The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because it is hard to depict real world traces, researchers proposed some mobility models in the study of mobile ad-hoc networks. It is aware recently that some mobility models will lead to non-uniform node distribution, which decreases the credibility and validity of simulations. Many researchers reconsider the node distribution characteristic for random waypoint model and have gotten some valuable...
Many applications in Wireless Sensor Networks (WSNs) are, to a great extent, determined by networks security. But the security technology only based on encryption can not solve the new malicious behaviors because encryption technology can not effectively prevent attacks from internal opponents or error service from nodes. A pair-wise key update scheme in WSNs based on reputation model is proposed...
Stationary properties of node distribution and speed distribution for random direction model were studied. Firstly, geometric probability was applied to analyze stationary node distribution. A closed form probability density function for circular regions was obtained which indicated that mobile nodes tended to disperse with simulation advancing. Secondly, we applied palm calculus to calculate probability...
Mobility models characterize mobile users' movements of location, velocity and acceleration for the difficulty to obtain traces in real world. A classification of proposed and applied mobility models for MANET (mobile ad hoc networks) are given in this article firstly. The probability distribution of nodes is a basic foundation for the theoretic research of mobility models for MANET, such as the work...
Wireless sensor networks (WSNs) is the next generation of sensor network and the research of network topology optimization has the important meaning for present and future. By making full use of the information about the node position and energy, the WSNs topology algorithm based on immune principle is proposed in this paper, and the simulation results show that this algorithm improves the performance...
LDoS (low-rate denial of service) attack is periodic, stealthy, and with high efficiency, which has become a great threat to the network security. Previous researches about LDoS attack mainly focus on its impact on wired networks. However, our analysis shows that such attack could also be launched in ad-hoc network, and as a completely distinct MAC layer protocol is adopted in this environment, the...
WSN (Wireless Sensor Network) is constrained by limited radio propagation range as well as battery life. Multicast is an efficient method to support group communication and decrease communicating energy. It is challenging to design multicast routing protocol for WSN. The mesh-based protocol ODMRP (On-Demand Multicast Routing Protocol) is our focus. Its forwarding group can be used not only for delivering...
Concept of small-world is applied in the context of wireless multi-hop networks in this paper. We build a network model by selecting a small part of nodes and magnifying their communication distance. It is proved that this model behaves small-world character, mainly in average path length and clustering coefficient. Based on this model we put forward an uneven probabilistic flooding algorithm. Simulation...
In this paper, we firstly study the connectivity of ad hoc networks and establish the correlations of connectivity with average node degree. Then, based on the simulation result of connectivity, we present a probabilistic flooding algorithm that can tradeoff the efficiency and reliability by using weighting factor. Thus, we treat the well-known contradictions in our new algorithm. Our simulation results...
We make some modifications in this paper to the DAP-NAD-CJ (deterministic adaptable priority net access delay with cycle jump) algorithm for multicast applications. The new algorithm assigns wireless channel access slot unevenly between stations in the network so that the multicast source can access channel as fast as possible. We then proved by calculations and simulations that the modified algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.