Dynamic Discovery in Wireless Networks

In today’s world, wireless technology is widely employed because of its various benefits, such as mobility, low-cost deployment, scalability etc. But, at the same time, it suffers from a variety of issues ranging from speed and stability to security. In this thesis, we identify three major challenges and propose efficient solutions to mitigate them. First, the broadcast nature of wireless communication makes it inherently vulnerable to eavesdroppers. This makes it very difficult for a participant in a wireless network to discover and access services without also disclosing their identity and need for service. We develop a protocol based on partial (additive) homomorphic functions for private service discovery. Second, wireless networks are inherently ad hoc, with participants dynamically entering and leaving the network at different times. This asynchrony complicates the task of finding shared channels of communication. We present near-optimal schemes for asynchronous channel discovery. The third problem relates to the energy-efficiency of wireless transmissions. A typical wireless agent uses power from an on-board battery with limited power supply. In a multi-hop network it is a non-trivial problem to find relays and schedule non-interfering transmissions which conserve energy. We develop energy-efficient schemes for discovering next-hop relays.

[1]  G. F. Reed,et al.  Survey of battery energy storage systems and modeling techniques , 2012, 2012 IEEE Power and Energy Society General Meeting.

[2]  Donald E. Knuth,et al.  Efficient balanced codes , 1986, IEEE Trans. Inf. Theory.

[3]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[4]  Ling Liu,et al.  A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .

[5]  Oriol Sallent,et al.  A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[6]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[7]  Andrzej Pelc,et al.  Deterministic rendezvous in networks: A comprehensive survey , 2012, Networks.

[8]  Xiaojun Cao,et al.  A Cognitive Radio Network Architecture without Control Channel , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Zhaoquan Gu,et al.  Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[10]  Bu-Sung Lee,et al.  Exploiting wireless broadcast advantage as a network-wide cache , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[11]  Ekram Hossain,et al.  A MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[12]  Ian F. Akyildiz,et al.  OFDM-Based Common Control Channel Design for Cognitive Radio Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.

[13]  Bhaskar Krishnamachari,et al.  Delay constrained minimum energy broadcast in cooperative wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  Jianfeng Wang,et al.  Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.

[15]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[16]  Béla Bollobás,et al.  Littlewood's Miscellany , 1986 .

[17]  Anna Scaglione,et al.  Opportunistic large arrays: cooperative transmission in wireless multihop ad hoc networks to reach far distances , 2003, IEEE Trans. Signal Process..

[18]  Jae Wook Shin,et al.  Deterministic rendezvous scheme in multichannel access networks , 2010 .

[19]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[20]  Mary Ann Ingram,et al.  Alternating opportunistic large arrays in broadcasting for network lifetime extension , 2009, IEEE Transactions on Wireless Communications.

[21]  Marco Gruteser,et al.  USENIX Association , 1992 .

[22]  L.A. DaSilva,et al.  Sequence-Based Rendezvous for Dynamic Spectrum Access , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[23]  Ding‐Zhu Du,et al.  Wiley Series in Discrete Mathematics and Optimization , 2014 .

[24]  François Ingelrest,et al.  Localized broadcast incremental power protocol for wireless ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[25]  Mani B. Srivastava,et al.  Optimizing Sensor Networks in the Energy-Latency-Density Design Space , 2002, IEEE Trans. Mob. Comput..

[26]  Ravi Sundaram,et al.  SamaritanCloud: Secure and scalable infrastructure for enabling location-based services , 2013, 2013 IFIP Networking Conference.

[27]  Andrzej Pelc,et al.  The Wakeup Problem in Synchronous Broadcast Systems , 2000, SIAM J. Discret. Math..

[28]  Piotr Indyk,et al.  A small approximately min-wise independent family of hash functions , 1999, SODA '99.

[29]  Michele Zorzi,et al.  Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel , 2010, IEEE Transactions on Wireless Communications.

[30]  Xin Liu,et al.  Minimum energy accumulative routing in wireless networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[31]  Kaushik R. Chowdhury,et al.  Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping , 2010, Ad Hoc Networks.

[32]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[33]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[34]  Anna Scaglione,et al.  On the power efficiency of cooperative broadcast in dense wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[35]  Walid G. Aref,et al.  The New Casper: A Privacy-Aware Location-Based Database Server , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[36]  Anthony Ephremides,et al.  Energy-Efficient Broadcast and Multicast Trees in Wireless Networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[37]  Deborah Estrin,et al.  ASCENT: adaptive self-configuring sensor networks topologies , 2004, IEEE Transactions on Mobile Computing.

[38]  Min Qin,et al.  An energy-efficient voting-based clustering algorithm for sensor networks , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[39]  Hang Su,et al.  Opportunistic MAC Protocols for Cognitive Radio Based Wireless Networks , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[40]  S. Bhogle,et al.  LITTLEWOOD'S MISCELLANY , 1990 .

[41]  Hai Liu,et al.  Ring-Walk Based Channel-Hopping Algorithms with Guaranteed Rendezvous for Cognitive Radio Networks , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[42]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[43]  Dipankar Raychaudhuri,et al.  A spectrum etiquette protocol for efficient coordination of radio devices in unlicensed bands , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[44]  P. Varaiya,et al.  Differential games , 1971 .

[45]  Jean-Pierre Hubaux,et al.  Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.

[46]  Mary Ann Ingram,et al.  Opportunistic large array concentric routing algorithm (OLACRA) for upstream routing in wireless sensor networks , 2011, Ad Hoc Networks.

[47]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[48]  Ramsey Theory,et al.  Ramsey Theory , 2020, Set Theory and Foundations of Mathematics: An Introduction to Mathematical Logic.

[50]  Jongmin Shin,et al.  A Channel Rendezvous Scheme for Cognitive Radio Networks , 2010, IEEE Communications Letters.

[51]  Jain-Shing Liu,et al.  Energy-efficiency clustering protocol in wireless sensor networks , 2005, Ad Hoc Networks.

[52]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[53]  Sajal K. Das,et al.  A framework for energy-saving data gathering using two-phase clustering in wireless sensor networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[54]  N. Jesuale,et al.  A Policy Proposal to Enable Cognitive Radio for Public Safety and Industry in the Land Mobile Radio Bands , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[55]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[56]  ScaglioneA.,et al.  Opportunistic large arrays , 2003 .

[57]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[58]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[59]  Kaigui Bian,et al.  Control Channel Establishment in Cognitive Radio Networks using Channel Hopping , 2011, IEEE Journal on Selected Areas in Communications.

[60]  James Fogarty,et al.  Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.

[61]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[62]  Kaigui Bian,et al.  A quorum-based framework for establishing control channels in dynamic spectrum access networks , 2009, MobiCom '09.

[63]  Ueli Maurer,et al.  Tight security proofs for the bounded-storage model , 2002, STOC '02.

[64]  Lei Zhang,et al.  Neighbor discovery for wireless networks via compressed sensing , 2010, Perform. Evaluation.

[65]  M.K. Stojcev,et al.  Power management and energy harvesting techniques for wireless sensor nodes , 2009, 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services.

[66]  Qian Huang,et al.  On geo-social network services , 2009, 2009 17th International Conference on Geoinformatics.

[67]  Shu Du,et al.  RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[68]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[69]  Roy D. Yates,et al.  Efficient multihop broadcast for wideband systems , 2003, Multiantenna Channels: Capacity, Coding and Signal Processing.

[70]  Luiz A. DaSilva,et al.  Rendezvous for Cognitive Radios , 2011, IEEE Transactions on Mobile Computing.

[71]  Prathima Agrawal,et al.  Synchronized MAC Protocol For Multi-Hop Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.

[72]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[73]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[74]  Shmuel Gal,et al.  The theory of search games and rendezvous , 2002, International series in operations research and management science.

[75]  Bhaskar Krishnamachari,et al.  Delay efficient sleep scheduling in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[76]  D. Raychaudhuri,et al.  Spectrum co-existence of IEEE 802.11b and 802.16a networks using the CSCC etiquette protocol , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[77]  Bhaskar Krishnamachari,et al.  An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[78]  Mun Choon Chan,et al.  Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.

[79]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[80]  Peng Ning,et al.  USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[81]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[82]  Xuemin Shen,et al.  HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.

[83]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[84]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[85]  Hai Liu,et al.  Taxonomy and challenges of rendezvous algorithms in cognitive radio networks , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).