The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor deployment is one of the key topics addressed in Wireless Sensor Network (WSN). This paper proposes a new deployment technique of sensor nodes for WSN called as Quasi Random Deployment (QRD). The novel approach to deploy sensor nodes in QRD fashion is to improve the energy efficiency of the WSN in order to increase the network life time and coverage. The QRD produces highly uniform coordinates...
The interconnection of mobile devices in urban environments such as shopping malls can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban environment which not only provides the necessary services to the user, but also ensures that the network is energy efficient. In this paper, we propose an energy efficient dynamic routing...
MANETs can manage without fixed infrastructure and can stay active rapid changes in the network topology. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to appropriately route traffic. Routing with Scalable and robustness performance is one of the key challenges in deploying Mobile Ad-Hoc Networks. In this paper, we deliberate on...
In wireless sensor networks (WSNs), message security is an important concern. The protection of integrity and confidentiality of information and the protection from unauthorized access are important issues. However, due to factors such as resource limitations, absence of centralized access points, open wireless medium and small size of the sensor nodes, the implementation of security in WSNs is a...
In this paper, we present a very simple and efficient end-to-end algorithm to handle wormhole attacks on ad hoc networks with variable ranges of communication. Most of the existing approaches focus on the prevention of wormholes between neighbors that trust each other. The known end-to-end mechanisms assume that all the nodes of the network have same communication range. To the best of our knowledge...
In this paper, we present a very simple and efficient end to-end algorithm to handle wormhole attacks on ad hoc networks. We provide a lower bound on the minimum number of hops on a good route. Any path showing lesser hop counts is shown to be under attack. Our algorithm requires every node to know its location. With very accurate GPS available, this assumption is not unreasonable. Since our protocol...
Lack of infrastructure, central controlling authority and the properties of wireless links make mobile ad hoc networks (MANETs) vulnerable to attacks. Several protocols have been proposed to make the routing protocols handle attacks in MANETs. These protocols detect the misbehaving nodes and re-route the data packets around them, mostly along the shortest such path. However, no single protocol handles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.