The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network throughput and packet delay are both important performance metrics in Ad-Hoc networks. While uncorrelated mobility has been proved to be able to increase the network capacity at the cost of delay, the influence of correlated mobility on network performance has not been well studied. In correlated mobility model, nodes in the same group are constrained to lie in a disc area, whose center moves...
In order to share information among all nodes, an all-to-all-broadcast scheme is needed for situation awareness networks. For this type of distributed sensor network, a directional antenna array, called multi-beam adaptive array (MBAA) is proposed to improve the transmission range and reject the interference. In this paper, an all-to-all-broadcast oriented MAC protocol is designed based on receiver-oriented...
Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interference to the transmissions of other users. Because of the dynamic properties of CRNs, the issue of...
In this paper, we propose two efficient ID-based threshold broadcast encryption schemes in the standard model for a mobile ad hoc network. In the first scheme, PKG chooses the threshold value and the broadcaster can choose the privileged set. But in our second scheme, the broadcaster can choose the privileged set and the threshold value at the time of encryption. In addition, our schemes are provable...
In this paper we focus on the 0/1 fairness problem of the DCF protocol in multi-hop ad hoc network. We find that the DCF protocol can not avoid the carrier interference produced by the interference transmitter to the receiver, when the interference transmitter locates in the collision interference range of the receiver and out of the carrier sensing range of the transmitter. This is the primary cause...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.