The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a mobile ad hoc network, efficient routing, resource allocation, and energy management can be achieved through clustering of mobile nodes into local groups. In this paper we propose a clustering scheme that allows self-configuration and adaptation of the network, prolonging its lifetime by distributing energy consumption among clusters. A combined weighted metric approach is used to select cluster-head...
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target tracking and bush fire surveillance, latency is an important concern, and little attention has been paid to it in the design of routing protocols for such applications to meet the specified Quality of Service (QoS) requirements...
Energy consumption is a vital factor in the successful deployment of ad hoc sensor networks because sensor nodes are powered by on board battery which are extremely difficult to be recharged. In this article we have proposed a new routing technique based on the idea of random walk with the objective of saving energy. Our approach is inspired by an existing TDMA like routing protocol. We have given...
Reliable delivery of data is a classical design goal for reliability-oriented collection routing protocols for ad hoc wireless sensor networks (WSNs). Guaranteed packet delivery performance can be ensured by careful selection of error free links, quick recovery from packet losses, and avoidance of overloaded relay sensor nodes. Due to limited resources of individual senor nodes, there is usually a...
A location independent coverage control algorithm LICA is proposed in this paper. LICA adopts the hierarchical clustering idea. The neighboring nodes exchange the information and find out redundancy node in order to turn off their communications equipment. The simulation and analysis study demonstrate that the LICA not only provides the high quality of area coverage and good scalability, but also...
Due to the limited energy supplies of nodes, in many applications like wireless sensor networks, energy-efficiency is crucial for extending the networks lifetime. We study the routing problem for multihop wireless ad hoc networks based on cooperative transmission. The source node wants to transmit messages to a single destination. Other nodes in the network may operate as relay nodes. In this paper,...
Distributed encoding of WSN generated data based on network and fountain coding principles has attracted considerable attention lately. The proposed solutions offer low-complexity distributed data storage and increase data robustness to node failures. Rateless packet approach is recently proposed distributed rateless coding solution which performs closely to centralized rateless codes and is simple...
In infrastructure-less sensor networks, efficient usage of energy is very critical because of the limited energy available to the sensor nodes. Among various phenomena that consume energy, radio communication is by far the most demanding one. One of the effective ways to limit unnecessary energy loss is to control the power at which the nodes transmit signals. In this paper, we apply game theory to...
Push-to-talk (PTT) is a promising service for group-based voice communication in ad-hoc networks that organize communication groups. Previously proposed iPTT mechanisms use a cluster-based super node for call determination. However, a hierarchical structure that uses clusters introduces unnecessary signaling costs, while an ad hoc network is vulnerable to energy consumption. To solve these challenges,...
Energy efficiency is a major issue in any wireless networks. Medium access control (MAC) protocols play an important role in providing a fair and efficient allocation of the available bandwidth. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation to each other. In this paper, we present a comprehensive review of energy...
In this paper, a multi-hop B3G architecture, which is a heterogeneous wireless network (HWN) architecture, integrating MANET, infrastructure WLAN with 3G UMTS network, is considered for the purpose of providing anytime, anywhere data access as it utilizes the higher bandwidth rates of MANET and WLAN networks and wider range of communication of 3G network. The issues of gateways in HWN, which serve...
The traditional routing protocols for mobile ad hoc networks (MANET) are not appropriate for wireless sensor networks (WSNs). The reason is the large amount of overhead produced may exhaust the energy of the network and shorten its lifetime, especially in the process of maintaining routes. In this paper, considering a large scale WSN, we propose a simple but efficient AODV-based protocol, called AODV...
In this paper, we consider two fundamental problems in log-normal fading networks. One is the energy efficiency. The other is the characterization of the internode interferences and spacial reuse. We first introduce a power efficiency factor as a new parameter to measure the transmit efficiency and obtain an optimal transmit power allocation of the concurrent transmitters in such fading environment...
Maintaining low power consumption is critical in wireless ad hoc and sensor networks. With packet transmissions and retransmissions consuming much of the energy resources in wireless networks, it becomes important to minimize the number of transmissions associated with the end-to-end delivery of packets. Power-aware routing algorithms must balance the advantages and disadvantages of selecting to forward...
Although wireless sensor networks (WSN) have been an active field of research for the last so many years, service discovery within WSN has not been considered much by the research community. Service discovery in wireless sensor networks particularly in the context of future ubiquitous computing plays an important role and its significance cannot be underestimated. In this paper, we present a study...
In wireless sensor networks (WSNs), hierarchical network structures have the advantage of providing scalable and resource efficient solutions. Thus, finding an efficient way to generate clusters is an important topic in WSNs. To achieve this goal, this paper adapts the well-understood hierarchical agglomerative clustering (HAC) algorithm by proposing a distributed HAC (DHAC) algorithm. DHAC provides...
Delay tolerant networks are a class of networks characterized by intermittent connectivity, long delays, and noncontemporaneous end-to-end paths between nodes. Standard Internet protocols do not fare well in these situations and special protocols have been developed to handle routing, broadcasting and other mechanisms for transporting data. In this paper, we discuss a mechanism for energy efficient...
We study the formation of ad-hoc networks among selfish energy-constrained wireless devices that are primarily interested in being connected with other devices. We use a non-cooperative bilateral connection game (BCG) framework to study network formation. For a BCG in which devices choose their individual strategies to remain connected by minimizing only their direct transmission power costs, we show...
This paper discusses the problem of achieving bandwidth and energy-efficient neighborhood group key distributions (NGKD) in tactical wireless sensor networks (TWSNs). We present new techniques that improve NGKD performance while also improving the resilience of TWSNs against attacks that combine node capture with message interception. This is accomplished without introducing additional communications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.