The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The autonomous nature of Mobile Ad hoc Networks (MANETs) makes them suitable for the support of extreme emergency rescuer IP communications for next generation networks. A major hurdle towards the deployment of emergency MANETs (eMANETs) is the design of a distributed routing protocol that can adapt to its highly dynamic topology where the number of nodes in the network frequently varies. This paper...
A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. Mobile agents can be used in applications for wireless network to save bandwidth and time. In this paper we consider dependability aspect, especially reliability issues that need to be addressed before the mobile agents can be used for a broad range of commercial applications...
Two-way Time-of-Arrival (TOA) distance-ranging is well-suited for use in IEEE 802.11 MANETs and wireless mesh networks because it is simple, efficient and does not require precise time synchronization between network stations. Despite its utility we show that this distance-ranging procedure is completely insecure and demonstrate how it can be subverted by a simple but highly effective attack. This...
Mapping and dynamic routing in a wireless network are essential and basic operations that are the prerequisites for all higher order interactions between nodes on that network. The Intent of network mapping by multi mobile software agents is to obtain the topology of network in a distributed manner. In this paper we examine how software agents can wander in an unknown Ad hoc network with cooperation...
Many protocols for distributed systems employ leasing mechanisms to recover from failures, where a leaseholder is granted access to data or services for a limited time (lease period. In such cases, choosing an appropriate lease period that is to be granted plays a crucial part in the fair and efficient access of data or services by the leaseholders. Existing algorithms vary lease periods with system...
The trend of adopting more and more wireless mobile computers and smartphones has changed our way of living. Those devices heavily rely on the underlying wireless network systems to provide adequate communication support. As streaming audio and video becomes norm, the requests for stringent maximum end-to-end latency and minimum bandwidth make the networking process more difficult. Quality of Service...
Simulation and emulation are techniques frequently used for performance evaluation of wireless multi-hop networks. If the wireless devices are mobile, the movement patterns of these objects are found to have significant impact on the simulation and emulation results. This is obvious as the movements influence the topology of the network. In this paper, we focus on the sound performance evaluation...
The following topics are dealt with: WDM network; mobile radio; wireless network; MIMO communication; cellular network; OFDM; cognitive radio; codes; HDTV; satellite communication; power amplifier; and computer network.
A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wireless devices are often not protected by tamper-resistant hardware due to small form factors and low cost, and can be easily stolen/lost or temporarily controlled by unauthorized entities due to their harsh working environments...
With the growth of the Internet services, voice over IP (VoIP) has been playing a key role in cutting the costs of telephone calls. It can be seen that since the demand of VoIP over wireless network is growing, the use of VoIP over mobile ad-hoc network (MANET) is expected to grow as well. We have identified some of the challenging issues to ensure robust and secure voice communication over MANET...
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
Mobile ad-hoc network (MANET) is an appealing technology that has attracted lots of research efforts. Due to frequent communication failures, multipath routing is preferred than single-path routing in many applications such as multimedia streaming over MANET as the former can provide robustness, load balancing and reduce end-to-end delay. However, a security remains important factor that hinders the...
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. In MANET, the high mobility of mobile nodes is a major reason for link failures. In This paper we propose a novel weight-based approach for routing algorithm in mobile ad hoc networks, called weight-based AODV (WBAODV). The proposed...
In the last decade, since the advent of advanced wireless technology, wireless mobile ad hoc networks have grown in both size and complexity, and their applications are also expanding at a great rate due to their many advantages, principally mobility and the fact that they do not require a fixed supporting structure. Security, routing protocols, and connectivity are major issues with mobile ad hoc...
A very large number of simulation models have been developed to study ad hoc network architectures and protocols. Evaluating and deploying all sorts of protocols and applications designed for wireless ad hoc networks in a real environment is an important and urgent task. In recognition of this need, and to further our research objectives in the area of wireless ad hoc networks, we have built the E...
Mobile Ad hoc Networks (MANETs) are self configuring and self healing networks that do not require any existing infrastructure. As the nodes constituting the network are mobile, the network topology can be very dynamic. Hence, special routing protocols are designed to cater to the dynamic nature of MANETs. Optimized Link State Routing (OLSR) is once such protocol that has proven to be a potent routing...
This paper concerns multi-hop networks with multiple physical interfaces, and more particularly with multiple radios. For these networks, we investigate the advantage provided by the presence of multiple radios and specifically their impact on metrics such as link connectivity and network diameter and their resilience to link failures, and the length of shortest paths. Our results show that ldquosuper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.