Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Mobile Ad Hoc networks are autonomously self-organized networks without infrastructure support. We study Ad Hoc network routing protocol based the standard protocol in the IEEE 802.11 MAC, and the MAC layer label Switch routing protocol (MLLS) is proposed in this paper. It is designed and implemented by cross-layer method afterward. The proposed protocol utilizes the MAC frame to carry a complete...
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network,...
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an...
Trust is one of the basic assumptions that we use in every day life. In ad hoc networks, routing protocols implement trust implicitly between the nodes of the network. Unfortunately, the implicit trust relations are not used by nodes whereas the attacks on ad hoc routing protocols precisely lead to the violation of at least one of these trust relations.In this paper, we demonstrate that a node can...
Several geographic routing protocols using location information have already been proposed for ad hoc networks to improve performance of ad hoc routing protocols, such as Location-Aided Routing (LAR) protocols. Through using location information, LAR protocols restrict the search for a new route to a smaller Request Zone of the ad hoc network. This results in a significant reduction in the number...
One of the most important routing protocols used in ad hoc networks is AODV. This protocol is a reactive protocol that searches routes only when they are needed. It always exchanges control packets between neighbor nodes for routing. For reduction of control overheads and bandwidth consumption and make AODV usable for VANET, we have eliminated route discovery phase by restricting neighborpsilas distance...
Wireless Mesh Networks (WMNs) are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and preserving the mesh connectivity. There are several features which might help to design an efficient routing protocol suitable for wireless mesh networks such as improved performance metrics, link or path optimization, mobility management,...
Opportunistic routing has recently attracted much attention as it is considered a promising direction for improving the performance of wireless ad hoc and sensor networks. With opportunistic routing, intermediate nodes collaborate on packet forwarding in a localized and consistent manner. Opportunistic routing greatly increases transmission reliability and network throughput by taking advantage of...
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.