The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANET is very hostile environment to design and implement computing algorithms. One of the major concerns in MANET's is to elect a coordinator in order to manage many mobile computing applications. In the contemporary literature, many protocols exist for leader election. However, most of them use message broadcast technique. The present article proposes a technique that avoids the broadcast of messages...
Secure routing is the milestone in mobile ad hoc networks. Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for...
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network consists of resource-rich mobile sink node and resource-constrained sensor nodes forming a square grid. Sink may be multihop away from the sensor nodes and in order to collect the data,...
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contains a set of resource-rich dynamic sink nodes forming an ad hoc network. The sinks at layer second are responsible to monitor and collect data from a region, called cluster. So the sinks...
Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond their base transceivers. Since routing is the backbone of any mobile ad hoc communication, thus if there occur any flaws in the routing, the whole of the communication would come down to a stand still...
Mobile devices used in e-commerce or m-commerce have been in existence for a few years now, however in the last couple of years they have started playing a significant role in our life as the technologies in the Internet advance. A number of mobile applications and services are already in the market and more are expected to become available in the future. As more demand is placed on mobile devices,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.