A Markov-Based Packet Dropout Model for UAV Wireless Communications

In this paper, we study the problem of modeling packet dropout for unmanned aerial vehicle (UAV) wireless communications. A Markov model is proposed, which incorporates the effects of Ricean fading. Unlike the classic Markov channel models, the proposed model is a two-state hidden Markov model with each state being associated with a time-varying packet error rate. The model is able to capture the non-stationary packet dropout characteristics of wireless channels. Intuitively, we use the time-varying packet error rate associated with the channels to describe the non-stationary nature of the packet dropouts, and the two-state Markov model to capture the correlation of the packet dropouts. A closed-form solution is provided for estimating the model parameters from network packet traces. Computer simulations and analysis are carried out to demonstrate the performance and effectiveness of the proposed model.

[1]  Shirley Radack,et al.  Guidelines for Securing Wireless Local Area Networks (WLANs) , 2012 .

[2]  Saifur Rahman,et al.  Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications , 2009, 2009 Second International Conference on Advances in Mesh Networks.

[3]  K. Sam Shanmugan,et al.  An equivalent Markov model for burst errors in digital channels , 1995, IEEE Trans. Commun..

[4]  Xin Wang,et al.  Analyzing and Optimizing Adaptive Modulation Coding Jointly With ARQ for QoS-Guaranteed Traffic , 2006, IEEE Transactions on Vehicular Technology.

[5]  Wayne F. Boyer,et al.  Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues , 2009 .

[6]  Daniel Cygan,et al.  The land mobile satellite communication channel-recording, statistics, and channel model , 1991 .

[7]  Donald F. Towsley,et al.  Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[8]  Shu Lin,et al.  Automatic-repeat-request error-control schemes , 1984, IEEE Communications Magazine.

[9]  Axel W. Krings,et al.  Dynamic Hybrid Fault Modeling and Extended Evolutionary Game Theory for Reliability, Survivability and Fault Tolerance Analyses , 2011, IEEE Transactions on Reliability.

[10]  Ali Abdi,et al.  On the estimation of the K parameter for the Rice fading distribution , 2001, IEEE Communications Letters.

[11]  Scott L. Feld,et al.  PROVING A DISTRIBUTION-FREE GENERALIZATION OF THE CONDORCET JURY THEOREM* , 1989 .

[12]  Georgios B. Giannakis,et al.  Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links , 2004, IEEE Transactions on Wireless Communications.

[13]  G. Owen,et al.  Thirteen theorems in search of the truth , 1983 .

[14]  Thilo Sauter,et al.  End-to-End Communication Architecture for Smart Grids , 2011, IEEE Transactions on Industrial Electronics.

[15]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[16]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[17]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[18]  Wei Zhang,et al.  Stability of networked control systems , 2001 .

[19]  William Turin,et al.  Performance Analysis and Modeling of Digital Transmission Systems (Information Technology: Transmission, Processing and Storage) , 2004 .

[20]  Debin Gao,et al.  Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance , 2009, IEEE Transactions on Dependable and Secure Computing.

[21]  Mark D. Hadley,et al.  A Survey of Wireless Communications for the Electric Power System , 2010 .

[22]  David John Leversage,et al.  Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.

[23]  Joon S. Park,et al.  Cooperative Component Testing Architecture in Collaborating Network Environment , 2007, ATC.

[24]  Jaume Ramis,et al.  Cross-Layer Design of Adaptive Multirate Wireless Networks Using Truncated HARQ , 2011, IEEE Transactions on Vehicular Technology.

[25]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[26]  Morteza Mardani,et al.  Cross-layer link adaptation design for relay channels with cooperative ARQ protocol , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[27]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[28]  Mario Poggioni,et al.  Analyzing Performance of Multi-User Scheduling Jointly with AMC and ARQ , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[29]  Performance characteristics of cellular systems with different link adaptation strategies , 2003, IEEE Trans. Veh. Technol..

[30]  J. Weibull,et al.  The Condorcet Jury Theorem and Heterogeneity , 2010 .

[31]  Nicolas de Condorcet Essai Sur L'Application de L'Analyse a la Probabilite Des Decisions Rendues a la Pluralite Des Voix , 2009 .

[32]  Philip Schniter,et al.  Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel , 2008, IEEE Transactions on Wireless Communications.

[33]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[34]  Hong Chang,et al.  Super-resolution through neighbor embedding , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..

[35]  L. Shapley,et al.  Optimizing group judgmental accuracy in the presence of interdependencies , 1984 .

[36]  Anna Scaglione,et al.  For the Grid and Through the Grid: The Role of Power Line Communications in the Smart Grid , 2010, Proceedings of the IEEE.

[37]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[38]  Taesoo Kwon,et al.  Adaptive-Modulation-and-Coding-Based Transmission of Control Messages for Resource Allocation in Mobile Communication Systems , 2009, IEEE Transactions on Vehicular Technology.

[39]  Vallipuram Muthukkumarasamy,et al.  Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.

[40]  John V. Howard,et al.  Cooperation in the Prisoner's Dilemma , 1988 .

[41]  Dario Vlah,et al.  A location-dependent runs-and-gaps model for predicting TCP performance over a UAV wireless channel , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[42]  Wade Trappe,et al.  A Comparative Study of AODV and OLSR on the ORBIT Testbed , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[43]  Hong Shen Wang,et al.  Finite-state Markov channel-a useful model for radio communication channels , 1995 .

[44]  E. O. Elliott Estimates of error rates for codes on burst-noise channels , 1963 .

[45]  Ben Y. Zhao,et al.  A Markov-Based Channel Model Algorithm for Wireless Networks , 2001, MSWIM '01.

[46]  Fan Bai,et al.  Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[47]  Mainak Chatterjee,et al.  Trust based fusion over noisy channels through anomaly detection in cognitive radio networks , 2011, SIN '11.

[48]  Michel Daoud Yacoub,et al.  Bivariate nakagami-m distribution with arbitrary correlation and fading parameters , 2008, IEEE Transactions on Wireless Communications.

[49]  Fumio Ishizaki,et al.  Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function , 2007, IEEE Transactions on Wireless Communications.

[50]  Laurence B. Milstein,et al.  A Markov model for block errors on fading channels , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[51]  Jie Wu,et al.  Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[52]  Shangping Ren,et al.  Analysis of binary voting algorithms for use in fault-tolerant and secure computing , 2010, The 2010 International Conference on Computer Engineering & Systems.

[53]  Giovanni Pau,et al.  CORNER: a realistic urban propagation model for VANET , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[54]  Peter F. Al-Hokayem Stability Analysis of Networked Control Systems , 2003 .

[55]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[56]  Antonio Capone,et al.  MobiMESH: An Experimental Platform for Wireless MESH Networks with Mobility Support , 2006 .

[57]  Bruce D. Fritchman,et al.  A binary channel characterization using partitioned Markov chains , 1967, IEEE Trans. Inf. Theory.

[58]  E. Gilbert Capacity of a burst-noise channel , 1960 .

[59]  Yi Yu,et al.  A statistical approach to developing channel models for network simulations , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[60]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[61]  Kenneth C. Budka,et al.  Communication network architecture and design principles for smart grids , 2010, Bell Labs Technical Journal.

[62]  Daniel D. Stancil,et al.  Efficient simulation of Ricean fading within a packet simulator , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).

[63]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[64]  Nicolas Lechevin,et al.  Safety And Reliability In Cooperating Unmanned Aerial Systems , 2010 .

[65]  Dongfeng Yuan,et al.  Performance analysis and comparison of HARQ schemes in cross layer design , 2009, 2009 Fourth International Conference on Communications and Networking in China.

[66]  Jean-Yves Chouinard,et al.  Estimation of Gilbert's and Fritchman's models parameters using the gradient method for digital mobile radio channels , 1988 .

[67]  Georgios B. Giannakis,et al.  Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design , 2005, IEEE Transactions on Wireless Communications.

[68]  Takeo Kanade,et al.  Limits on super-resolution and how to break them , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).

[69]  Kevin A. Kwiat,et al.  Optimal voting strategy against rational attackers , 2011, 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[70]  Theodore S. Rappaport,et al.  Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .

[71]  M. Motani,et al.  Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.

[72]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[73]  Song Ci,et al.  Cross-Layer Design for Combining Adaptive Modulation and Coding with Hybrid ARQ to Enhance Spectral Efficiency , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.

[74]  Marc Moonen,et al.  Adaptive link adaptation , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[75]  Jin Woo Kim,et al.  Design of Adaptive Modulation and Coding Scheme for Truncated HARQ , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[76]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .

[77]  Radu State,et al.  Applying game theory to analyze attacks and defenses in virtual coordinate systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[78]  Eric Rescorla,et al.  Is finding security holes a good idea? , 2005, IEEE Security & Privacy.

[79]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[80]  The Persuasiveness of Democratic Majorities , 2004 .

[81]  Salvatore D. Morgera,et al.  Parameter estimation for a burst-noise channel , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.

[82]  R. Myerson Extended Poisson Games and the Condorcet Jury Theorem , 1998 .

[83]  Bruce H. Pillman Super-Resolution Imaging , 2013, J. Electronic Imaging.

[84]  Gerhard Haßlinger,et al.  The Gilbert-Elliott Model for Packet Loss in Real Time Services on the Internet , 2011, MMB.

[85]  Sabine Süsstrunk,et al.  A Frequency Domain Approach to Registration of Aliased Images with Application to Super-resolution , 2006, EURASIP J. Adv. Signal Process..

[86]  Seunghyeon Rhee,et al.  Discrete cosine transform based regularized high-resolution image reconstruction algorithm , 1999 .

[87]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[88]  Joon S. Park,et al.  Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems , 2005, SEC.

[89]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[90]  Miles A. McQueen,et al.  Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.

[91]  Scott L. Miller,et al.  Probability and Random Processes : With Applications to Signal Processing and Communications , 2012 .

[92]  Linda Bushnell,et al.  Stability analysis of networked control systems , 2002, IEEE Trans. Control. Syst. Technol..

[93]  William T. Freeman,et al.  Example-Based Super-Resolution , 2002, IEEE Computer Graphics and Applications.

[94]  Niki Pissinou,et al.  Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).

[95]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.