The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
In this paper we present a distributed self organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured...
In this work, an energy efficient routing technique for WSNs is introduced. Here the routes between the source nodes and the base station are formed considering the energy levels of the intermediate nodes. These routes are refreshed dynamically to recover topology changes and to keep the energy level of the nodes close to each other. The technique introduced together with data aggregation are implemented...
Recently, geocast routing (GR) has been extensively investigated for reliable and efficient dissemination of information due to increasing number of intelligent transport system (ITS) applications favoring geocasting. In this paper, a qualitative survey of recent protocols of GR and some precise future research issues have been provided. A functional and qualitative description of each considered...
Opportunistic networks are the manifestation of wireless ad-hoc networks where there is no continuous end-to-end path. The forwarding of messages takes place via any nodes that are encountered, and therefore the measurement of message passing efficiency between nodes becomes challenging if a number of different protocols are to be compared and evaluated. Prior work has identified an evaluation framework...
A key issue impacting wireless network performance is network information. In wireless networks, a significant amount of bandwidth and power resource is consumed to disseminate and maintain routing information. Previous work has presented different methods to broadcast and store such routing information so as to reduce the overhead. However, the amount of information required for a routing algorithm...
The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network that try to disrupt, distort or disturb the network...
Due to the high overhead characteristics of wireless mesh network, the call capacity of VoIP is dramatically degraded. In the paper, the Aggregation Aware Routing with Path Separation (AAR-PS) protocol has been proposed. The protocol are designed by combining and engineering several techniques: packet aggregation, multi-path routing and event-triggered rerouting. The experiment results reveal that...
In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost...
Routing protocols typically establish paths over which packets will be sent. Mobility breaks those paths and disrupts the communication executing a load, overhead and increased rate of link failure on routing protocols. Mobility can be exploited to improve the route longevity in the establishment of the route. Also the protocols relying on the source of information (i.e. location information from...
In this paper, we propose a new routing protocol for ad hoc wireless networks, which is based on DSR (Dynamic Source Routing) on-demand routing protocol. Congestion is main reason for packet loss in mobile ad hoc networks. If the workload is distributed among the nodes in the system based on the delay of the paths, the average execution time can be minimized and the lifetime of the nodes can be maximized...
Mobile ad hoc network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion...
In ad hoc mobile networks (MANET), the mobility of the modes is a complicated factor that significantly affects the effectiveness and performance of ad hoc routing protocols. Mobility and traffic patterns for each node such as intermediate and end nodes are restrained to extract features of each routing protocol. In this paper, we focus on the performance of the routing protocols for stationary end...
In mobile wireless ad hoc networks (MANETs), layering is frequently broken in order to deal with changes on the wireless medium. Layering is also violated in order to implement autonomic behavior, which depends on correlating data scattered on various layers to identify relevant events. This paper proposes a new networking plane, called MANET knowledge plane (MANKP), that stores information concerning...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.