Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, many routing protocols that take into account particular vehicular ad hoc network (VANET) characteristics such as higher vehicle speeds and mobility patterns have been proposed. Most of the existing VANET routing protocols largely neglect vehicles as obstacles in VANETs. Obstacle shadowing caused by large vehicles such as trucks or buses more negatively affects packet transmission...
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route...
In Ad-hoc networks, routing is complex as nodes are mobile due to which paths are destroyed and generated again and again. The difficulty in MANET is to find a feasible path between communicating nodes as routing is non-deterministic polynomial hard which is due to mobile nature of nodes. Many past works focused on finding a feasible path from a source to destination by considering only a single parameter...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Due to advancement within the telecommunication, wireless communication, wireless sensors, and different technologies a replacement field of analysis has been evolved and this space of analysis is termed as Wireless Body space Networks. In WBAN miniaturized device nodes are planted within the blood stream or on the flesh. These device nodes are battery dependent, once the battery dies, node additionally...
Vehicular communications can be achieved through the infrastructure (Vehicle-to-infrastructure network, V2I), as well as directly through vehicle-to-vehicle communication (V2V) via ad hoc networks. In V2V communications, the routing protocols are designed in order to optimize the dissemination of messages. This paper presents an evaluation of routing protocols such as the Optimized Link State Routing...
In this paper we consider the selection and deployment of MANET protocol to efficiently route the traffic and communicate in Tactical Battle Area (TBA). Tactical Wireless Communication Network (TWCN) provides connectivity between Wide Area System (WAS) of TWCN nodes, forming a backbone transmission network. TWCN is for TBA that consists of Network Centric Systems. These entities impose routing challenges...
Indeed, MANET's are an emerging technology, evolved to provide users with facility to establish Ad-hoc networks for seamless communication. Routing is a major issue in MANET's. AODV is considered as one of most efficient routing protocol in MANET's but, its performance is adversely effected by various security attacks. A routing protocol can be attacked in many ways so as to disrupt the routing process...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
In Mobile Ad hoc Network (MANET), mobile node is responsible for the route establishment using a wireless link where each node behaves like both, as a host and a router. There are number of security threats in MANET possible because of its open untrusted environment with the little security arrangement. Among all of the security threat, a worm hole is considered to be a very serious security threat...
A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data...
Mobile ad-hoc networks are infrastructure less networks. MANETs are constructed without any base station, tower, router and switches. Bandwidth, memory size, processing capacity and Battery lifetime is also limited in MANET. The remote connections in this system are profoundly mistake inclined and can go down much of the time because of portability of hubs, impedance and less framework. Along these...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
Characteristics of Mobile ad hoc networks are high mobility and frequent link failures that result in low throughput and high end-to-end delay. Multipath routing is an attractive option to reduce the number of route discoveries due to such broken paths so that alternate paths are available. Existing approaches to multipath routing employs pre-computed routes determined during phase of route discovery...
Wireless nodes in MANET present stringent resource constraints such as limited battery power and storage capacity, so energy aware cross-layer design is essential to improve the battery life. For prolonged network operational time, energy conservation is a critical issue in routing protocol design in ad-hoc wireless networks. Regardless of the energy saving issues, the conventional AODV routing protocol...
In this paper, an efficient routing protocol for patient monitoring system in rural areas was proposed using wireless sensor network (WSN) so that the patients can be treated within less time. In this system, a village with GSM network is considered and the people in that village are continuously monitored using AMON sensor, an advanced medical monitoring and alert system. All the AMON's work in ADHOC...
Vehicular ad-hoc NETworks (VANETs) have received considerable attention in recent years, due to its unique characteristics, which are different from mobile ad-hoc NETworks, such as rapid topology change, frequent link failure, and high vehicle mobility. The main drawback of VANETs network is the network instability, which yields to reduce the network efficiency. In this paper, we propose three algorithms:...
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
MANET is a self-sorting out, decentralized, framework less, multi hop, remote system of cell phones. routing protocols assume a crucial part in transmission of information over the network. Streaming video is content sent in packed frame over the Internet and showed by the viewer continuously. Mobile Ad hoc Networks are considered for some applications. Routing protocols are the most imperative component...
Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of many mobile nodes. The topology may get changed due to higher mobility. The security is another aspect which is very low. Routing protocols are used for transferring the data packets. Due to high vulnerability in security, many...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.