The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we show that random-access protocols, which are used in a range of networks (e.g. WiFi, power line communications and Internet of Things), may experience a high-throughput, extremely long (of the order of hours) transitory phase. This behaviour is not highlighted by common analysis techniques and experimental evaluations, which can lead to incorrect prediction of network performance....
Dedicated Short Range Communication is attracting a lot of interest these days due to its utility in vehicular safety applications, intelligent transportation system and infotainment applications. Such vehicular networks are characterized by the highly dynamic changes in topology, no significant power constraints and ephemeral links. Considering an interaction between the client and server nodes that...
A critical problem to gather data in Wireless Sensor Network (WSN) is energy hole. Sensor nodes transmit their data towards the static sink in a multi-hop manner. Sensor near the static sink contains all data of other sensors and its own data and thus it drains their energy very fast. So balancing energy throughout the network is important. Efficient utilization of energy is the main objective in...
Indicating its own position is an important ability for a mobile wireless node. As a matter of fact, it is a key enabler for future applications in fields as diverse as routing, security, logistics, entertainment and so on. This position can be computed in many different ways. In a protocol-based approach to positionning, the foundation of this localisation service is the ranging protocol. In this...
Mobile Virtual Private Network (MVPN) technology is already widely used for secure connections between two endpoints. However, most existing MVPNs are designed as an optimized and parallel transplantation of traditional Virtual Private Network, which leads to incompatibility between MVPNs and mobile network environment. This paper proposes and evaluates a Communication Supportable Generic Model (CSGM)...
Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network protocols should therefore be adjusted to cope with the peculiarities of these networks. In this paper, we...
Trust plays an important role in the development and profitability of users in mobile commerce systems. In order to estimate the amount of trust, the variety of trust management systems have been proposed and implemented. One of the main challenges facing these systems is the types of attacks that threaten them and their impact on trust evaluation. In this paper, we studied four important attacks...
Wireless sensor networks (WSNs) is an important application for real time monitoring and detecting the phenomenon in a coal mine, which can ensure the workers' life safety and reduce the financial loss. But the drawback of WSNs is that the nodes are easy to die. To balance the traffic load and optimize the networks' routing seems more important. Clustering is an effective approach to prolong the network...
In this paper, we propose a novel clustering protocol for wireless sensor and robot networks (WSRN) to ensure efficient energy usage and maintain maximum connectivity among the sensors. Our algorithm mainly works in two phases: (i) creates optimal number of clusters in the region of interest via three-point centroidal voronoi diagram. (ii) aggregates data from the members of each cluster and transfers...
It has been shown that the Internet environment has rapidly changed from fixed to mobile one with the wide popularity of smart phones and the emergence of various wireless/mobile networks. Thus, in research community there has been a consensus that separating Identity (ID) from Locator (LOC) is a one promising concept to address intrinsically such a change. In this paper, we propose a mathematical...
Opportunistic routing is the major routing strategy for intermittently connected networks (ICNs) that are characterized by frequent link disruptions. These disruptions limit the formation and stability of continuous end-to-end paths between any arbitrary source-destination node pair. This paper proposes a novel opportunistic routing/forwarding protocol, Nodes Density Adaptive Opportunistic (NDAO)...
This paper gives the insights of energy efficiency of sector coded transmission (SCT) protocol for cognitive radio networks. SCT is a cluster head rotation based protocol used for cooperative spectrum sensing in cognitive radio networks. A modified transmission and reception radio model based on SCT is proposed for cognitive radio networks. Further the paper evaluates the effect of number of users,...
In military operation or emergency response situations, very frequently a commander will need to assemble and dynamically manage Community of Interest (COI) mobile groups to achieve a critical mission assigned despite failure, disconnection or compromise of COI members. We combine the designs of COI hierarchical management for scalability and reconfigurability with COI dynamic trust management for...
This paper presents small world in motion (SWIM), a new mobility model for ad hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real--synthetic traces have the same statistical properties of real traces in terms of intercontact times, contact duration, and frequency among node couples. Furthermore, it generates social behavior...
We propose to combine social trust derived from social networks with quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of mobile nodes in mobile ad hoc network (MANET) environments. We develop a novel model-based approach to identify the best protocol setting under which trust bias is minimized, that is, the peer-to-peer...
Protocols are introduced to improve the tag reading efficiency of an RFID system consisting of a mobile reader that is constantly moving at a reasonable speed in a warehouse containing many thousands of items tagged with RFID. The warehouse is divided into storage areas with aisles separating these areas and the mobile reader tries to capture as many tag identifiers (IDs) as possible during this process...
Smartphones can be viewed as resource pools capable of communicating with their outside world. Such communication capabilities provide unique opportunity for sharing resources, which would result in new possibilities for end users. In this paper, we present a new framework designed for managing mobile local networks, also referred to as Mobile Clouds. In this framework, mobility of nodes is managed...
Wireless Sensor Networks (WSNs) consist of hundreds or thousands of battery operated, computable and low cost sensors. In WSNs energy conservation is an important design issue for routing, power management and data dissemination protocols. The existing cooperative routing is addressed to reduce the energy consumption. We propose an algorithm Energy Efficient Adaptive Cooperative Routing (EEACR), that...
Computer networks are dramatically extending all over the world. They have diverse topologies and benefit from various technologies. They can also support users with different types of services. Nevertheless, all of them have an ultimate purpose in common. They should satisfy their users with high-quality services. To achieve this goal, Quality of service (QoS) solutions are required. However, they...
We propose a novel Pub/sub protocol for Wireless Mesh Networks based on Heuristic Markov Chain, namely HMCPS, which can reliably and efficiently deliver events to mobile clients in a continuous manner. Using Heuristic Markov Chain, HMCPS predicts hot locations where a mobile client may stay with high probability, and then delivers interesting events to the hot locations in an efficient way. We also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.