The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We developed an adaptive architecture for ad hoc communications to be used in emergency conditions. Emergencies could be caused by natural or man made disasters. Such events are difficult to predict. Therefore, their situations are accompanied by uncertainty. The experiences of various emergency situations and the related research strongly indicate that reliable and robust communications could facilitate...
Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the network's communication energy dissipation. However, selecting of the cluster head is not easy in different environments which may have different characteristics. In our previous work, in order to deal with this problem, we proposed a power reduction algorithm for sensor...
Vehicular communications are envisioned to play a substantial role in providing safety in transportation by means of safety message exchange. However, the deployment of vehicular networks is strongly dependent on security and privacy features. In this paper, we present a Protocol for Anonymous Authentication in Vehicular Networks (PAAVE) to address the issue of privacy preservation with authority...
In recent years, Mobile Ad hoc Networks (MANETs) are continuing to attract the attention for their potential use in several fields. Mobility and the absence of any fixed infrastructure make MANETs very attractive for mobility and rescue operations and time-critical applications. In this paper, we present the implementation and analysis of our implemented MANET testbed considering the Optimized Link...
In this work, we investigate how WSN performs in the case when sink node moves using different radio models and metrics. We consider routing efficiency, delay and number of received packet metrics to evaluate the performance of WSN using AODV routing protocol, lattice topology, and TwoRayGround and Shadowing radio models. We evaluate the performance of WSN by simulations. The performance evaluation...
Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the network's communication energy dissipation. However, selecting of the cluster head is not easy in different environments which may have different characteristics. In our previous work, in order to deal with this problem, we proposed a power reduction algorithm for sensor...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. We proposed a fuzzy-based CAC system by considering the priority of the on-going connections. We called this system FACS-P. In...
We explore the use of a hybrid and networked system for medical applications. In particular we are interested in monitoring the physiological data of newborn babies. The key element in our design is the use of cell phones as aggregating devices for the sensor collected information. Cell phones in particular enable secure communications with medical wireless sensors. We discuss a key distribution scheme...
The ROLL working group at IETF is currently designing RPL, the Routing Protocol for Low power and lossy networks. RPL is based on organizing the nodes in a network in one or more directed acyclic graphs(DAGs) rooted at the popular/default destinations. The DAG structure naturally supports multipoint-to-point routing towards the DAG root and point-to-multipoint routing from the root towards the nodes...
In this paper, we evaluate the impact of signal to noise ratio (SNR) on the PHY-level packet loss rates on IEEE 802.15.4 links under the additive white Gaussian noise and Rayleigh fading models. We show that IEEE 802.15.4 PHY-level packet loss rate has a step-like response to the SNR deterioration. In other words, the packet loss rate is largely unaffected by SNR deterioration as long as SNR is more...
In this paper, we investigate how the sensor network performs in the case when the event moves with special movement path. We compare the simulation results for four scenarios: when the event is stationary, moving randomly, moving with simple 4 path and boids path. The simulation results have shown that for the case when event is moving randomly the performance is the worst in the four scenarios....
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other...
Directed Acyclic Graphs (DAGs), rooted at popular/default destinations, have emerged as a preferred mechanism to provide IPv6 routing functionality in large scale low power and lossy networks, that include wireless sensor networks and those based on power line communication. A DAG maintains its acyclic nature by requiring that each DAG node must have a higher 'rank' than any of its DAG parents. While...
Numerous applications, ranging from disaster management to smart buildings, have been proposed for sensor networks. The practicality of these applications depends on the ability of users to interact with these networks, in many cases in real time. In this paper we propose that cell phones interact with sensor networks and obtain the relevant information in real time. Cell phones can communicate with...
In this paper, we present the experimental results and evaluation of the SmartBox stimulation device in P2P e-learning system which is based on JXTA-Overlay. We also show the design and implementation of the SmartBox environment that is used for stimulating the learners motivation to increase the learning efficiency. The SmartBox is integrated with our P2P system as a useful tool for monitoring and...
Sensor networks are a sensing, computing and communication infrastructure that are able to observe and respond to phenomena in the natural environment and in our physical and cyber infrastructure. The sensors themselves can range from small passive microsensors to larger scale, controllable weather-sensing platforms. Presently, there are many research work for sensor networks. In our previous work,...
Mobility support has been on the list of most expected features of future Internet for a long period. Both Internet users and content providers look forward to the deployment of Internet mobility support, but none of proposed solutions has been adopted in large scale due to various impediments. In order to assist future researches on this urgent topic, we discuss the origin and fundamental requirement...
Wireless mobile networks and devices are becoming increasingly popular to provide users the access anytime and anywhere. The mobile systems are based on cellular approach and the area is covered by cells that overlap each other. Many handover algorithms are proposed in the literature. However, to make a better handover and keep the QoS in wireless networks is very difficult task. For this reason,...
In this paper, we present the implementation and analysis of our implemented testbed considering the optimized link state routing (OLSR) protocol. We investigate the effect of mobility and topology changing in the throughput of a mobile ad-hoc network (MANET). The mobile nodes move toward the destination at a regular speed. When the mobile nodes arrive at the corner, they stop for about three seconds...
Multi domain networks can be used in several scenarios including military and enterprize networks. In such networks each domain might be under different administrations, which might not want to share all information among them regarding their domain configurations. In such multi domain networks, one major challenge is the support for mobility. We propose a new multi domain mobility (MDM) system that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.