The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) consist of energy limited sensor nodes, which limits the network lifetime. Such a lifetime can be prolonged by employing the emerging technology of wireless energy transfer (WET). In WET systems, the sensor nodes can harvest wireless energy from wireless charger, which can use energy beamforming to improve the efficiency. In this paper, a scenario where dedicated wireless...
Many common DTN routing protocols are replication-based, which have relatively good performance in terms of message delivery ratio but high overhead, and leave the issue of garbage collection open. In this paper, we propose Named Data Distance Routing (NDDR), a named data based DTN routing approach which makes routing decisions for named data based on topological distance information. This helps to...
The rapid development in communication approach has brought out new mode of communication. Among the recent developments, adhoc network has emerged as new mode of data communication. The objective of link reliability is a major concern in such network. In this paper, a new approach to route discovery based on network power and operational characteristic is proposed. The approach suggested, results...
Wireless Sensor Network (WSN) is a system used to conduct a remote monitoring in a wide monitoring area. It has a sensor node — a sampling point — which communicate each other to passing their data to central node for recapitulation or transmit it to data center. Because of that, communication system is a crucial thing for WSN. However, WSN may be deployed in a environment that far from ideal condition...
In this paper, a container monitoring system architecture based on Ad-hoc network using ZigBee is presented. In order to minimize the energy consume and improve the efficiency, an improved routing algorithm base on the basis of the existing ZigBee routing protocol is used in the monitoring system. In addition, some field experiments have been taken in the container yard. According to the experiment...
In recent years, due to the technological development of various kinds of drones, also known as unmanned aerial vehicles (UAVs), drones have emerged as an effective solution for a wide area of applications. In such applications, employing multiple drones promises a better way to carry out a given mission than employing a single drone. To utilize multiple drones, all drones should establish a network...
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
Ad-hoc Networks are multi hop network in which there is no need of central administration. Each and every nodes in Ad-hoc networks act as router to send and receive data. It means cooperation among the nodes is important for establishing communication between sender and corresponding receiver. It is not necessary that each node act as a cooperative node, some nodes can intentionally act as uncooperative...
In opportunistic networks, rather than accepting an end-to-end communication in the conventional Internet model. Opportunistic networking stems from the research area of mobile ad-hoc networks (MANET). Opportunistic networks are wireless networks in which a completely connected path from source to destination is not likely to exist. Mobile ad hoc routing protocol allows nodes with wireless adaptors...
Wireless sensor networks (WSNs) is an area of research that has been getting a lot of attention lately. This is due to the rapid advancements in the design of wireless devices which have increasingly more processing, storage, memory, and networking capabilities. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of...
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means “for this purpose” formed network instantly when nodes are connected in network for communication. Ad hoc network is a temporary network built for specific purpose. It does not require any pre-established infrastructure. The dynamic nature of ad hoc networks makes them more utilisable. On the other hand, selfish...
In an ad hoc network, communication distance is limited by the need to minimize the power consumption of the communication nodes. To deal with this, we usually employ multi-hop relaying functions that use the number of hops as a routing metric. But in an environment where traffic density is high, the same relaying node may be used by multiple sending nodes due to their spatial distribution. Data packets...
Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the...
Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that selectively drop a subset of the forwarding packets to degrade network performances. Due to unstable wireless channels, the packet loss rate between sensor nodes might be high, especially in hostile environments. Therefore, it is difficult to distinguish the malicious drop and normal packet loss. In this paper, we...
Nowadays Cooperative Network is drastically growing and applied in various applications such as Military, Hospital, and Police etc. In this paper Military application is taken as an example, analyzed the functionality of the cooperative network. Human wearable sensor devices are used to monitor the human motion within a Military Region. In this paper it is aimed to monitor and detect intruders [contradictory...
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion. Protocols assume that no malicious intruder node is present, which impacts all the layers by...
Tactical Mobile Ad-hoc Networks (MANETs) are widely deployed in military organizations that have critical needs of communication even with the absence of fixed infrastructure. The lack of communication infrastructure and dynamic topology makes MANETs vulnerable to a wide range attacks. Tactical military operations are among the prime users of ad-hoc networks. The military holds higher standards of...
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced...
In this paper, we design and implement a new Intrusion Detection Framework for Vehicular Networks (IDFV). These networks are vulnerable to various security attacks due to the lack of centralized infrastructure. The aim of our framework is then to secure them against the most dangerous routing attacks that have a high severity damage such as selective forwarding, black hole, wormhole, packets duplication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.