دانلود رایگان مقاله لاتین شبکه بی سیم مولتی هاپ تحت محدودیت سری از سایت الزویر
عنوان فارسی مقاله:
حداکثر توان عملیاتی در شبکه های بی سیم مولتی هاپ تحت محدودیت سری
عنوان انگلیسی مقاله:
Throughput maximization in multi-hop wireless networks under a secrecy constraint
سال انتشار : 2016
برای دانلود رایگان مقاله شبکه بی سیم مولتی هاپ تحت محدودیت سری اینجا کلیک نمایید.
مقدمه انگلیسی مقاله:
1. Introduction
dio propagation due to their commonplace reflective and absorbent surfaces, as well as electromagnetic interference from the machinery [1]. Recently, wireless solutions for industrial applications have gained considerable attention from both academia and industry, using the concept of machine-to-machine communications [2–6]. Such an idea enables seamless exchange of information between autonomous devices without any (direct) human intervention. Another advantage of wireless machine-to-machine communications is its scalability, which reduces deployment and maintenance costs. In industrial plants, exchange of information is often needed among the machinery, monitoring devices and control unit; thereby, reliability, low latency and security become major concerns in the communication system design [7]. In this context, multi-hop machine-to-machine communications appear as a promising technology to tackle the industrial environment challenges. As pointed out in [3], multi-hop schemes are more suitable in such environments with additional interference.In a typical plant, the design of a multi-hop link between the aggregator and the control unit can be simplified by setting two parameters: position of relay nodes and coding rate (spectral effi- ciency). The most straightforward design option would be to use long-hops (less use of network resources) and to set high coding rates (i.e. more efficient messages in bits/s/Hz). Industrial networks usually employ unlicensed frequency bands and consequently are exposed to stronger co-channel interference. If this is the case, using long hops in conjunction with high rates may not be the best choice as far as the former leads to lower signal-to-interference ratio (SIR) while the latter leads to higher SIR thresholds needed to successfully decode a message [8]. In large industrial deployments, there are various sensors and machines continuously monitoring several processes. The resulting information that needs to be exchanged is frequently con- fidential, which requires the communication to be reliable, effi- cient, and secure at all levels of the network infrastructure [7,9]. Due to the broadcast nature of the wireless medium, non-intended nodes – commonly named eavesdroppers – within the communication range of a given transmitter can overhear the so-called legitimate transmission and possibly extract private information [9]. To avoid that, cryptographic techniques are usually implemented in the higher layers of the communication protocols to ensure confi- dentiality [10].
برای دانلود رایگان مقاله شبکه بی سیم مولتی هاپ تحت محدودیت سری اینجا کلیک نمایید.
کلمات کلیدی:
Throughput Maximization in Multi-Hop Wireless Networks under ... https://arxiv.org › cs by PHJ Nardelli - 2015 - Cited by 1 - Related articles Apr 16, 2015 - ... Maximization in Multi-Hop Wireless Networks under Secrecy Constraint ... of industrial communication networks under a secrecy constraint. Throughput Maximization in Multi-Hop Wireless Networks under ... https://gist.github.com/pedrohjn/381cb6e0bd74102381b9 Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint. Raw. Secrecy_Multihop-v3.ipynb. Sorry, something went wrong. Reload? article in press iranarze.ir/wp-content/uploads/2016/11/E875.pdf Please cite this article as: P.H.J. Nardelli et al., Throughput maximization in multi-hop wireless networks under a secrecy constraint,. Computer Networks (2016) ... Throughput Maximization in Multi-Hop Wireless Networks under ... https://www.semanticscholar.org/...Multi-Hop-Wireless.../4fc590b3b8250cd7a301732... This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under secrecy constraint. The evaluation scenario ... Power allocation for cooperative-based jamming in wireless networks ... ieeexplore.ieee.org/document/5700121/ by I Krikidis - 2010 - Cited by 16 - Related articles ... for physical layer security in wireless networks with power constraints. ... Power allocation for cooperative-based jamming in wireless networks with secrecy constraints ... with the jamming process under a total power constraint is investigated. .... On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power ... [PDF]Impact of Heterogeneity and Secrecy on theCapacity of Wireless ... www.mdpi.com/1424-8220/15/12/29844/pdf by Q Liu - 2015 - Related articles Dec 10, 2015 - After that, the information was transported in a multi-hop manner toward the ... some exceptions, the secrecy capacity under the protection of an ... that the networks still percolate in the secrecy constraint model, and many ... Throughput Maximization in Multi-Hop Wireless Networks under ... www.bcdcenergia.fi/.../throughput-maximization-in-multi-hop-wir... Translate this page Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint. Pedro H. J. Nardelli, Hirley Alves, Carlos. H. M. de Lima & Matti Latva-aho ... [PDF]Throughput Anonymity Trade-off in Wireless Networks under Latency ... www.lehigh.edu/~pav309/papers/VenkTong_Anonymous_08INFOCOM.pdf by P Venkitasubramaniam - Cited by 9 - Related articles for multiaccess relays are characterized under constraints on average packet ... flows in a multi- hop wireless network. ... optimal tradeoff between information rate and secrecy. We ... strategies to multihop routes in a network are described. Signal Processing Approaches to Secure Physical Layer Communications ... https://books.google.com/books?isbn=9814560146 Y.-W. Peter Hong, Pang-Chang Lan, C.-C. Jay Kuo - 2013 - Technology & Engineering Rodrigues MRD, Almeida PDM (2008) Filter design with secrecy constraints: the ... protection against cumulative eavesdropping in multihop wireless networks. ... Ying L (2011) Secrecy throughput of MANETs under passive and active attacks.