The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
In this paper, the performance of network codingbased gossip algorithms -- i.e. algebraic gossip algorithms -- is analyzed on random geometric graphs under static and mobile environments. The lower bounds for the convergence time of algebraic gossip algorithms are derived based on the conductance, and these bounds are O(n log n log ε -- 1 -- log n log ε -- 1) with node...
Wireless sensor networks (WSNs) is an area of research that has been getting a lot of attention lately. This is due to the rapid advancements in the design of wireless devices which have increasingly more processing, storage, memory, and networking capabilities. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of...
The data delivery in Vehicular Ad Hoc Networks (VANETs) depends on the mobility of the vehicles (e.g. with carry-and-forward). However, the mobility of the vehicles is not only affected by the nodes themselves, but also by some external means such as the traffic lights. The red light stops the vehicles at the intersection, which will increase the delivery delay of the messages carried by the vehicle...
Data delivery in Vehicular Ad Hoc Networks (VANETs) is based on the vehicles on the roads. However, the distribution of vehicles could be affected by some external means. For example, the traffic light or pedestrian signal could block the traffic flow moving onto a road. Thus, a gap between vehicles will appear at the entrance of the road, where the distance is larger than the communication range...
Many environmental, commercial, military, and structural monitoring applications of wireless sensor networks (WSNs) involve lining up the sensors in a linear form, and making a special class of these networks; we defined these in a previous paper as Linear Sensor Networks (LSNs), and provided a classification of the different types of LSNs. A multihop approach to routing the data from the individual...
Data delivery in Vehicular Ad Hoc Networks (VANETs) is based on the vehicles on the roads. However, the distribution of vehicles could be affected by some external means. For example, the traffic light or pedestrian signal could block the traffic flow moving onto a road. Thus, a gap between vehicles will appear at the entrance of the road, where the distance is larger than the communication range...
There has been much research focusing on the routing problem in delay tolerant networks (DTNs). Much of the work has mainly focused on coding schemes for message distribution, while other work has been done on the probabilistic forwarding. Coding schemes achieve higher delivery rate via redundancy before forwarding, while probabilistic forwarding efficiently limits the abuse of the store and forward...
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied extensively, due to the unique characteristic of frequent partitioning in DTNs, multicasting...
In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is different every time when the relative location of relay node to the destination changes. The configuration in the entire network when all the succeeding paths from a relay node are blocked by local minima is irregular and its...
Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade the performance of applications such as localization and data collection. A wormhole attack is one of the most severe threats to an ad hoc network. Unfortunately,...
Group mobility is quite usual in many realistic mobile and wireless environments, but it is rarely adopted in multipath routing. We propose a Group mobility-based Multipath Routing protocol (GMR) for large and dense mobile ad-hoc networks (MANETs). The GMR protocol adapts intra-group routing and inter-group routing to handle group mobility. The routing table maintained by a group leader is used to...
Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location information for nodes is still a challenge. So far, many protocols have been proposed to solve this problem, most of which offer exact routing location information, and are complicated to implement in practice. In this paper, we propose...
Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communication. In this paper, we present a new scheduling method called virtual backbone scheduling (VBS). VBS employs heterogeneous scheduling, where backbone nodes work with duty-cycling to preserve network connectivity, and non-backbone...
Mobile ad-hoc networks (MANETs) usually contain sparse or even empty regions called holes. The local optimum problem will occur when routing packets meet holes in the network. In this paper, we propose a novel hole-reshaping routing protocol (HRR) in large-scale MANETs. It effectively solves the hole problem by regularizing a hole with an ellipse, and then locally broadcasting the hole information...
Data privacy in vehicular ad hoc networks (VANETs) is a practical issue currently under investigation. Privacy-preserving anonymity authentication in networks is a challenging topic related to security, anonymity, network, and data privacy. Existing anonymity authentication in VANET is based on a k-anonymity model. An on board unit (OBU) chooses an adaptive anonymity group size in a request to an...
Building a ldquostraightforwardrdquo path in wireless ad hoc sensor networks (WASNs) not only avoids wasting energy in detours, but also incurs less interference in other transmissions when fewer nodes are involved in the transmission. This plays an important role in recent WASN applications that require a streaming service to deliver large amount of data. In this paper, we extend our early work on...
Conventional routing algorithms in mobile ad hoc networks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalable to large networks. On the other hand, in delay tolerant networks (DTNs), routing protocols use the mobility- assisted, store-carry-forward paradigm which allows delivery among disconnected network components. Adaptive...
Vehicular ad hoc networks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drivers to cooperate and contribute to packet forwarding in vehicle-to-vehicle or vehicle-to-roadside communication. In this paper, we examine this problem, analyze the drawbacks of two straightforward schemes, and present a secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.