The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay Tolerant Networks (DTNs) are intermittently connected mobile networks, in which a fully connected path from source to destination does not exist. Therefore in these networks, message delivery relies on opportunistic routing where nodes use store-carry-and-forward paradigm to route the messages. However, effective forwarding based on a limited knowledge of contact behavior of nodes is challenging...
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors) is consistent with routing information assimilated by a node (from its neighbors). We investigate a minimal trusted computing base (TCB) for MANET nodes to ensure this requirement. We outline low complexity TCB functions which can be executed inside trustworthy boundaries...
In this paper, we study the fundamental property of the ad hoc network using connectivity index. We investigate the construction of minimum cost multicast trees by selecting a link having minimum connectivity Index and comparing application required bandwidth with (available bandwidth - allocated bandwidth) of the link. We have shown that Increase in total connectivity Index of the entire network...
Abstract-Recently, popularity of multimedia content sharing among the Internet users and development of wireless mobile devices have promoted a trend of deploying Peer-to-Peer (P2P) networks over mobile ad hoc networks (MANETs) for mobile content distribution. However, due to limited radio transmission range, sporadic node densities and power limitations, MANETs may become intermittently connected...
Peer-to-peer file sharing applications are increasingly popular and they enable users to share various files with high scalability. However, in intermittently connected mobile network environment, existing file sharing systems are hindered by the lack of node stable connectivity and constant network topology change. We propose a social network based file sharing system in mobile P2P networks. It takes...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
Energy saving and traffic load balancing are two important issues that affect the performance of wireless networks, especially MANET. In this work, a novel routing algorithm over MANETs called LBE-ARAMA has been proposed. It allows to discover minimum MDR paths preserving the energy and to balance the data traffic through the round trip time (RTT) delay evaluation on the path from source to destination...
The capacity of an IEEE 802.11-based multi-hop wireless network is limited. By effectively utilizing multiple non-overlapping channels and multiple interfaces, collision and co-channel interference can be reduced. This allows more concurrent transmissions and thus enhances the network capacity. In this paper, we introduce an efficient distributed joint channel assignment and routing protocol, called...
Efficiently discovering services in terms of diversified service constraints in a dense MANET is a challenging issue. This paper proposes to build a distributed suffix tree on backbone nodes as XML-based services?? index to provide a concise profile for service descriptions. Moreover, a content-addressable P2P overlay and corresponding fault-tolerance mechanisms are introduced to support the distributed...
For the protection of both routing and data forwarding operations, a network layer security solution has been provided as a solution for various security attacks in ad hoc networks. In this paper, to develop a security framework has been proposed. This security framework involves: detection of malicious nodes by the destination node, isolation of malicious nodes by discarding the path and prevention...
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption tolerant network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. In an earlier work, we studied information retrieval schemes for single-attribute queries in DTNs. Our schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.