scholarly journals Multi-radio channel allocation in competitive wireless networks

Author(s):  
M. Felegyhazi ◽  
M. Cagalj ◽  
J.-P. Hubaux
2021 ◽  
Vol 20 (4) ◽  
pp. 32-37
Author(s):  
Dominik NEZNÍK ◽  
◽  
Ľubomír DOBOŠ

In this paper, will be presented actual research of the intelligent channel allocation. The intelligent channel allocation is based on combination of fuzzy logic method and game theory attributes to increase quality of link in network. The channel allocations will become an important phenomenon in different types of networks such as 5G technology, wireless networks (IEEE 802.11xx), Z-Wave, LoRa, 3G, 4G, etc. In the near future, new network technologies, Internet of Things (IoT) and Smart Cities will need to have intelligent channel allocation to prevent interference on the channels used for data transfer. These networks along with IoT are considered as promising technology, that interconnects different types of networks into one fully functional network. The aim of this paper is to present the concept of a methods for channel allocation in wireless networks, where channels work as communication medium based on IEEE 802.11xx technology. The simulations prove, that proposed method is able to provide lower interference, improve data rates and increase quality of links.


2016 ◽  
Vol 114 (1) ◽  
pp. 19-26 ◽  
Author(s):  
H. Vincent Poor ◽  
Rafael F. Schaefer

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.


Sign in / Sign up

Export Citation Format

Share Document