The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The process of analyzing available network forensics evidence to determine their meaning and significance can be very involved. It is often necessary to develop a timeline of significant events to obtain an overview of what occurred, to create relational diagrams showing which users are connected to which systems, or to correlate and analyze data to find noteworthy patterns of network traffic. However,...
In this paper, a new Rayleigh VANET model based on sum-of-sinusoids method (SoS) is presented. Some important statistical properties, such as variance of autocorrelation of the complex envelope and autocorrelation of the squared envelope are derived in detail. Furthermore, for above derived statistical properties, we give an detailed analysis about them by comparing their closeness between simulation...
The performance of Mobile Ad Hoc Networks (MANETs) is influenced by many factors including node mobility, node density, and wireless transmission range. The mobility model representing the moving behavior of mobile nodes plays an important role in performance analysis and simulation of MANETs. In this paper, we first investigate the effect of node mobility on two fundamental characteristics of MANETs:...
Mobile ad hoc network is a hotspot in the wireless networks researching domain, and the routing protocol, which is as the core technology on network layers, is particularly important. By analyzing the working mechanism and key techniques of the Ad Hoc routing models, this paper puts forward a routing protocol based on network radius analysis. First, this paper sets up a LEACH model to analyze the...
A set of mobile wireless sensors observe their environment as they move about. We consider the subset of these sensors that each made observations when they were all at approximately the same time/location. As they continue to move, one of them processes its observations and decides that an event that must be reported has taken place. To reduce the probability of a false alarm, this sensor assumes...
In this paper, we derive the general expressions of the throughput capacity scaling of mobile ad hoc networks (MANETs), and find that the strategy of an individual node determines the throughput of an MANET. We show that optimal strategies that maximize the throughput of the network can exist. Based on a game theoretic approach, we further show that the optimal strategies constitute Nash equilibria.
Mobility modeling is important to analyze the network performance of protocols since it determines the network topology inducing the network performance. In this paper, we analyze the real trace data in military operations, and design a new mobility model for military units. Based on the military training trace data of the KCTC (Korea Combat Training Center) in Hong-Cheon, Korea, we investigate the...
Mobility models are often used to evaluate performances of mobile networks through either analysis or simulation. The epoch mobility model is one of important mobility models that can statistically describe mobile behavior in general. Here an epoch is a random length interval during which a node is supposed to move at a constant velocity. However, a border may force a node to change its motion during...
Intrusion detection is an efficient method to detect the malicious node in the MANET. This paper presents the improvements of the existing data analysis and pattern-matching algorithm based active set, which develop a more effective BER.
Mobility is one of the most challenging issues in mobile ad-hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this paper, a new framework called mobility analyzer has been introduced for analysis and recognition of mobility traces...
Using 802.11b as a bearer this paper presents a simple one dimensional mobility model for the evaluation of fall-back communications protocols in medium range point to point communications systems. The technique provides link state data and is based on radio communication between carriages in a lift. Example throughputs for 802.11b are presented. Applications are Ad-hoc networks and in particular...
Mobility models characterize mobile users' movements of location, velocity and acceleration for the difficulty to obtain traces in real world. A classification of proposed and applied mobility models for MANET (mobile ad hoc networks) are given in this article firstly. The probability distribution of nodes is a basic foundation for the theoretic research of mobility models for MANET, such as the work...
With regard to the fundamental problem of the MANET routing protocols, this paper according to the campus mobile node behavior, expands the Campus Wireless Mobile Model, puts forward a Campus Wireless Low-Speed Mobile Model who based on AOC autonomous system. This paper does simulation experiment through NS-2 simulation platform, showing that in this model both DSR and AODV routing protocols are relatively...
Delay-tolerant networks (DTN) have the capacity to interconnect devices in roomy regions unlike traditional networks. Based on common sense, the more similar the mobility pattern of nodes, the more stable their relative positions, which results in a connection between them with a longer duration In this paper, a novel routing scheme using the similarity degree of mobility pattern is proposed to optimize...
Link topology lifetime is not only an important metric to evaluate the dynamic characteristic of ad hoc network, but also is a direct and effective method to determine the time to perform ad hoc network measurement. This paper introduces the concept of ldquosnapshotrdquo to take the picture of link topology of three classical mobile mobility (i.e., RPGM, Freeway and Manhattan) respectively. Simulation...
There has been increasing interest in building an information infrastructure for mobile vehicles in surface transportation systems that principally rely on vehicle-to-vehicle (v2v) communications. The various network architectures proposed for this purpose have unique characteristics that distinguish them from other systems. However, only a limited amount of work has been completed to understand the...
Many strategies have been proposed for integrating mobile ad hoc networks and the Internet. A need has been felt for an analytical framework that would facilitate a formal definition and comparison of different integration strategies without actually implementing them in a simulated environment. In this paper, we present an analytical framework based on the concept of a relay path (RP). This model...
In this paper, we investigate saturation performance of broadcast service in IEEE 802.11 based one-dimensional mobile ad hoc networks (MANETs) under multi-hop environment. Having analyzed the features of the multi-hop broadcast MANETs, for the first time we derive a closed form expression of broadcast packet reception rates, which is one of the important reliability metrics for broadcast communications...
This paper provides a comprehensive theoretical approach to computing the throughput of sparse, disconnected mobile wireless networks using Markov chains wherein node mobility can be modeled as a random walk process. Such networks are characterized by frequent lack of end-to-end communication paths and employ the store, carry, and forward paradigm for communication. A novel analysis approach using...
In mobile ad hoc network, all the packets are forwarded in a multi-hop fashion relying on the contribution of each participants. In order to encourage the cooperation between the nodes in the system, many incentive mechanisms have been proposed. Although these incentive schemes can improve the cooperation to some certain extend, they are still suffering from some drawbacks. In this paper, the efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.