Multi-piconet Formation to Increase Channel Utilization in IEEE 802.15.3 High-Rate WPAN

IEEE 802.15.3 high-rate Wireless Personal Area Networks (WPANs) is a short range communication technology, in which devices (DEVs) of a piconet communicate with a Piconet Coordinator (PNC). An extension of the communication area in WPAN via formation of a multi-piconet is one of the most challenging issues. Although a concept of multi-piconet has been defined in the IEEE 802.15.3 WPAN standard, a detailed formation mechanism of multi-piconet is not presented. In this paper, we propose efficient multi-piconet formation algorithms, Piconet Coordinator To Device (PCTD) and Device To Piconet Coordinator (DTPC). We evaluate the performance of the algorithms via simulations. The proposed algorithms are shown to extend the communication area with one to three levels and to provide sufficient Channel Time Allocations (CTAs) for subsidiary piconets in IEEE 802.15.3 WPAN.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  J. Karaoguz,et al.  High-rate wireless personal area networks , 2001, IEEE Commun. Mag..

[3]  Niki Pissinou,et al.  Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.

[4]  Imrich Chlamtac,et al.  Bluetrees-scatternet formation to enable Bluetooth-based ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[5]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[6]  N. Pissinou,et al.  Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  Gwillerm Froc,et al.  Algorithms for Ad-hoc Piconet Topology Initialization Evaluation for the IEEE802.15.3 High Rate WPAN System , 2003 .

[9]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[10]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Vikas P. Verma,et al.  Distributed Bluetooth scatternet formation algorithm , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[12]  Amitava Datta,et al.  Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[13]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[14]  Yi-Sheng Chen,et al.  Bluetooth scatternet formation for supporting device mobility , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..

[15]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[16]  Myung J. Lee,et al.  A Bluetooth scatternet-route structure for multihop ad hoc networks , 2003, IEEE J. Sel. Areas Commun..

[17]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).