The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However, enforcing policies in MANETs is challenging because they lack the infrastructure and trusted entities encountered in traditional distributed systems. This paper presents the design and implementation of a policy enforcing...
Mobile devices are now equipped with multiple sensors and networking capabilities. They can gather information about their surrounding environment and interact both with nearby nodes, using a dynamic and self-configurable ad-hoc network, and with distant nodes via the Internet. While the concept of mobile agent is appropriate to explore the ad-hoc network and autonomously discover service providers,...
Most of the work on geocasting has been done for mobile ad-hoc networks and vehicular ad-hoc networks. This paper presents a novel Geocast technique with the hole detection in the geocast region for underwater environment. The proposed model named as Routing and Multicast Tree based Geocasting (RMTG) has been designed for underwater sensor networks. Here we propose a theoretical model for underwater...
This paper presents various issues concerning mobile device-to-infrastructure information flow and emphasizes some specific features concerning the client-server model in Internet-based mobile telecommunications systems. Integration of such a system in an ad hoc traffic monitoring network is proposed and some practical aspects of its realization are also presented.
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Mobile ad hoc networks (MANET) is a dynamic wireless self-organizing networks. Owing to MANET take the characteristic of dynamic structure and wireless communication, it is much easy to suffer security threats. Fault-tolerance method allow system failure, it make the system continue to calculate effectively in the inaccurate case. Owing to the autonomy peculiarity of mobile agent, nobody natural entity...
This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. The interactions are limited to direct neighbors in order to scale on mobile networks. The results show the efficiency and the trade-off of our...
Mobile ad hoc networks (MANETs) are spontaneously formed with a set of wireless nodes without any existing infrastructure or administrative support. The intrinsic characteristics of these networks such as the dynamic topology and the scarcity of resources mainly bandwidth and nodes battery life make network management process a challenging task. In this paper, we present the design and a performance...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
In this paper, we present a methodology and a toolkit to conduct tightly controlled real-world experiments in wireless multihop networks. The main features of our EXC toolkit are a plug-in architecture for easy integration of new functionality, simple scheduling of experiment runs, direct monitoring of experiments, easy management of node mobility, and high portability. EXC does not require specific...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.