The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Device-to-Device communication is a new promising technology that is used in 4G LTE advanced networks. In a GSM system when two devices or two user equipments UE wants to communicates they must use the cellular system infrastructure to do so regardless of the distance between them, i.e. they must communicate using the uplink and downlink via the base station, while in D2D communication the devices...
Indicating its own position is an important ability for a mobile wireless node. As a matter of fact, it is a key enabler for future applications in fields as diverse as routing, security, logistics, entertainment and so on. This position can be computed in many different ways. In a protocol-based approach to positionning, the foundation of this localisation service is the ranging protocol. In this...
Localization is one of the most important technologies in Underwater Wireless Sensor Networks (UWSNs), since it plays a critical role in many applications. As the variable speed of sound and the long propagation delays under water, using the traditional localization algorithms become difficult and impractical in UWSNs. In this paper, a new localization algorithm for UWSNs is presented. By deploying...
Location based services (LBSs) have raised serious privacy concerns in the society, due to the possibility of leaking a mobile user's location information in enabling location-dependent services. While existing location-privacy studies are mainly focused on preventing the leakage of user's location in accessing the LBS server, the possible privacy leakage during the localization process has been largely...
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. IIn this paper we present Mobile Secure...
Just-in-time inventory management and short production cycles require flexible material flow as well as usage of small transportation units. These demands can be met by using small Automated Guided Vehicles (AGVs) which act as a swarm of mobile robots. The paper presents real-time communication and localization for a swarm of mobile robots which transport Euro-bins in a distribution center or warehouse...
Wireless tracking is being increasingly used in elite and professional sports for training and performance monitoring. Accurate and high update rate tracking in indoor venues is the challenge that we are addressing. In this paper we propose a new algorithm for network round-trip ranging based on the measurement of time of arrival that supports high update rates and tracks and removes errors caused...
This paper presents the impact of handover parameters value and an error-prone radio channel over the IEEE 802.16e CDMA-based handover procedure performance. We analytically analyzed the handover latency and connection dropping probability. The results were compared with the experimental measurements conducted on a protocol prototype specially developed for this purpose by using Specification and...
The IEEE 802.16 standard for fixed and mobile broadband wireless access systems specifies a group of Medium Access Control (MAC) procedures among which the handover (HO) is one of the crucial contributions, especially significant for the mobility requirement. The HO procedure defines numerous parameters which need a fine tuning in order to achieve satisfactory communication performance. This paper...
The recent demonstration of precise ranging measurements through low power Low Data Rate (LDR) Impulse Radio - Ultra Wideband (IR-UWB) communications has disclosed new perspectives for cooperative location-enabled wireless networks. With this respect, joint ranging and distributed positioning mechanisms supported by specific protocol transactions have already been proposed within user-centric infrastructureless...
This paper presents a reliable transport technology of tubular distribution Mobile Wireless Sensor Network (MWSN). The combination of GPRS and distance measurement location algorithm is presented to precisely locate sensor nodes. Connection handoff is put forward to support the reliable transport technology. Cluster node selection algorithm and connection handoff node selection algorithm are proposed...
During the past decade, there were drastic advances in the technology of the mobile computing environment. Such technical improvements give birth to a demand for running sophisticated applications over multiple mobile devices. Since more than one process executes concurrently in this computing environment and they have to send application data to each other, any failure on a process or a network connection...
We consider the problem of supporting continuous spatial queries in a new and challenging network environment, namely a Mobile Peer-To-Peer (MP2P) network. Specifically, we propose a distributed technique, called ExtRange, that can efficiently answer continuous moving range queries in a MP2P network. The two key ideas in ExtRange are extended range and safe period. For each query, ExtRange extends...
Wireless sensor networks are subject to energy restriction compared with other wireless networks. To support a ubiquitous environment, a mobile sink has a lot of problems because it collects data while moving. TTDD is a representative routing protocol considering Mobile sink. It uses a lot of control packets, all of which are transmitted through agent nodes. This causes agent nodes to waste a lot...
The increase of the number of mobile phone users and laptops with wireless capabilities got a very high rate in the late years. Also, along with the increased number of users, mobile phone companies and Internet providers are continuously searching for new opportunities to offer new services for their clients. Therefore, the mobility of the clients has to be accomplished without compromising client...
As location based services (LBS) become more popular, preserving users' privacy is becoming an important task. In this paper we present our findings about the privacy threats related to a particular class of LBS and the techniques we recently developed to protect users from these threats. The class of services we address are the proximity based services, in which a user obtains to know if the distance...
A mobile wireless sensor network consisting of a large amount of tiny sensors with low-power can be an effective tool for gathering data in a variety of environments. The data collected by each sensor is transmitted to a single processing center that uses all data to determine characteristics of the environment. Sensors deployed in all kinds of areas on a large scale can move with wind and water....
Routing in ad hoc networks has received significant attention with a number of different routing protocols proposed in recent years. DSR, DSDV and AODV are the shortest path protocols for ad hoc networks. According to energy, the shortest path may be not the best path. A new mechanism of energy-aware named EAODV for ad hoc is proposed in this paper, which is based on the classical AODV (the routing...
This paper presents small world in motion (SWIM), a new mobility model for ad-hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real-synthetic traces have the same statistical properties of real traces. SWIM shows experimentally and theoretically the presence of the power law and exponential decay dichotomy of inter-contact...
Sink mobility brings new challenges to densely deployed and large wireless sensor network. When the sink moves, frequent location updates from the sink can generate excessive power consumption of sensors. In this paper, we propose OAR, an optimized agent-based routing protocol that provides efficient data delivery to mobile sink. Proposed algorithm reduces signaling overhead and improve degraded route...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.