2016
Authors
Festag, A; Boban, M; Kenney, JB; Vilela, JP;
Publication
WoWMoM 2016 - 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks
Abstract
2016
Authors
Vilela, JP; Gomes, M; Harrison, WK; Sarmento, D; Dias, F;
Publication
IEEE SIGNAL PROCESSING LETTERS
Abstract
We propose a systematic concatenated coding scheme based on the combination of interleaving with powerful channel codes and jamming for wireless secrecy under the practical assumption of codes in the finite blocklength regime. The basic idea lies in generating a short random key that is used to shuffle/interleave information at the source, Alice. This key is then sent to the legitimate receiver, Bob, during a brief period of advantageous communication over the eavesdropper Eve (e.g., due to more interference from a jammer). Finally, the key is decoded at Bob to properly deinterleave the original information. Bob receives a better quality version of the interleaving key, therefore having the needed advantage over Eve. Information reliability is provided by a strong inner code, while security against Eve results from the proper selection of the outer code and interference levels over the key. We propose a methodology for selection of the outer code with reliability and security constraints. For that, we introduce bit error complementary cumulative distribution function metrics, suitable for security and reliability analysis of error correcting codes.
2015
Authors
Pinto, P; Pinto, A; Ricardo, M;
Publication
WIRELESS INTERNET (WICON 2014)
Abstract
Real-time monitoring applications may generate delay sensitive traffic that is expected to be delivered within a firm delay boundary in order to be useful. In this context, a previous work proposed an End-to-End Delay (EED) estimation mechanism for Wireless Sensor Networks (WSNs) to preview potential useless packets, and to early discard them in order to save processing and energy resources. Such estimation mechanism accounts delays using timers that make use of an Exponentially Weighted Moving Average (EWMA) function where the smoothing factor is a constant defined prior to the WSN deployment. Later experiments showed that, in order to enhance the estimation results, such smoothing factor should be defined as a function of the network load. The current work proposes an optimization of the previous estimation mechanism that works by evaluating the network load and by adapting the smoothing factor of the EWMA function accordingly. Results show that this optimization leads to a more accurate EED estimation for different network loads.
2015
Authors
Pinto, P; Pinto, AA; Ricardo, M;
Publication
Handbook of Research on Computational Simulation and Modeling in Engineering
Abstract
Wireless Sensor Networks (WSNs) can be deployed using available hardware and software. The Contiki is an operative system compatible with a wide range of WSN hardware. A Contiki development environment named InstantContiki is also available and includes the Cooja simulator, useful to test WSN simulation scenarios prior to their deployment. Cooja can provide realistic results since it uses the full Contiki's source code and some motes can be emulated at the hardware level. However this implies extending the simulation runtime, which is heightened since the Cooja is single threaded, i.e, it makes use of a single core per instant of time, not taking advantage of the current multi-core processors. This chapter presents a framework to automate the configuration and execution of Cooja simulations. When a multi-core processor is available, this framework runs multiple simultaneous Cooja instances to reduce simulations runtime in exchange of higher CPU load and RAM usage.
2015
Authors
Pinto, P; Pinto, A; Ricardo, M;
Publication
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2014 (ICNAAM-2014)
Abstract
WSN can be deployed using widely available hardware and software solutions. The Contiki is an open source operative system compatible with a wide range of WSN hardware. A Contiki development environment named InstantContiki is also available and includes the Cooja simulation tool, useful for the simulation of WSN scenarios, prior to their deployment. This simulation tool can provide realistic results since it uses the full Contiki's source code and some motes can be emulated at the hardware level. However, the Cooja simulator uses one process per simulation, not taking advantage of multiple core processors. In this paper we propose a framework to automate the execution of simulations of multiple scenarios and configurations in Cooja. When a multiple cores processor is available, this framework can run multiple simultaneous Cooja instances, taking advantage of processing resources and contributing to reduce the total simulation runtime.
2015
Authors
Pinto, P; Pinto, A; Ricardo, M;
Publication
IEEE SENSORS JOURNAL
Abstract
Real-time monitoring applications may be used in a wireless sensor network (WSN) and may generate packet flows with strict quality of service requirements in terms of delay, jitter, or packet loss. When strict delays are imposed from source to destination, the packets must be delivered at the destination within an end-to-end delay (EED) hard limit in order to be considered useful. Since the WSN nodes are scarce both in processing and energy resources, it is desirable that they only transport useful data, as this contributes to enhance the overall network performance and to improve energy efficiency. In this paper, we propose a novel cross-layer admission control (CLAC) mechanism to enhance the network performance and increase energy efficiency of a WSN, by avoiding the transmission of potentially useless packets. The CLAC mechanism uses an estimation technique to preview packets EED, and decides to forward a packet only if it is expected to meet the EED deadline defined by the application, dropping it otherwise. The results obtained show that CLAC enhances the network performance by increasing the useful packet delivery ratio in high network loads and improves the energy efficiency in every network load.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.