The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we develop a generic hierarchical model for performance analysis of intrusion detection techniques as applied to a cyber-physical system (CPS) consisting of mobile nodes with navigation, manipulation, sensing and actuating capability. We develop two intrusion detection techniques, namely, positional discontinuity and enviroconsistency, for intrusion detection of malicious attackers in...
In recent years, Caching technique (pull-based) in Mobile Ad hoc networks (MANETs) has become a promising technique in solving or mitigating the problems of performance, availability, scalability and resource paucity. MANETs consists of mobile nodes which communicate with each other through wireless medium without any fixed infrastructure. Mobile nodes may change rapidly and unpredictably over time...
Analogous to the beneficial impact that mobility has on the throughput of unicast networks, this paper establishes that mobility can provide a similar gain in the order-wise growth-rate of the throughput for multicast networks. This paper considers an all-mobile multicast network, and characterizes its multicast capacity scaling. The scaling result shows that the growth-rate of the throughput in the...
Mobile adhoc network(MANET) is a ??on the fly?? network of mobile nodes. Packets are routed through mobile nodes instead of any fixed base station. (AODV) is most adopted routing protocol in MANET where a path is established when a node wants to communicate with another node. The period over which the communication proceeds through this path is known as a Session. When the mobility in the network...
With rapid development of wireless technologies, current user mobile devices can support to access various wireless networks such as Wi-Fi 802.11 Wireless LANs, 3G cellular networks, etc. Due to requirements of multicast mobility for multimedia services, the convergence of wired and wireless network has been a necessary trend in Next Generation Networks (NGN). The issues of multicast and mobility...
Communication in ad hoc wireless network may generally be uncertain because the established route could be broken anytime. The major cause of link failures in ad hoc wireless network is the dynamic movement of the mobile nodes themselves and the other might be battery running out.AODV-2T is an improved AODV designed to compromise this problems by applying a conservative and circumspect concept. By...
An ad hoc network is a collection of mobile nodes with no fixed infrastructure such as base station or mobile switching centers. In this paper we present the study and simulation of a new protocol for routing in ad hoc networks. The new proposed protocol is an Enhancement of Ad hoc on demand Distance Vector (EAODV) routing protocol which offers quick adaptation to dynamic link conditions, low processing...
This paper develops an evolutionary multiple channel management based on mobility in multiple hop wireless network. The n-hops limitation theories are proposed first. Based upon these theories, the enhanced multiple channel management is proposed which consists of channel assignment method and topology prediction method. The channel assignment method is based on the enhanced genetic algorithm. Mobile...
Context awareness in wireless networks with mobile nodes will enable services or applications to adapt their behavior to the network situation by reconfiguring their underlying protocols. We studied whether high-level information, captured in the semantics of the events during emergency and rescue scenario might be exploited to improve network performance by mapping alternative solutions in dependence...
Peer to peer (P2P) utilizes the resources of an offered service without the need for a central server or preexistent server-client, making it a desirable network environment for data exchange based on direct connection between peers. Proposed by Sun Microsystems, JXTA is a typical P2P system and distributed computing model that does not require central service resources and is flexible to deal with...
Engineers have proposed lots of mechanisms for providing secure communications in ad hoc networks since the early 1990s. Due to the absence of fixed infrastructure, ad hoc networks are more vulnerable when encountering security threats than conventional wireless networks. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes that communicate with each other. All involved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.