The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality of Service (QoS) routing is one of the key enabling techniques for multimedia wireless sensor networks (WSNs). However, the multi-constraints QoS routing problem is an NP-hard problem, and the computational complexity of an exhaustive search over all the paths is too high for large scale multimedia WSNs. In this paper, a novel parallel elite clonal quantum evolutionary algorithm is proposed...
A cognitive radio ad hoc network (CRAHN) can be considered as a special delay tolerant network (DTN) that is composed of mobile secondary users (SUs) with social characteristics. Given intermittent connectivity and spectrum availability, it is a challenging issue regarding how to transmit messages between SUs in a reliable and effective way in CRAHNs. To tackle this challenge, we...
Traditional routing protocols are designed to efficiently find paths containing high-quality links under assumed trust environment. Nowadays, numerous schemes have been proposed to defend attacks with the increasing attention on security issues in the applications of multi-hop wireless networks. However, only limited works consider the routing performance while securing the routing protocols. In order...
With the popularity of different wireless access technologies for Internet access, the integration of heterogeneous wireless networks is foreseen in the near future. Solutions for secured Internet access in such scenario become an urgent requirement. In this paper, we present SHAWK, a platform for secure integration of heterogeneous advanced wireless networks, including cellular networks, wireless...
The wormhole attack is a severe attack in Wireless Mesh Networks (WMNs). It involves two or more wormhole endpoints colluding to capture traffic from one place in the network and replay it to another faraway place through a secret tunnel, so as to distort network routing. It may lead to even more serious threats such as packet dropping and denial of service (DoS). Although a lot of works have been...
In this paper, we investigate the cost-constrained incremental network planning problem in multi-hop wireless networks. Given an existing wireless network, we study the problem of how to add new wireless links to improve the network performance under the deployment cost constraint. After formulating the problem as COst-constrained Incremental Network ($COIN$) problem, we introduce a performance metric,...
A mobile ad hoc network (MANET) is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links. Since MANETs do not have a fixed infrastructure, it is a challenge to design a location management scheme that is scalable, cost-efficient and reliable. In this paper, we propose a reliable backbone based location management scheme, called RBLMS, for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.