The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded...
Aiming to eliminate the mismatch between structured peer-to-peer (P2P) network's logical topology and physical topology, which exists in these classic wired P2P protocols, the representative P2P protocol-Chord which is hardly suitable for wireless network is modified, and an approach of getting optimal node identifier (ID) to realize topology awareness is proposed by exploiting nodes' relative location...
Recently there have been many research topics in wireless sensor networks (WSN) for efficiently monitoring the environments, and localizing, detecting, and classifying targets of interest. Most of these researches assume that the environment to be stable. On the other hand, if the sensor nodes are deployed randomly, the establishing connection between the sensor nodes is critical importance. In this...
The fatal weakness of wireless sensor is the problem of energy consumption. The AODV protocol is based on the minimum number of hops. However, it may not be the optimal routing. Considering from the perspective of remaining energy of nodes, we found this protocol is more likely to result in the death of nodes. In order to solve this problem, we divided the nodes into three stages according to the...
With continuously development of the ad hoc network technology, integrating with other networks becomes one of the trends. Due to the involvement of other networks, routing strategy needs to change with the development. To considerate the key factors whose influence are serious comprehensively is needed. For those reasons, this paper proposes a novel concept of the optimal routing function, which...
To achieve efficient broadcasting with low interference and low energy consumption, each node optimizes its transmission power. In a tree-based topology, the message of node u can be overheard by nodes which are in the region of transmission radius of node u but not in a logical neighborhood of u. Therefore, some protocols have been proposed to reduce energy consumption by using overhearing. Since...
Considering that ordinary ZigBee based systems operate at a rate of 250 kbps, which imposes various limitations on their applications, and that there are 16 independent channels at 2.4 GHz, this paper presents a novel approach of FPGA controlled, ZigBee protocol based multi-frequency high speed wireless Ad Hoc network. The system employed five individual ZigBee modules around a FPGA controller, merging...
In this paper, we modify OLSR for MANET nodes to achieve full connection to Internet through multiple mobile gateways. We present a proactive mobile IP approach using Hello message and TC message to maintain the MANET nodes movement. The mobile gateway multiple metrics selection algorithm can select the best one among the active multiple mobile gateways. The simulation result shows that our approach...
In order to enhance the security of vehicular ad hoc networks (VANETs). By dividing the roadside units (RSUs) into application-RSUs (AP-RSUs) and authentication-RSUs (AU-RSUs) in application layer, we give a new security scheme for VANETs. This functional division of RSUs makes VANETs more logically clear. AU-RSUs record vehicles' real identities and assign temporary certificates to them. The temporary...
It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad...
In this paper, we studied the multi-hop broadcast algorithms for delivery of safety message in inter vehicle communication environment. In MANET environment, there are three multi-hop broadcasting schemes such as probability based methods, area based methods and topology based methods. We simulate MANET based multi-hop broadcasting schemes and evaluate the performance of our work in order to analyze...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.