The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the design of mobile ad hoc networks, a challenging problem is how to route information reliably and efficiently from one node to another in moderate to high level of mobility. In this paper, we propose a new routing protocol, called link effective available time (LEAT) routing. First, we propose a method to find the link available time during an epoch by measuring the distances between the two...
In this paper, a technique for detection of wormhole attacks based on distance verification is proposed for mobile ad hoc network (MANETs) applications. A node estimates its distances to a sender node based on the received signal strength (RSS) of received packets, and uses them to verify against the distances computed from the location information in the packets. The verification is formulated as...
Evaluation of vehicular ad-hoc networks (VANETs) over real environments is still a remaining issue for most researchers. There are some works dealing with common 802.11 analysis over real vehicular environments, which carry out performance tests to measure the quality of the communication channel and justify results according to physical and MAC conditions. There are only a few works regarding multi-hop...
As laptop computers begin to dominate the marketplace, wireless adapters with varying bandwidth and range capabilities are being developed by hardware vendors. To provide multihop communication between these computers, ad hoc mobile networking is receiving increasing research interest. This paper deals with the analysis of the transmission range effects on On-Demand Multicast Routing Protocol (ODMRP)...
Ad-hoc networks have become a novel area of research and development in mobile computing. In this part, routing protocol is important to improve efficiency of ad-hoc networks. Ad-hoc routing protocols have been studied and developed, such as DSDV, AODV, DSR, and LAR. In this paper, we propose a new routing protocol that is named by advance-LAR based on radio-range of destination node. This protocol...
Reliable and trustworthy routing operation is a very crucial requirement in Vehicular Communication (VC) that enables a new set of applications to improve active safety, traffic efficiency and driving comfort. To make this application possible, a security mechanism must be taken into account. Major security issue for VC is secure routing. Practical routing schemes in VC are geographic-based, which...
In this letter, we present an analytic framework to evaluate the capacity of epidemic routing in vehicular networks. Using this analytic model, we derive the upper and lower-bound of end-to-end delay in epidemic routing. Our analytic results reveal that epidemic routing achieves maximum diversity gain over unicast routing when the vehicular network is partially connected, which is in contrast to the...
Typically, sensor networks consist of fixed sensor nodes. Sometimes, creating such a fixed sensor networks could be a daunting task. Sensor nodes assume deploying a stationary sensor network over a dangerous area such as a battlefield. Even if an advanced method to make the deployment safer is used, diverse element will cause a coverage holes. Even though perfect coverage can be achieved initially,...
P2P applications are increasingly popular. Unlike traditional client-server applications they do not require central server resources. This makes them less costly to host and maintain. While there have been a large number of P2P applications developed for PC based systems, there are only very few for mobile appliances, such as mobile phones or networked PDAs. Furthermore, there are even fewer applications...
Typically, sensor networks consist of fixed sensor nodes. Sometimes, creating such a fixed sensor networks could be a daunting task. Sensor nodes assume deploying a stationary sensor network over a dangerous area such as a battlefield. Even if an advanced method to make the deployment safer is used, diverse element will cause a coverage holes. Even though perfect coverage can be achieved initially,...
This paper proposes a novel node localization algorithm that collaborates with street maps to estimate the locations of mobile nodes. It uses simple motion equations for moving objects in two dimensions to estimate the location of nodes, and then verifies the estimated location using street maps. This localization algorithm reduces the number of periodic beacons propagated into the network and reduces...
The task of finding and sustaining routes in mobile ad-hoc networks (MANETS) is an important factor in determining the efficiency of any MANET protocol. MANET characteristically comprises of wireless mobile hosts whose communication with each other is devoid of any fixed infrastructure. Absence of fixed infrastructures and host mobility thus constitute frequent unpredictable topological views. Positional...
Position-based routing protocols were recently proposed as a solution to non-scalable topology-based routing protocols for large scale mobile ad hoc networks. In these position-based routing protocols, nodes may not maintain explicit routes. Each node needs only to know its own position and the position of its one-hop neighbors to forward packets. In this paper, a performance evaluation of the position-based...
Mobile ad hoc networks are networks without fixed infrastructure. The mobile nodes perform both as a host and as a router by forwarding packets to other nodes. Because of the nature of ad hoc networks, there are special demands for ad hoc routing protocols and the performance of these routing protocols is an important issue. This paper presents a simulation based comparative performance analysis of...
In this paper "an efficient hybrid routing protocol for MANET using direction dependent bordercasting (MEHRP)rdquo with high data delivery ratio has been proposed. The major problems of reactive routing viz. flooding of route request packets and link breakage is reduced by this algorithm. The frequency of location update is reduced in this algorithm compared to the existing location based routing...
Ad Hoc wireless network consists of mobile nodes that do not rely on any fixed network infrastructure. The dynamic route is allocated for a pair of nodes by Ad Hoc on-demand routing protocol (AODV), that establishes a route only when a source node want to transmit data. Routes in Ad Hoc network can be broken caused by a node in the route may move out of their neighbor's signal range or node's battery...
This paper introduces an integrated framework for multicast and unicast routing in mobile ad hoc networks (MANET) based on interest-defined mesh enclaves. Such meshes are connected components of a MANET that span the sources and receivers of unicast and multicast flows. We present the Protocol for Routing in Interest-defined Mesh Enclaves (PRIME), which establishes meshes that are activated and deactivated...
In mobile sensor networks (MSN), MSN may have a high rate of communication failure since the routing path can be broken when some nodes on the path move to other position. So, MSN has to provide a means for low-cost and low-power routing to support mobility of sensor nodes. In this paper, a limited flooding scheme for routing in MSN is proposed to allow efficient energy utilization without requiring...
Ad hoc networks in which nodes communicate via multi-hop, without wired infrastructure have been considered as excellent candidates for tactical military communications. In this paper, we present a routing scheme suitable for tactical networks, which combines zone routing protocol and backbone networks. With the introduction of backbone nodes, message to nodes outside of routing zone is relayed though...
Recently, many flooding techniques for Mobile Ad Hoc Networks (MANETs) have been proposed. However, most of these techniques assume that every node in the network has the same transmission range. Therefore, these techniques have poor performance when the nodes in the network have different transmission ranges. In this paper, we propose a new flooding technique to support nodes with different transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.