Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Mobile free space optical (FSO) links suffer from frequent link blockages due to opaque obstructions or link degradations that can result in degraded or failed networks. In this paper, a dynamic layer-1 based topology and routing control methodology is presented for assuring connectivity in networks with fragile links. Core components of this methodology are described with special emphasis on the...
As the world becomes increasingly dependent on dynamic and up-to-the-moment information, we recognize that broadband networks must be able to convey this information timely and wirelessly, to and from users in motion. Varieties of 802.11 compliant equipment and other types of broadband wireless equipment have been proposed for, and in some areas, being used to meet this need. There have been questions...
Certificate validation based on PKIX protocols does not work well under the particular conditions found in a MANET: Episodic connectivity and low bandwidth. We propose an overlay network of validation proxy servers which exploit cooperative caching of recent validation results. The proxy overlay improves the availability of the validation service and reduces the network traffic. The design employs...
In previous work, we proposed a ??Bootstrap?? protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of this Bootstrap protocol, striving to answer the following questions: 1) To what extent can an adversary undermine the correctness and performance of the...
In this paper, we highlight the impact of variable Push-To-Talk (PTT) delays on performance of a heterogeneous Land Mobile Radio (LMR) network. We first present the PTT delay values and distributions observed for some commonly used LMR nodes. An analytical model is then developed to estimate the asymmetric throughput problem. The results obtained using this model and simulations show that a LMR node...
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
To support research in wireless mobile ad hoc networks, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) have worked jointly to establish an advanced emulation environment. A key component is a mobile ad-hoc network emulation testbed where algorithms and applications can be subjected to representative wireless network conditions. The testbed is based on a version of the...
Self deployment of nodes in mobile ad hoc networks (MANETs) is a challenging task due to the characteristics of a MANET such as dynamically changing topology, lack of centralized authority, decentralized architecture and heterogeneous nodes. In military applications where the deployed nodes, due to their limited communication ranges and hostile environment, may act selfishly with conflicting individual...
Non-uniform distributions of mobile nodes are the norm for a mobile network. Often, there can be concentration areas or grouping of nodes. Early work has explored these features to help message disseminations. However, a mobile network application can generate complex mixing mobility patterns that render these work less effective and efficient. In addition, many applications run with in a sparse mode,...
Inter-domain routing for MANETs (mobile ad hoc networks) draws increasing attention because of military and vehicular applications. The existing border gateway protocol (BGP) is the de facto inter-domain routing protocol for the Internet. But BGP is not applicable to MANETs because the BGP design is based on a static Internet which does not support dynamic discovery of members, and cannot scale to...
In this paper, we propose a novel approach, which is termed heterogeneous intelligent filtering (HIF), for intelligent control and application data filtering in multi-domain heterogeneous networks. HIF creates intelligent gateways to rapidly and autonomously adapt the flow of information content to the changing mission needs and network characteristics. HIF employs a MANET management protocol (termed...
In this paper, we present our work on designing a communication network for orbit access in future lunar exploration missions. We first discuss the characteristics of space communication for lunar missions that influence the network design, and then address some highlighted issues in the system framework which adopts both the delay-tolerant network (DTN)-based technologies and the mobile ad hoc network...
As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One of the approaches in data-centric storage is that the nodes that collected data will transfer their data to other neighboring nodes that store the similar type of data. However, when the nodes are mobile,...
In this paper, a technique for detection of wormhole attacks based on distance verification is proposed for mobile ad hoc network (MANETs) applications. A node estimates its distances to a sender node based on the received signal strength (RSS) of received packets, and uses them to verify against the distances computed from the location information in the packets. The verification is formulated as...
This paper discusses a new capability, the Hybrid Pseudo-Random (HyPR) Dynamic Force Generator. This capability uses geographic position data of select ground platforms in an operational unit to quickly generate realistic, dynamic positions for the remaining unit platforms. This capability (implemented in MATLAB) was initially designed to generate scenario-linked laydowns for an entire ~3000 platform...
Robustness, security, anonymity, and scalability are valued features for mobile ad hoc network routing protocols. Unfortunately, the existing ad hoc routing protocols have limitations in each area. In this paper, we first analyze several existing mobile ad hoc routing protocols for robustness, security, anonymity, and scalability. Based on the analysis, we propose a new robust anonymous ad hoc on-demand...
Studying the behavior of mobile ad-hoc networks (MANETs) is essential for predicting the performance of the network over the mission/application duration. In this work, we develop a framework for automating the network design to aid the user in tuning the design parameters as the mission progresses. We show the different states that the automated design manager (ADM) goes through to support different...
Limited capabilities and mission requirements imply that nodes in tactical mobile ad-hoc networks (MANETs) carry a significant risk of being compromised physically or logically. In addition nodes or groups of nodes may defect, which is a particular concern in coalition environments where networks may spread beyond organizational boundaries. To identify defecting or compromised nodes including Byzantine...
We present a complete scenario driven component based analytic model of 802.11 MAC and OLSR routing protocols in MANETs. We use this model to provide a systematic approach to study the network performance and cross-layer analysis and design of routing, scheduling, MAC and PHY layer protocols. The routing protocol is divided into multiple components. Componentization is a standard methodology for analysis...
Traditional approaches for testing MANET protocols and applications prior to field experimentation often involve simulation tools or small-sized physical testbeds. However, simulation tools typically do not run in real-time and rely on simplified models rather than a real system, while physical testbeds are prohibitively expensive to build and operate. A more practical method is to use emulation tools...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.