Author :
Abdallah, Mohamed ; Pogge, J. ; Simpson, Andrew
Abstract :
One common feature of almost all wireless protocols is the address structure for source and destination nodes within the wireless network. The paper aims at demonstrate and establish a multi-node Cluster-Head sensor Ad Hoc network, enable secure transfers on data on that network using encryption algorithm, propose a simple Ad Hoc protocol for joining and transferring data to a Cluster-Head facilitator, collect temperature, battery voltage, and signal strength as part of the packet, and present data collected using GUI/web-based system. In this paper, a low-level RF interface to establish clear channel, and cluster loin and link is proposed, query and response for remote node sensor data are implemented, both raw and encrypted data packets using a common encryption algorithm are tested and, the network is monitored at the Cluster-Head attached to the PC and the network activity is posted on-line. The proposed structure is purely independent on the physical and network layers of the RF protocols. The data is received if the preamble and CRC show valid on receipt of an RF packet, the resulting 64 bytes is decrypted and transferred to the network layer where the port, type, address is evaluated. All of the interface and processing is implemented on the network layer, the physical interface has cleared the FIFO and prepared the device for additional receipt or response transmission depending on the packet type. The impact of the cognitive addressing is not felt until the network passes the packet up to the application layer. The network layer will determine if the incoming request or message is for this node and then passes the structure up to the application with the received data and type of packet determined by the port number. The cognitive addressing byte simply allowed the packet to be accepted if it has no bearing on the type of request or application it manipulates. As the cognitive data is passed as part of the address for the node, as matching the node address- is required for response. The real purpose of the proposed method is to reduce network traffic by identifying general capabilities, in the simple join request and cut down on broadcast response requests by including only certain node need be concerned with the broadcast message.
Keywords :
Internet; ad hoc networks; cognitive radio; cryptographic protocols; graphical user interfaces; telecommunication computing; telecommunication traffic; wireless sensor networks; GUI system; RF packet; RF protocols; Web-based system; ad hoc protocol; battery voltage; broadcast response requests; cluster-head facilitator; cognitive addressing byte; common encryption algorithm; destination nodes; intrinsic cognitive network addressing; low-level RF interface; multinode cluster-head sensor ad hoc network; network activity; network traffic reduction; remote node sensor data; response transmission; signal strength; source nodes; temperature collection; wireless protocols; Ad hoc networks; Data acquisition; Encryption; Ports (Computers); Protocols; Radio frequency; Ad Hoc; Encryption; RF protocols; RF protocols — Ad Hoc;