The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile entities are unrestricted to form communication grid without any predefined substructure in MANET. Though it offers great resilience, but extra challenges for MANETs to guard against malevolent attacks are also fetched. Various tactics have been anticipated to discourse probable challenges to network operation, but they rely on unbending solutions, which are operative only in anticipated set-ups...
Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in deploying a P2P overlay in ultimately large-scale Mobile Ad-Hoc Networks (MANETs). We therefore study the performance of such an approach, creating a number of hierarchical network configurations and deploy Chord over them. The clusters are MANETs, running...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
This work studies centrality metrics as forwarding load predictors, for both unicast and multicast traffic, within dynamic ad hoc network topologies. We present results from a series of emulation experiments based around an emergency response mobile network scenario. From collected temporal topological and traffic data, we calculate a rank correlation measure between predictive centrality metrics...
In this paper, we propose a new geographic holebypassing routing algorithm based on virtual convex model in Wireless Ad hoc Networks (WANETs). Our method is to convert an actual hole into a basic virtual convex first and then use line segments that are parallel to the basic virtual convex to find candidates of anchor points. Later, among these candidates, we choose appropriate anchor points to be...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
A mobile ad hoc network (MANET) is a collection of mobile nodes that do not need to rely on a pre-existing network infrastructure or centralized administration. Securing MANETs is a serious concern as current research on MANETs continues to progress. Each node in a MANET acts as a router, forwarding data packets for other nodes and exchanging routing information between nodes. It is this intrinsic...
In Ad-hoc networks, routing is complex as nodes are mobile due to which paths are destroyed and generated again and again. The difficulty in MANET is to find a feasible path between communicating nodes as routing is non-deterministic polynomial hard which is due to mobile nature of nodes. Many past works focused on finding a feasible path from a source to destination by considering only a single parameter...
Development of wireless network technology to support various types of information services continues to increase especially in video streaming services. Video transmission especially in Mobile Ad Hoc Network (MANET) environment used in this research, particularly in the Combined Scalable Video Coding (CSVC) scheme which is a development of H.264 / MPEG-4. The contribution of this research focuses...
MANETs are potential wireless network, where mobile nodes are connected dynamically in ad hoc basis. This unique characteristic attracted many promising applications and the one among is battlefield communication. The war troops at the edge of the network do not have any computing infrastructure for communication. Therefore MANET plays a vital role in battlefield communication. Since MANET is openness...
Routing decisions are often susceptible to failure in Mobile Ad hoc network (MANET) because of the special characteristics like dynamic topology and lack of central coordinator. Network topology changes very frequently due to the random movements of nodes and it is not predictable. The lack of central coordinator for controlling and managing the operations, often leads to very serious problems like...
A group of mobile nodes with limited capabilities sparsed in different clusters forms the backbone of Mobile Ad-Hoc Networks (MANET). In such situations, the requirements (mobility, performance, security, trust and timing constraints) vary with change in context, time, and geographic location of deployment. This leads to various performance and security challenges which necessitates a trade-off between...
A mobile ad hoc network is a wireless network of mobile devices that communicate with one another without any fixed network infrastructure. Existing mobile ad hoc networks are either based on IEEE 802.11 a or b standard. Both standards provide limited bandwidth and therefore are not suitable for data intensive applications such as automated video surveillance. Wi-Fi Direct is a new technology that...
The cooperation of heterogeneous unmanned systems, for instance, between aerial engines and terrestrial engines, relies on reliable communication. Data delivery is ensured by routing protocols, but traditional routing approaches, MANET and DTN, are not efficient in such networks. In this paper, we propose the S-ROGUE routing protocol combining the paradigms MANET and DTN and switching between them...
Wireless networks can be categorized into infrastructure and infrastructure-less based on the network formation and architecture. Mobile Ad-hoc Networks are infrastructure-less networks with self-configuring property having a dynamic topology where nodes are free to move in any direction, due to this topological changes there are increased chances of link breaks in the network giving rise to path...
A promising approach for dealing with the increasing demand of data traffic is the use of device-to-device (D2D) technologies, in particular when the destination can be reached directly, or though few retransmissions by peer devices. Thus, the cellular network can offload local traffic that is transmitted by an ad hoc network, e.g., a mobile ad hoc network (MANET), or a vehicular ad hoc network (VANET)...
With the recent advancement and rapid proliferation of wireless devices, Mobile Ad Hoc Networks (MANET) is becoming a major immerging technology in the field of telecommunication networks. A MANET is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Due to the mobility of nodes in MANETs, local connections...
A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with each other through electromagneticradio waves. Mobile Ad hoc Network (MANET) consists of mobile nodes, the network is infrastructureless. It dynamically self-organizes in arbitrary and temporary network topologies. Security is extremely vital for MANET. Attacks pave way for security. Among all the potential attacks...
Mobile ad-hoc network (MANET) is suffering from various attacks due to its infrastructure-less characteristics. Hence, MANET needs a variety of specific security methods to detect the false entrance of the misbehaving nodes. The network works well if the nodes are trusty and act rightly and cooperatively. In this paper, we are identifying and detecting the packet dropping nodes using the Support vector...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.