The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Varied trust management models for Ad hoc network had been proposed recently. However, there are rare method to evaluate these models making it is difficult to develop the most appropriate trust models in theory, and also it is difficult for a decision maker to choose an optimal trust model to implement in a concrete scene. In this paper, credibility evaluation of trust models based on fuzzy quantization...
This paper chose the WM-G-MR-09 chip, designed and implemented WiFi communication module, set up a real mobile network environment base on Windows CE operating system platforms and IEEE 802.11b wireless network interface. Achieved AODV (Ad-Hoc on-demand Distance Vector) routing algorithm module by calling the API in an adding routing function module. The validation and testing for the algorithm module...
Wireless sensor network is composed of hundreds of sensor nodes involving in limited energy, efficient and low-energy consuming routing algorithm is the crucial problem to the routing design. In this paper, the LEACH protocol, which is a typical clustering routing protocol, has been researched and improved based on energy, the new algorithm is different from the LEACH in the method of determining...
Inter-vehicle communication find increasing application in futuristic intelligent transport systems and ad hoc mobile networks. However, the channel statistical properties for these mobile-to- mobile channel are quite different from traditional cellular wireless networks, and need to modify the simulation method. The paper proposes a method to simulate the Rician-faded mobile-to-mobile local in three-dimensional...
Broadcast plays an important role in route discovery, source paging and information diffusion for mobile ad hoc networks. Flooding is a simple solution to broadcast, but it may cause high redundancy, contentions and collisions, a phenomenon referred to as broadcast storm. Counter-based and position-based solutions can avoid blind flooding to some extent. However, the uniformity aroused by constant...
Two complementary classes of approaches exist to protect high security mobile ad hoc networks (MANETs), prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection. Most previous work studies these two classes of issues separately. In this paper, we propose a framework of combining intrusion detection and continuous authentication in MANETs. In...
In mobile ad hoc networks (MANETs), continuous authentication is desirable so that a system can be monitored for the duration of the session to reduce the vulnerability. This paper presents an optimal biometric-based continuous authentication scheme in MANETs. We formulate the continuous authentication process as a partially observed Markov decision process, and use dynamic programming-based hidden...
Transmission Control Protocol (TCP) is designed for reliable fixed networks, so TCP assumes that the reason of packet losses is network congestion, and accordingly triggers congestion avoidance mechanisms. Unfortunately, this is not true for wireless networks where, due to higher bit error rate and handoff, packet losses are more frequent, whereas TCP attributes these packet losses to congestion in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.