The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks has gained increasing attention from both the research community and actual users. As sensor nodes are generally battery-powered devices, the critical aspect is to reduce the energy consumption of nodes so that the network lifetime can be extended. In this paper we tried to implement the cross-layer design between Physical, MAC and Network layer. Based on the above cross layer...
Two existing well-established routing protocols in wireless sensor network - Directed Diffusion and Rumor Routing use two different notions lying in the opposite extreme from each other. Directed Diffusion initiates the protocol from the sink, which propagates interest messages through the network in search of a matching event. In contrast, nodes themselves propagate the rumor of an event in Rumor...
Position based routing protocols are kinds of routing protocols, which use nodes location information, instead of links information to routing. In position based routing protocols, it supposed that the packet source node has position information of itself and it's neighbors and the packet destination node. Greedy is a very important position based routing protocol. In one of it's kinds, named MFR...
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the...
Existing on demand routing protocols for MANET's use shortest path as the routing metric, which leads to overuse of an existing path thereby creating hot spots leading to congestion and packet loss. Hence it is important for a routing protocol to adapt to increasing load conditions by timely estimating the load and avoid such congested nodes during route formation. Estimating the load is difficult...
Jiter is referred as the variability of latency in packets over a period of time. In mobile network, topology changes rapidly which causes a reconfiguration of network. Therefore the latency of transmission also varies. It gives rise to a QOS problem as predicting exact latency is difficult. Hence time bound or real time packets can not be guaranteed highest QOS in MANET. It this paper we propose...
Packet scheduling has been a very popular paradigm to ensure maximum throughput and bounded delay access for packet flows. This work proposes packet scheduling approach to QOS provisioning in multihop wireless networks. Our scheduling mechanism achieves fair and maximum allocation of the shared wireless channel bandwidth for MANET's that consist of General nodes and Backbone nodes. Backbone nodes...
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network...
Ad hoc wireless networking is a new approach for wireless communication with its potential applications in very unpredictable and dynamic environments. These networks have no infrastructures for achieving end-to-end routing of packets in the network. The nodes communicate between each other without the intervention of centralized administration, thus each node acts both as a router and as a host....
In wireless sensor network, we have 2 type of routing; one of them send data from the sensor nodes to the sink and another send some data from sink to the sensor nodes such as programming/retaking binaries, queries and commands. In this paper we present a new routing algorithm base on ID that is named ID-Leach. This protocol assigns an unique ID with binary number to each sensor nodes. This protocol...
In Ad hoc networks, links between nodes may be asymmetric for many reasons. In general, a graph with asymmetric link costs provides a more realistic network modeling perspective. In an earlier work, we proposed a broadcast routing scheme based on Edmonds algorithm for ad hoc networks with asymmetric link costs. The method involved setting up link state, finding minimum in-edge, detecting cycles, re-weighting...
In mobile ad hoc networks, the unstable transport layer and inhibited amount of traffic being carried out by the network is owing to the high packet loss rates and frequent topological changes. It is essential that least available bandwidth and end-to-end latency along with congestion around a link are integrated in a QoS-based routing metric for MANETs. In this paper we develop a QoS-based, robust...
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with rdquonationalrdquo firewalls, citizen profiling and other rdquounethicalrdquo uses of Information Technology. Current steganographic methods that implement covert...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.