The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this paper, we present a data collection protocol for wireless sensor networks employing a number of mobile sinks. For satisfying timely delivery of sensory data to mobile sinks, sinks are forced to visit only an appropriate number of rendezvous nodes while the remaining nodes send their data through multi-hop communication toward these nodes. The proposed approach achieves prolonged network lifetime...
Efficient event reporting is of vital importance in wireless sensor networks (WSNs). This is especially true in critical-time applications, where ensuring an adequate report latency allows a proper reaction from the network to the occurring phenomena. Despite a QoS analysis based on mean report latency is clearly insufficient for critical-time applications, it is oftentimes presented as the main performance...
Two of the main issues in wireless industrial Internet of Things applications are interoperability and network lifetime. In this work we extend a semantic interoperability platform and introduce an application-layer sleepy nodes protocol that can leverage on information stored in semantic repositories. We propose an integration platform for managing the sleep states and an application layer protocol...
This paper considers the problem of distributed neighbor discovery in multi-channel wireless networks. We propose a protocol in which nodes randomly select a channel and decide whether to transmit or listen for neighbor discovery beacons. When nodes transmit, they use epidemic information dissemination to spread knowledge about all the nodes they have discovered so far. Theoretical guarantees on discovery...
Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. To increase the reliability of message delivery, multi-copy routing is often used at the expense of high buffer and bandwidth overhead. While much work has been done in the design of forwarding algorithms, little work has focused on studying forwarding under...
Information-centric networking (ICN) is a promising approach for wireless communication because users can exploit the broadcast nature of the wireless medium to quickly find desired content at nearby nodes. However, wireless multi-hop communication is prone to collisions and it is crucial to quickly detect and react to them to optimize transmission times and avoid spurious retransmissions. Several...
Dense small cell (SC) deployments are expected to help handling the explosive growth of mobile data usage. However, the backhaul of these deployments will face several challenges where point-to-point (PTP) and point-to-multipoint (PMP) wireless technologies will be combined forming multipoint-to-multipoint (MP2MP) wireless mesh backhauls. In this context, routing and load balancing solutions will...
A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selective with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to...
An Unmanned Aerial Ad hoc Network (UAANET) is a special type of Mobile Ad hoc Network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. One major component of such simulation studies is the movement pattern of the UAVs. In this paper, we first show that mobility models affect the performance of UAANET/MANET routing protocols. To study...
Multimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established...
In this work, we aim to evaluate Locator Identifier Separation Protocol-Mobile Node's (LISP-MN) performance in an inter-domain mobility scenario for both multi-interface and single interface Mobile Node (MN) with focus on throughput, handover delay, service disruption time and packet loss. To serve as the benchmark for performance, we compare LISP-MN with the IETF standardised MIPv6. We implement...
Mobile operators are today facing the daunting challenge of providing cheap and valuable services to ever more demanding customers. As a matter of fact, mobile standards have not yet really addressed this expectation of open, cheap and flexible web oriented internet access. As an alternative, we introduced an IP-centric QoS model mainly inspired by IP policies commonly found in fixed networks. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.