The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The multiplicatively weighted Voronoi diagram (MW-Voronoi diagram) is used to discover the coverage holes corresponding to different sensors with different sensing...
Dissemination latency is critical to the applications of {\em cognitive radio networks}, which have become an important component of current communication infrastructure. This paper investigates the distribution of dissemination latency in a cognitive radio network where licensed users (primary users) are static and cognitive radio users (secondary users) are moving under general mobility, which provides...
Continuous authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints...
Restoring connectivity subjected to the failure of mobile node(s) is an important research challenge in mobile ad hoc networks. To achieve this objective, a Connectivity Restoration Strategy (CRS) is developed, aiming at restoring the connectivity of mobile network whenever it is partitioned from multiple simultaneous node failures. The proposed strategy is fully distributed and requires only local...
The Bittorrent P2P (Peer-to-Peer) network is now well-known and widely used. In Europe, it is mainly used with people connected to ADSL networks. However, with the emergence of various access networks with various capabilities (bandwidth, delay, etc.), we might wonder if Bittorrent is well suited to those heterogeneous networks. Moreover, some mobile 3G network operators even forbid the use of P2P...
A lot of access points (APs) in wireless mesh networks (WMNs) are battery powered. In order to minimize their energy consumption, the APs can adaptively adjust their transmission power and time based on various network conditions. In this paper, the problem of minimizing the AP energy consumption is formulated as an optimization problem with the constraint to satisfy the throughput requirements of...
Ensuring timely delivery of event reports is a critical requirement in mobile sensor networks, as the effectiveness of area surveillance depends largely on the sensor network response delay. However, due to the sensor mobility and the energy limitation, fast report transportation is constrained by the intermittent wireless link connections between sensor nodes. We derive lower and upper analytical...
Traffic analysis is considered the most powerful strategy of disclosing the hidden communication relations in an anonymous communication system. Statistical traffic analysis attacks are even more subtle in that the attackers are usually eavesdroppers who do not modify the network's behaviors. Moreover, the attackers even do not need to look into the traffic content, which may be encrypted, in order...
In wireless networks, interference that is generated by undesired transmitters dominantly limits network performance. The correlation of node locations (in mobile or static networks) makes the interference temporally correlated. In this paper, we quantify the temporal correlation of the interference in mobile Poisson networks. More specifically, we obtain closed-form expressions for the interference...
In this paper we study the connection availability of wireless networks from the perspective of end users with individual mobility, in contrast to existing studies mainly focusing on network-centric connectivity. Specifically, we evaluate the user connectivity by two metrics: neighbor connection time and neighbor isolation time. The former is the time for a node being connected with at least one neighbor;...
Due to the accelerating uptake of mobile broadband services, Quality of Experience (QoE) assessment and optimization for wireless networks has become a topic of vital importance. In this field, subjective quality evaluation methods based on MOS (Mean Opinion Score) are the most widely used approaches for understanding and measuring perceived performance. However, while these methods have been proven...
Cooperative communication can significantly enhance transmission reliability and bandwidth efficiency in wireless networks. Most existing works are focused on physical layer issues of cooperative communications. Many upper layer aspects of cooperative communications merit further research. In this paper, we investigate its impacts on network topology and capacity. Specifically, we present a novel...
In the open MANETs, nodes with different goals expect to benefit from others, but are unwilling to share their own resources. These selfish behaviors have posed increasing research challenges for cooperation. Negotiation as a key form of interaction for two or more parties enables nodes to announce their contradictory demands and seek to an agreement by concession. In the paper, the Service Negotiation...
Source-independent broadcasting protocols select a subset of nodes in a network as broadcasting nodes to cover the entire network. The selection of broadcasting nodes is performed prior to actual message transmission. These broadcasting nodes collectively form a connected dominating set or CDS. Aiming at finding a minimum CDS, a source-independent broadcasting protocol consists of two phases. In this...
In most mobile-assisted localization schemes, mobile anchors follow predefined or random trajectories to send beacon messages around. Although working well in regular and uniform networks, predefined or random trajectories lead to wasted efforts in irregular and non-uniform deployment. We propose a novel scheme of trajectory design by utilizing the topology information of the network. Based on rigidity...
Most existing reputation systems designed to cope with selfish MANET nodes rely on heuristics and are studied via simulation, with a focus on the consistency of obtained reputation metrics and their effect on network performance given specific corrective actions. We present a novel data-centric reputation system and an analytic evaluation framework where the notion of effectiveness is internal to...
Security is an important issue in mobile ad hoc networks (MANETs). However, security schemes have significant impacts on throughput. That is because 1) they need some overhead and consume some network resources, thus decrease throughput consequently, 2) most previous works consider security and throughput separately in designing a MANET, which can not achieve an overall optimization of network performance...
This paper deals with the handover measurement in cellular networks. The work is dedicated to network modeling and performance evaluation. The exposition concentrates on temporal evolution of the scanning process with key events: (i) a suitable handover target found, (ii) call drop or service failure, and (iii) scan withdrawal. By observations on the stochastic properties of best signal quality and...
Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and rescue, vehicular networks). In these networks it is important to be able to efficiently propagate information across domains in multicast mode (e.g., situation awareness dissemination, commands, streams). Several multicast protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.