The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Relaying mechanisms for Chain Collision Avoidance (CCA) applications in Vehicular Ad-hoc Networks (VANETs) are crucial when one hop transmissions are not enough to reach all of the vehicles in a platoon at risk of accident. Taking into account that CCA-related information must be distributed to as many vehicles as possible in the shortest affordable time, a reasonable way to determine the viability...
Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day...
In sparse mobile networks, nodes are connected at discrete periods of time. This disconnection may last for long periods in suburban and rural areas. In addition, mobile nodes are energy and buffer sensitive, such as in mobile sensor networks. The limited power and storage resources, combined with the intermittent connection have created a challenging environment for inter-node networking. This type...
This paper proposes efficient analytical models to dimension the required transport bandwidths for the Long Term Evolution (LTE) access network for the elastic Internet traffic (which is carried by the TCP protocol). The dimensioning models are based on the use of Processor Sharing queuing theory to guarantee a desired end-to-end application QoS target. For validating the analytical dimensioning models,...
Solutions for Vehicular Ad-Hoc Network (VANET) are challenging due to the intrinsic nature of the network which involves, by definition, node mobility, scarce or null fixed nodes and, at the current state of art, lack of solutions for the real-time tracking of positions. Moreover VANETs are meant to provide primarily a solution for the improvement of road safety, by the proper forwarding of messages:...
The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This...
Key management is a most important issue in MANET. Signcryption, as a new cryptographic technique, which combines the functions of digital signature and encryption algorithm for authenticity and confidentiality in an efficient way, is very useful to secure key management in MANET. For design secure and efficient ID-based and threshold key management protocols in MANET, in this paper, we propose a...
Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applications that could be supported if a keyfob would be able...
The increased traffic density in urban areas should be handled by a robust collision avoidance and traffic control system that is based on decentralized inter-vehicle communication. In such a special ad hoc network traditional routing protocols cannot cope with the high mobility and low link reliability, while flooding based approaches consume too many resources. Our proposed solution, Carefully Localized...
We focus on the problem of efficient dissemination of available gateways information throughout a Vehicular Ad-hoc Network (VANET). Contrary to previous works, we also consider how the gateway discovery protocol affects user data flows that are routed to the infrastructure network. The cases of both delay-tolerant and delay-constrained user traffic are studied. We propose two schemes targeted at reliable,...
The effort dedicated to the ultimate goal of designing an architectural framework for tactical mobile ad hoc networks (MANETs) has long been hindered by the excessive control overhead of routing protocols to maintain a full view of the network topology. This paper explores the viability of adopting network coding as a means of improving reliable data delivery while lowering control overhead in large...
Safety is the only way home. Broadcasting techniques have been applied widely to improve the traffic safety, especially pileup crash avoidance by sending the emergency messages to alert drivers; however, such application often suffers from the broadcast storm, hidden node, interference, and contention problem. In the paper a novel area-based broadcast protocol was proposed. Its relaying model running...
Deterministic approach to broadcasting in Mobile Ad Hoc Networks (MANETs) is effective in reducing redundant broadcasting. In this approach, a transmitting node selects a subset of its immediate or 1-hop neighbors to rebroadcast the message such that all its 2-hop neighbors will receive the message, or being covered. In order to reduce redundant broadcasting, the set of 1-hop neighbors to be covered...
The possibility of connecting vehicles to fixed IP networks through roadside units (RSUs) or even access gateways is seen as a very interesting alternative to fully infrastructure-less VANETs. However, getting access to those fixed networks must be controlled and only authorized users should be able to use those RSUs or gateways. However, that authentication process incurs in a not-negligible delay...
A base station (BS) transmits (Tx) and receives (Rx) signals to and from multiple mobile users (MU) through a two-way amplify and forward (AF) relay station (RS) using a two-phase protocol. The BS and the RS are both equipped with multiple antennas. In the first phase (time or frequency), the BS and all MU transmit their signals to the RS. In the second phase, the relay transmits towards the BS and...
In this paper, we compare communication schemes in scenarios of interest for underwater networks where multiple nodes collaborate towards the accomplishment of a target detection and tracking task. We consider two specific cases: in Scenario 1, a mobile Autonomous Underwater Vehicle (AUV) i) collects data from a set of fixed sensors deployed on the seafloor or ii) transmits data to the same nodes...
The following topics are dealt with: mobile network; I/V communication; features scene categorization; texture classification; image classification; video surveillance sequences; wireless sensor network and protocol; face recognition; cryptography and watermarking; video coding; content based indexing and retrieval; signal and speech processing; and biomedical image processing.
Security is a fundamental issue in the deployment of any kind of network, in particular those networks that affect people integrity. It is therefore important to detect the existence of any failure and to try to avoid its propagation as much as possible. In order to take maximum advantage of ad-hoc networks, protocols should be adapted to these new technologies by proposing new alternatives to centralized...
In order to deploy vehicular communication system, security and privacy issues have to be resolved. In this paper, for achieving secure and privacy preserving communications, an easily implementable PKI-based protocol is proposed. Security requirements for vehicular communications are defined and a detailed definition of the scheme, which uses shared asymmetric keys and PKI techniques to provide anonymous...
This paper deals with creation and maintenance of mobile devices networks. A multi-agent approach based on self-organization strategy is proposed for building a virtual backbone, segmentation detection, and network recovery. In this approach each mobile device is controlled by a multi-role agent, which performs these tasks efficiently by using local interactions; role management allows backbone reconfiguration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.