The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless Ad hoc networks, congestion occurs frequently at intermediate nodes when forwarding data packets between source-destination pairs. This traffic incurs higher packet loss, longer transmission delay, and faster energy resources depletion, thus degrades the performance of the network. This paper analyzes the performance of our hybrid Multipath Battery and Queue-Aware OLSR routing protocol...
This article analyses the primary design goals and challenges for routing protocols in wireless sensor networks. And it discuss various routing strategies and describe some important routing protocols. Finally, the article concludes with evaluation methods that are capable of effectively managing the trade-off between optimality and efficiency.
Large scale disasters require prompt rescue and relief operations to restrict further casualties. To carry out such operations, it is essential to have a communication infrastructure between survivors and responders, which is often impaired due to the disaster. Off-the-shelf wireless devices such as smartphones, PDAs and Laptops offer an effective solution towards the establishment of makeshift communication...
With the development of the latest technologies and changes in market demand, the wireless multi-sensor system is widely used. These multi-sensors are integrated in a way that produces an overwhelming amount of data, termed as big data. The multi-sensor system creates several challenges, which include getting actual information from big data with high accuracy, increasing processing efficiency, reducing...
This paper describes the performance enhancements of the routing mechanism for mobile ad-hoc networks. The presented solution is based on the proactive Optimized Link State Routing (OLSR) protocol. A new method was introduced to calculate the node performance metric with respect to the local resources, i.e., the battery level and the available bandwidth. This metric is reflected by the Willingness...
The newest version of the Bluetooth core specification, version 4.2, includes Bluetooth Low Energy (BLE) technology and is enabling an explosion of new mobile, wearable, home, and industrial devices which can communicate with each other. Part of the burgeoning Internet of Things (IoT), these devices require low power methods for forming mobile ad-hoc networks (MANETs). In this work we present BLE...
The deployment of Mobile Adhoc Networks (MANETs) in military/battlefield environment has helped proliferation of wireless voice and data communications services to the users beyond the reach of fixed network connectivity. However, the battery operated mobile nodes are constrained by their battery life, which may be difficult to replace/recharge in hostile battlefield environment, and thus affecting...
The aim of this project is to define Vampire attacks, a new class of resource consumption attacks that use distance vector routing protocols to permanently disable ad hoc wireless sensor networks by depleting nodes' battery power. A node is permanently disabled once its battery power is exhausted; let us briefly consider nodes that recharge their batteries in the field, using either continuous charging...
Ad hoc wireless networks are influence embarrassed because nodes function through restricted battery energy. Therefore, Energy expenditure is central propose of new ad hoc routing protocols. To propose such protocols we contain to give the impression of being missing from the conventional minimum hop routing schemes. Moreover, limited-energy property makes together nodes and network lifetime surrounded...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
in this paper, we have urbanized a fresh sink placement policy in Wireless Sensor Networks (WSNs). We studied the problems in previous sink placement strategies such as RSP, CNP, GOSP, SOSP, CLHM, ISP, and GSP. These previous sink placement strategies are not concerned about dynamicity of the network under consideration. The information about sensor nodes positions is not known beforehand in concerned...
Because of the success of wired network, the protocols proposed for MANETs in the past are based on shortest path algorithm such as AODV or DSR. Although it brings better data transmission bauds, various conditions of MANETs might cause different problems. For example, MANETs usually run in limited power supply. Therefore, if they communicate using shortest path algorithm, then power consumption will...
The increasing research in the areas of Wireless Sensors Networks (WSNs) have a positive impact in the world and have gained increasing attention from both the research community and actual users. A wireless sensor network compromises of a large number of diffuse independent sensors; these sensors is to be used to control an event range in scale from large national environmental pollution monitoring...
Mobile Ad hoc Networks (MANETs) suffer from security attacks and privacy issues, which dramatically impede their applications. In addition, the security measures applied in MANETs (like encryption and key distribution) have a number of negative effects on the network's performance. Cryptographic operations introduce a lot of both CPU and communication overhead. Therefore, routing protocols improvement...
In wireless ad-hoc network, all nodes work with the predefined limited battery power. It is difficult to select the path from source to destination considering both the parameters i.e. Less energy consumption and shortest path at the same time. This paper proposes a novel strategy that approach tries to account for energy efficient path with the minimum number of hops using a priority to check between...
Heterogeneous Nodes in a Mobile Ad Hoc NET-work(MANET) are having very constrained resources like memory, bandwidth, CPU speed, battery life etc. Here, Heterogeneous Nodes means, all/few nodes are having variety of functionality. Irrespective of having higher secured nodes and security algorithms in MANETs, some time, the honest nodes can be accessed by fraud/malicious nodes or simply attacked by...
Ad hoc networks are wireless networks that can operate without infrastructure and without centralized network management; they may contain nodes with limited battery power; hence, energy conservation is a critical requirement in the design of routing protocols for ad hoc networks. Clustering has been proposed as a promising method for simplifying the routing process in mobile ad hoc networks when...
Hotspot is a new technology which recently becomes popular as more and more people are using smart phones now days. We can easily connect two or more devices via hotspot and create a new network and provide data transmission between them. We can also provide internet to other devices via hotspot. Hotspots can be easily accessed by common people as they are available in many public areas such as Mc...
Many new research areas such as the Internet-of-Things (IoT) propose the interconnection of every days objects, changing the way how we interact with the environment and our world. One key building block of these new research areas are wireless multi-hop networks (WMHNs). Particularly, providing an energy efficient routing is one of the most challenging topics. Algorithms inspired by behavioral patterns...
Each sensor node in a wireless sensor network (WSN) mainly consumes energy to sense the environment and convey or relay the sensed data to a sink node. Once the resident energy in a sensor node is drained, this may cause incomplete sensing coverage, resulting in WSN failure. The lifetime of a network begins when the network starts working and ends when the first node becomes ineffective from energy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.