scholarly journals Resource tokenization for crowdfunding of wireless networks

2021 ◽  
Vol 2 (5) ◽  
pp. 93-100
Author(s):  
Volkan Sevindik

This paper presents a novel blockchain-based spectrum tokenization method used to crowdsource wireless network deployment projects. Crowdsourcing is a method of financing certain projects and ideas through the funds collected by individuals or businesses in an open marketplace. The method presented in this paper finances the wireless network deployment projects belonging to service providers or governments. The method tokenizes proposed novel wireless resource units, and sells these units to investors. A new Value Unit Per User (VUPU) resource unit is introduced with a new pricing scheme depending on a load of a base station. A novel Proof of Data Load (PoDLO) consensus algorithm is proposed which is used to verify data and traffic load of a base station. Device Diversity Factor (DDF) and Subscriber Unique Permanent Identifier (SUPI) Factor (SUF) are proposed new ways to determine the value of a base station and a network cluster.

Author(s):  
Neeraja Sajja ◽  
A. Abhishiktha

<p>The need of wireless services increasing day by day due to the advancements in the field of wireless technology towards 5G for instant transferring the mails, messages and video calling without any interruption. In LTE and 5G wireless networks, major task is to provide seamless connection anywhere, anytime when the user may roam among Heterogeneous Wireless Networks (HetNets). To achieve proper mobility management among HetNets, handoff or hadover is required. Handover Probability is one of the metric to estimate the handover performance, which is a probability of Mobile Node to handover the present connection from the current base station to another base station or enode B. In this paper, handoff probability analysis is done for   multiple HetNets based on Handover Algorithm. To estimate this algorithm, bandwidth is considered as one of the key parameter. A comparative analysis of handover probability for two, three, four and five HetNets has been performed. The results can demonstrate that the variation of handover probability with respect to traffic load, threshold and bandwidth. It is observed that, as the number of wireless networks increases handover probability slightly increases with traffic load. These results are more significant to estimate further wrong decision handovers based on that Quality of Service (QoS) is evaluated in practical HetNets such as integration of LTE, Wi-Fi and WiMAX etc. </p>


The message for call requests is created by mobile devices during a call which is then sent to a base station (BS). A BS processes the response of a call request and chooses to accept or deny the call. Signals such as location notifications, paging and switching due to user mobility take a significant share of the total traffic load within mobile cellular networks. Therefore, between signaling packets, the maximum allowable delays may differ. This time will be delayed because if the time is longer than the allowable pause. The quality of service is therefore reduced, which for service providers is not acceptable. In this paper, we propose an empirical model to determine an overall delay in the processing of wireless cell network signaling packets, which involves the delay in the radio channel and the wired component delay in processing. We are demonstrating the effectiveness of priority processing in reducing handoff delays. We also assess the delay between cells according to their positions in the area and their influence on processing delays by the number of nodes. In addition, we evaluate the difference in delay between cells depending on their position within the network area and how many stations influence time delayed processing.


2018 ◽  
Vol 27 (47) ◽  
Author(s):  
Alberto Acosta-López ◽  
Elver Yesid Melo-Monroy ◽  
Pablo Andrés Linares-Murcia

Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
Hafiz Munsub Ali ◽  
Jiangchuan Liu ◽  
Waleed Ejaz

Abstract In densely populated urban centers, planning optimized capacity for the fifth-generation (5G) and beyond wireless networks is a challenging task. In this paper, we propose a mathematical framework for the planning capacity of a 5G and beyond wireless networks. We considered a single-hop wireless network consists of base stations (BSs), relay stations (RSs), and user equipment (UEs). Wireless network planning (WNP) should decide the placement of BSs and RSs to the candidate sites and decide the possible connections among them and their further connections to UEs. The objective of the planning is to minimize the hardware and operational cost while planning capacity of a 5G and beyond wireless networks. The formulated WNP is an integer programming problem. Finding an optimal solution by using exhaustive search is not practical due to the demand for high computing resources. As a practical approach, a new population-based meta-heuristic algorithm is proposed to find a high-quality solution. The proposed discrete fireworks algorithm (DFWA) uses an ensemble of local search methods: insert, swap, and interchange. The performance of the proposed DFWA is compared against the low-complexity biogeography-based optimization (LC-BBO), the discrete artificial bee colony (DABC), and the genetic algorithm (GA). Simulation results and statistical tests demonstrate that the proposed algorithm can comparatively find good-quality solutions with moderate computing resources.


Author(s):  
Yusuf Durachman ◽  

Current advancements in cellular technologies and computing have provided the basis for the unparalleled exponential development of mobile networking and software availability and quality combined with multiple systems or network software. Using wireless technologies and mobile ad-hoc networks, such systems and technology interact and collect information. To achieve the Quality of Service (QoS) criteria, the growing concern in wireless network performance and the availability of mobile users would support a significant rise in wireless applications. Predicting the mobility of wireless users and systems performs an important role in the effective strategic decision making of wireless network bandwidth service providers. Furthermore, related to the defect-proneness, self-organization, and mobility aspect of such networks, new architecture problems occur. This paper proposes to predict and simulate the mobility of specific nodes on a mobile ad-hoc network, gradient boosting devices defined for the system will help. The proposed model not just to outperform previous mobility prediction models using simulated and real-world mobility instances, but provides better predictive accuracy by an enormous margin. The accuracy obtained helps the suggested mobility indicator in Mobile Adhoc Networks to increase the average level of performance.


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


2017 ◽  
Vol 17 (1) ◽  
pp. 104-112 ◽  
Author(s):  
Zijuan Shi ◽  
Gaofeng Luo

Abstract Auction is often applied in cognitive wireless networks due to its fairness properties and efficiency. To solve the allocation issues of cognitive wireless network inamulti-band spectrum, multi-item auction mechanism and models were discussed in depth. Multi-item highest price sealed auction was designed for cognitive wireless networks’multi-band spectrum allocation algorithm. This algorithm divided the spectrum allocation process into several stages which was along with low complexity. Experiments show that the algorithm improves the utilization of spectrum frequency, because it takes into account the spectrum owner’s economic efficiency and the users’equity.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Sign in / Sign up

Export Citation Format

Share Document