The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The report has presented an OPNET simulation model for the Ad-hoc on demand Distance Vector routing protocol. During the process of validation, this implementation of the AODV protocol is supplied with a hierarchical structure of models consisting of a simulation model, a network model, a node model, and finally a set of process models. All the conclusions are helpful to further development and optimize...
In a Mobile Ad hoc NETwork (MANET), nodes are self-organized and have to cooperate for routing in absence of fixed infrastructure. Two nodes beyond the direct communication range need intermediate nodes to forward their packets. Working in an open environment, MANETs are vulnerable to attacks by malicious nodes. A trust-based on-demand routing framework is given to decrease the hazards from malicious...
Mobile Ad Hoc Networks (MANET) is a kind of network in which all the nodes can move randomly. As a new wireless communication network, MANET has attracted broad attention in recent years. But traditional distributed routing algorithm, which focuses on nodes, is complicated and huge in computation quantity, causes decline in performance of real-timing, throughput, ETE delay, network QoS, and etc. So,...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
In recent years, applications using mobile agents (MAs) in mobile ad-hoc networks (MANETs) are attracted. An information dissemination service is one of these applications. In this service, users can get local area information from an MA, which migrates from node to node within the local area. The system need not provide any server. Instead of servers, MAs collect local information and disseminate...
The trust relationship between nodes is changed incessantly due to the dynamic and temporarily of Mobile Ad-hoc Networks (MANETs). With lack of a prior trust relationship, the reputation-system offers the reasonable effective solution to resolve the uncooperative behavior which launched by the malicious and selfish nodes in the inner MANETs. Because obtaining trust experience between nodes is still...
We consider a wireless multi-hop network and design an algorithm for jointly optimal scheduling of packet transmissions and network coding. We consider network coding across different users, however with the restriction that packets have to be decoded after one hop. We compute the stability region of this scheme and propose an online algorithm that stabilizes every arrival rate vector within the stability...
Some of the routing protocols in MANET use cryptographic algorithms and trust. In the routing protocols based on trust, the paths are not done according to the security. In order to do this nodes are created in the paths which have more trust than to other nodes. The trust models presented before have three main properties of the trust agent, reputation agent and combiner agent. Since the congestion...
On a mobile ad-hoc network environment, where the resources are scarce, the knowledge about the network's link state is essential to optimize the routing procedures. This paper presents a study about different pheromone evaluation models and how they react to possible changes in traffic rate. Observing how the pheromone value on a link changes, it could be possible to identify certain patterns which...
With regard to the fundamental problem of the MANET routing protocols, this paper according to the campus mobile node behavior, expands the Campus Wireless Mobile Model, puts forward a Campus Wireless Low-Speed Mobile Model who based on AOC autonomous system. This paper does simulation experiment through NS-2 simulation platform, showing that in this model both DSR and AODV routing protocols are relatively...
In this paper we propose some innovative optimization models for wireless sensor networks. The models are chosen depending on the task the network is called to execute and they focus on the optimization of some specific performance objectives. Indeed, starting from a generic configuration, the optimal solution defines a specific sensors displacement, which allows the network to achieve high performance,...
When creating a scenario for performance evaluation of communication systems, modeling mobility and traffic is an important task. The results of the evaluation strongly depend on the models used. Typical assumptions of many models are uniform selection of destinations, nodes are allowed to move over the whole simulation area, and nodes are part of the network all the time (are not switched off and...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of correct system state in the model, and the flaw in the...
Ad hoc wireless networks are decentralized in nature and hence routing is a central challenge in this type of network. In this paper we describe a simulation model to simulate the routing protocols for wireless ad hoc networks and analyze the results from the simulation for performance evaluation. The simulation model incorporates the number of parameter values with changing environmental factors...
Performance analysis is of major importance in the design of routing protocols in ad hoc networks. Many of these analyses were run on the synthetic mobility models which resemble the behavior of real "mobile entities". Based on such models, basic conclusions with respect to critical network parameters can be provided. Therefore, good mobility models should be designed to draw conclusions...
For mobile ad-hoc wireless network, the route protocol is very important. This paper proposes a modified CBRP scheme based on the cloud model to improve the performance. And some experiments are conducted, the results show that the ad-hoc network will be lower average end-to-end delay and higher packet delivery ratio with the proposed scheme.
Research on wireless sensor networks has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Among various issues, energy consumption is one of the most important criteria for routing protocol in wireless sensor networks (WSNs). This paper introduces an energy efficient clustering algorithm for mobile sensor network...
In mobile sensor networks (MSN), MSN may have a high rate of communication failure since the routing path can be broken when some nodes on the path move to other position. So, MSN has to provide a means for low-cost and low-power routing to support mobility of sensor nodes. In this paper, a limited flooding scheme for routing in MSN is proposed to allow efficient energy utilization without requiring...
A mobile ad hoc network (MANET) is a self-configuring multi-hop network that does not rely on infrastructure being available. Vehicular ad-hoc networks (VANET) are an application of MANET, with most research focusing on road traffic. The possibility of constructing a VANET for shipping at sea is presented in this paper. Most research into MANET technologies is done using simulations that contain models...
The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK - a novel sink mobility model exploiting the connected dominating set (CDS) property of a network graph. TRACK, to the best of our knowledge, is the first contemporary sink mobility model to exploit the CDS property for WSN lifetime...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.