The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Micromobility protocols have been proposed to provide seamless local mobility support. There are several micro mobility protocols such as HMIP, Cellular IP and HAWAII. This paper focuses on the performance of single stream forwarding scheme of HAWAII . An analytical model is developed for the evaluation. The aim of the paper is to investigate the impact of the buffering at the old base station on...
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed VLR. Fortunately, we improve...
A design of vending machine based on the short massage payment with the main control module M68HC11 and GPRS module MC35 has been illustrated. This paper describes the working program of the system and especially the MDB bus and photoelectric conversing circuit and MC35 module are presented. A structure of vending machine is designed, the hardware ideas of bus conversion interface, the software protocol...
Wireless sensor network which is composed of a large number of low-cost, low-power, multifunctional sensor nodes deployed in a remote environment to monitor and analyze the data collected in the physical world in a timely manner. Based on the feature of nodes with limited energy, people have done some deep research on the prolongation of the lifetime in the WSN. In this paper, we focus on reducing...
In this paper is presented a new model for intelligent traffic systems, which is able to integrate a typical surveillance scenario and topology independent immediate data delivery. Surveillance part is based on image analysis, namely general foreground/background modeling scheme. Data delivery system ensures data transmission over mobile Ad-hoc network, by providing communication framework for this...
Vehicular ad hoc networks (VANETs) are emerging as a new network environment for intelligent transportation systems (ITS). In many applications envisaged for VANETs, traffic information needs to be disseminated to relevant vehicles during a duration of time. Here we present a model of warning message dissemination in VANETs. The idea in our model is that vehicles on a stretch of roads carry warning...
Many applications and protocols are planned for the so-called Intelligent Transportation Systems (ITS). Most of them are supposed to work in dynamic networks, such as the vehicular ad hoc networks (VANET). However, designing and studying distributed applications and protocols in such networks is not easy. Analytical studies suffer from the lack of pertinent models. Simulations are often far from reality...
Distributed processes with message passing strategy, communicate among themselves by exchanging pieces of information to perform exclusive access to achieve the tasks in a distributed fashion. In this paper, we consider sorting and prefix computation problems with n elements distributed over a number of communication processors in a distributed system. The proposed distributed sorting algorithm improves...
This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-to-catch/observe wildlife in their natural habitat. CARNIVORE consists of a network of mobile and static nodes that have sensing, processing, storage, and wireless communication capabilities. One of CARNIVORE'S notable novel features is its robustness to intermittent node connectivity since, depending...
Modern cars are equipped with an increasing number of electronic systems which encompass comfort, security, and infotainment related features. The complexity of the physical and logical network topology as well as the bandwidth requirements are steadily increasing. Therefore, a bus standard that can handle upcoming application requirements and is suitable for the automotive environment is needed....
As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empirical traffic measurement of BitTorrent service in various settings (static, bus and subway) in commercial WiMAX networks. To this end, we analyze the connectivity among peers, the download throughput/stability, and the signaling overhead...
Mobile WiMAX access network is being developed to support various multimedia services such as mobile Internet Protocol Television (IPTV), mobile Video-on-Demand (VoD), and mobile internet services. This mobile network is a shared radio medium which utilizes a point-to-multipoint method, where one base station (BS) can be connected to many mobile stations (MS). That is to say that a mobile IPTV viewer...
The complexity and connectivity of modern vehicles has constantly increased over the past years. Within the scope of this development the security risk for the in-vehicle network and its components has risen massively. Apart from threats for comfort and confidentiality, these attacks can also affect safety critical systems of the vehicle and therefore endanger the driver and other road users. In this...
We define an ad hoc transportation system as one that has no infrastructure such as roads (and lanes), traffic lights etc. We assume that in such a system the vehicle are autonomic and can guide and direct themselves without a human driver. In this paper we investigate how a safe distance can be maintained between vehicles. A vehicle which has been compromised by an adversary can cause serious chaos...
Securing communications among a group of nodes in mobile ad hoc networks (MANETs) is challenging due to the lack of trusted infrastructure. Group key management is one of the basic building blocks in securing group communications. A group key is a common secret used in cryptographic algorithms. Group key management involves creating and distributing the common secret for all group members. Change...
Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today's cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the...
The network in case of Mobile Adhoc networks is generally poorly defined or not defined at all. In Such a network the data can be relayed/routed by intermediate nodes whose position keeps on changing. Mobile adhoc networks have some challenges like Limited wireless transmission range, broadcast nature of the wireless medium, hidden terminal and exposed terminal problems, packet losses due to transmission...
In this paper, we consider a 2-hop downlink point-to-multipoint fixed relay systems and propose a novel linear processing strategy at the base station and relay station to improve the reliability of the source-relay and relay-to-destination links. When coupled with a soft-decode-and-forward protocol, the proposed scheme leads to significant performance gain compared to the conventionl solutions for...
This paper presents one inner-cluster scheduling algorithm, avoiding mobile nodes' location affect, satisfying expected coverage scale and high-effect. This excludes the number of smallest inner-cluster active nodes k, which can satisfy expected coverage scale in monitored area, according to coverage analysis theory. In inner-cluster, we only select k nodes with higher energy and nearer close to fixed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.