The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In some special circumstances, e.g. tsunamis, floods, battlefields, earthquakes, etc., communication infrastructures are damaged or non-existent, as well as unmanned aerial vehicle (UAV) cluster. For the communication between people or UAVs, UAVs or mobile smart devices (MSDs) can be used to construct Mobile Ad Hoc Networks (MANETs), and Multipath TCP (MPTCP) can be used to simultaneously transmit...
In some special circumstances, e.g. tsunamis, floods, battlefields, earthquakes, etc., communication infrastructures are damaged or non-existent, as well as unmanned aerial vehicle (UAV) cluster. For the communication between people or UAVs, UAVs or mobile smart devices (MSDs) can be used to construct Mobile Ad Hoc Networks (MANETs), and Multipath TCP (MPTCP) can be used to simultaneously transmit...
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
In this paper, we propose a novel distributed deadline-based routing and spectrum allocation algorithm for tactical ad-hoc networks. The proposed algorithm will enable nodes to adapt to various deadline requirements unique to each traffic classes. A tactical ad-hoc network needs to handle a variety of data flowing through the network including voice, surveillance video, threat alert among others....
In this paper, we present a self-optimizing routing algorithm using local information only, in a three-dimensional (3D) virtual grid network. A virtual grid network is a well-known network model for its ease of designing algorithms and saving energy consumption. We consider a 3D virtual grid network which is obtained by virtually dividing a network into a set of unit cubes called cells. There is one...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self configuring network. It does not use any existing infrastructure. The dynamic nature of MANETs and memory and energy constraints of mobile nodes require an effective routing algorithm. This paper proposes HEEMCORP routing algorithm. It is a hierarchical, energy efficient on demand routing algorithm. The simulation...
Most important thing in wireless network which has attracted many research communities is opportunistic data forwarding. Opportunistic data forwarding is used mainly for the stationary wireless network. Mobile ad hoc network is becoming a very popular and wider wireless network. Ad hoc network uses different network topologies which usually changes with time. Therefore there is a challenge to design...
As the virtual backbone of the network, connected dominating set (CDS) plays an important role in supporting data communication, reducing the routing overhead, and enhancing the scalability of the network. Traditional CDS construction algorithms are usually applied to the networks with homogeneous nodes, e.g., a pure wireless sensor network. In the past few years, Wireless Sensor and Actor Networks...
FANET are wireless ad hoc networks on unmanned aerial vehicles, and are characterized by high nodes mobility, dynamically changing topology and movement in 3D-space. FANET routing is an extremely complicated problem. The article describes the bee algorithm and the routing process based on the mentioned algorithm in ad hoc networks. The classification of FANET routing methods is given. The overview...
The increasing mobile devices with better wireless communication facilities trends to be a good opportunity for the development of vehicular ad-hoc networks (VANETs). The opportunistic routing protocols are generally developed from the Delay Tolerant Network (DTN). In this paper, we propose an opportunistic routing algorithm called RSUS (Routing Scheme for Urban Scenarios) based on a grouping strategy...
With the growing number of smartphone users, peer-to-peer ad hoc data forwarding is expected to occur more often. The forwarding performance improves when knowledge regarding the expected topology and the social context information of the networks. In this paper, we introduce a new metric for data forwarding based on social context information, in which node's social context information is used to...
In security context, mobile ad-hoc network is more vulnerable compare to conventional networks because of open environment and lack of physical tight proximity. Therefore attackers get opportunity to commit crime using these vulnerable points. Several types of attacks committed by attackers to impact network functioning and performance. Attacks committed by intruders that are part of network and compromised...
Message authentication is a mechanism to verity the integrity of a message and it can be achieved using Message Authentication code (MAC) also called as keyed hash function. An ideal Hash algorithm will require a cryptanalytic effort greater than or equal to the brut-force effort. In the recent time, there have been enough efforts in developing cryptanalytic attacks on Hash algorithms. The hash algorithms...
Multi-path routing has a potential to increase data rate of wireless ad-hoc network by aggregating capacity of individual paths. However such paths are subject to inter-path interference. To minimize degradation of the network capacity caused by interference one or another path selection criteria can be used. We propose criteria on how to choose the best paths depending on network conditions. MATLAB...
Intermittently Connected Mobile Networks (ICMNs) are sparse wireless networks where most of the time an end-to-end path does not exist from source to destination. These networks are characterized by opportunistic connectivity, long and variable delay, asymmetric data rate and high error rate. Hence, they can be appropriately modeled as Delay-Tolerant Networks (DTNs). In this paper, the performance...
Wireless sensor networks (WSNs) is an area of research that has been getting a lot of attention lately. This is due to the rapid advancements in the design of wireless devices which have increasingly more processing, storage, memory, and networking capabilities. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.