Bluetooth is an open specification for short-range wireless communication and networking, mainly intended to be a cable replacement between portable and/or fixed electronic devices. The specification also defines techniques for interconnecting large number of nodes in scatternets, thus enabling the establishment of a mobile ad hoc network (MANET). While several solutions and commercial products have been introduced for one-hop Bluetooth communication, the problem of scatternet formation has not yet been dealt with. This problem concerns the assignment of the roles of master and slave to each node so that the resulting MANET is connected. We introduce two novel protocols for forming connected scatternets. In both cases, the resulting topology is termed a bluetree. In our bluetrees the number of roles each node can assume are limited to two or three (depending on the protocol), thus imposing low slave management overhead. The effectiveness of both protocols in forming MANETs is demonstrated through extensive simulations.
We address multi-radio networks, i.e., wireless networks where the nodes are equipped with multiple air interfaces. We analyze, both analytically and via simulation, various gains that the multi-radio environment can provide. First we investigate the gain in network connectivity by modeling the topology of a multi-radio network by a multigraph. The gain is captured by introducing the novel graph theoretic concept of the multigraph advantage. It is the surplus of connectivity over the sum of the individual connectivities, as we put together several graphs to form a multigraph sum. We first prove that in the traditional random graph model it results in a strict super-additive behavior. We validate the theoretical results via simulations and show that similar phenomena occur in geometric random graph models. We then investigate, via ns2-based simulations, the nodal energy consumption as well as the end-to-end packet latency needed to route packets in a multi-radio network.
Fifth-generation (5G) systems will extensively employ radio access network (RAN) softwarization. This key innovation enables the instantiation of "virtual cellular networks" running on different slices of the shared physical infrastructure. In this paper, we propose the concept of Private Cellular Connectivity as a Service (PCCaaS), where infrastructure providers deploy covert network slices known only to a subset of users. We then present SteaLTE as the first realization of a PCCaaS-enabling system for cellular networks. At its core, SteaLTE utilizes wireless steganography to disguise data as noise to adversarial receivers. Differently from previous work, however, it takes a full-stack approach to steganography, contributing an LTE-compliant stegano-graphic protocol stack for PCCaaS-based communications, and packet schedulers and operations to embed covert data streams on top of traditional cellular traffic (primary traffic). SteaLTE balances undetectability and performance by mimicking channel impairments so that covert data waveforms are almost indistinguishable from noise. We evaluate the performance of SteaLTE on an indoor LTE-compliant testbed under different traffic profiles, distance and mobility patterns. We further test it on the outdoor PAWR POWDER platform over long-range cellular links. Results show that in most experiments SteaLTE imposes little loss of primary traffic throughput in presence of covert data transmissions (<; 6%), making it suitable for undetectable PCCaaS networking.
Chapter 6 focuses on the design and implementation of media access control (MAC) protocols for cellular telephony, wireless ATM and ad hoc networks. Fundamental MAC protocols include frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), random access schemes such as ALOHA and carrier sense multiple access (CSMA).
This thesis presents the use of positioning systems, such as the Global Positioning System, to enable robust multipoint communication in ad hoc networks, i.e., wireless mobile networks with no fixed infrastructure, in which communication is usually multi-hop (namely, each node is also a router) and all nodes can be mobile.
The novelty of the proposed approach consists in the observation that traditional approaches to routing, multicast and broadcast for ad hoc networks suffer from the dependency of the routes between any two (or more) nodes on the identity of the intermediate nodes. Namely, routes depends on the network topology as defined by which nodes are in the route from a source node to a destination node. Here we propose the use of location information, i.e., positioning information with respect to a positioning system that is unaffected by the mobility of the nodes, and we show how the use of location information provides an effective way of bypassing most of the problems imposed by the mobility of all nodes.
In particular, the thesis describes an efficient method for the dissemination of location information in wireless mobile networks, and we then introduce several multipoint communication protocols that range from directional routing, to geographical messaging, to source routing, multicast and broadcast, as well as methods for route availability determination. All these protocols are based on the newly introduced use of location information.
Digital watermarking involves embedding copyright marks (watermarks), often imperceptibly, in multimedia objects to enhance or protect their value. In this paper we describe a novel watermarking algorithm suitable for video coding techniques such as MPEG-4 and H.263/H.324 and we test it in a wireless environment. The proposed algorithm satisfies critical properties not all of which are available in previous solutions. These properties include: resistance (robustness) of the embedded watermark to the error-prone nature of wireless channels as well as to video frame loss or misplacement, negligible probability of reading a non-embedded watermark, non-degradation of the marked video sequence and the possibility to mark video objects (e.g., MPEG-4 objects) in a single frame separately. Experimental results are given that show how these and other properties are achieved when video sequences are corrupted with errors that are typical of a wireless channel.