Closed-form throughput expressions for CSMA networks with collisions and hidden terminals , 2012, 2012 Proceedings IEEE INFOCOM.

[41]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[42]  Jaume Barceló,et al.  Performance analysis of IEEE 802.11ac wireless backhaul networks in saturated conditions , 2013, EURASIP J. Wirel. Commun. Netw..

[43]  Leonard Kleinrock,et al.  On the capacity of wireless CSMA/CA multihop networks , 2013, 2013 Proceedings IEEE INFOCOM.

[44]  Yu-Chee Tseng,et al.  Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks , 2003, Comput. Networks.

[45]  Jorge Sá Silva,et al.  On the feasibility of secure application-layer communications on the Web of Things , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[46]  Doug Fisher,et al.  SCADA: Supervisory Control and Data Acquisition , 2015 .

[47]  S. M. Heemstra de Groot,et al.  Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.

[48]  Mani Srivastava,et al.  STEM: Topology management for energy efficient sensor networks , 2002, Proceedings, IEEE Aerospace Conference.

[49]  Chai-Keong Toh Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001 .

[50]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[51]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[52]  John A. Stankovic,et al.  Radio-Triggered Wake-Up for Wireless Sensor Networks , 2005, Real-Time Systems.

[53]  Soung Chang Liew,et al.  Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks , 2007, 2009 IEEE International Conference on Communications.

[54]  Özlem Durmaz Incel A survey on multi-channel communication in wireless sensor networks , 2011, Comput. Networks.

[55]  Rute C. Sofia,et al.  User-provided networks: consumer as provider , 2008, IEEE Communications Magazine.

[56]  Jorge Sá Silva,et al.  Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..

[57]  Xiang-Yang Li,et al.  Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[58]  Basavaraj Patil,et al.  Transmission of IPv6 Packets over BLUETOOTH Low Energy , 2013 .

[59]  Mario Kusek,et al.  Rich Presence Information in Agent based Machine-to-Machine Communication , 2013, KES.

[60]  Katia Obraczka,et al.  Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks , 2006 .