The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many MANET routing protocols do not perform well in dense scenarios with high network load. In these situations, we can observe a high level of route instability, which is often called "route flapping". In this paper we present the PRIME routing protocol, which uses a probabilistic multipath forwarding process to increase route stability in dense scenarios with high network load. We describe...
Scaling to large networks and dealing with high mobility define the major challenges in designing routing protocols for Mobile Ad hoc NETworks (MANETs). These protocols must be efficient in order to ensure quality of service (QoS) support and energy efficiency. In this paper, we investigate the effect of density and mobility on routing operation on the basis of a high level of QoS jointly accounting...
Mobile Ad-hoc Networks are highly reconfigurable networks of mobile nodes which communicate by wireless links. The main issues in MANETs include the mobility of the network nodes, energy limitations and bandwidth. Thus, routing protocols should explicitly consider network changes into the algorithm design. In order to support service requirements of multimedia and real-time applications, the routing...
Wireless data communications commonly use public networks to exchange data packets. Public networks of rural area are lack of network infrastructure so it will inflict high delay for wireless communications. The rural areas are same with intermittent area that need a mechanism of data transfer to tolerate with delay. The Delay Tolerant Network (DTN) is a solution for data transmission in rural areas...
This paper presents a routing protocol called Load Distributed Mesh Routing (LDMR) that is developed for Wireless Mesh Network (WMN) with IEEE 802.11 standard. The LDMR protocol decides on the potential next hop nodes based on a quadrant and distance information. Then, the Next Hop Forwarding (NHF) decision is used to select the best next hop nodes based on Packet Success Rate (PSR) and maximum velocity...
Wireless Sensor technology is one among the fast emerging technologies in the current scenario and it has wide range of application also which has small sensors with minimum communicational and computational power. Depending on the overhead of a node, the energy consumption varies with each other. This leads to the non-uniform distribution of the energy which in turn degrades the performance of the...
In recent era of communication, limitation of the spectral resource has increased rapidly. Cognitive radio ad-hoc networks (CRAHNs) are an intelligent network which provides a good solution for effective utilization of the spectrum opportunities. In cognitive radios different research directions are identified like spectrum sensing, sharing, handover, and routing. This research directs the problems...
In this paper we present a stepwise formal development of the Optimised Link State Routing (OLSR) protocol in Event-B. OLSR is a proactive routing protocol which finds routes for different destinations in advance by exchanging control messages through the network. As a consequence, whenever a data packet is injected into the network can be delivered to a certain destination immediately. To achieve...
In this paper, we present a self-optimizing routing algorithm using local information only, in a three-dimensional (3D) virtual grid network. A virtual grid network is a well-known network model for its ease of designing algorithms and saving energy consumption. We consider a 3D virtual grid network which is obtained by virtually dividing a network into a set of unit cubes called cells. There is one...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
SatSim was developed to provide a low cost, easy to learn, network simulator for simulating satellite networks. SatSim is unique in that it accurately accounts for orbital movement of satellites on a discrete per packet basis that heavily affects communication link quality. SatSim can be seen as a special case of a typical network simulator, developed for networks that require physical node movement...
This paper presents experimental verification of the performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are localized to geographic areas, such as military tactical networks. Initial simulations in NS3 showed that GCN offers high delivery with low network overhead in the presence of high packet loss and...
A MANET is a self-configuring ad hoc network that could be very useful for battlefield communication. Because of its versatility, Tactical Mobile Ad-hoc NETwork (MANET) is also widely used by modern military units especially for the autonomous maneuvering of unmanned vehicles and robots. But Quality of Service in Tactical-MANET is difficult because the network topology changes dynamically. The resource...
In mobile ad-hoc networks (MANETs), nodes use hello messages to detect neighbor nodes and to maintain link connectivity. In a typical MANET routing, a node broadcasts hello messages at a fixed interval. However, a fixed hello interval causes a long delay of neighbor discovery (too long hello intervals) or a more bandwidth waste by unnecessary protocol overhead (too short hello intervals). In this...
In the aftermath of a natural or industrial disaster, locating individuals is crucial. However, disasters can cause extensive damage to the network infrastructures and a generalized loss of communication among survivors. In this article, we present a network support solution that provides a post-disaster geolocation-collecting service that relies on inter mobile device connections. On top of this...
Current mobile ad-hoc routing protocols are not suitable for flying ad-hoc network, because of the dynamic environmental conditions, high mobility and terrain structures. In this paper, we propose a novel directional routing scheme for flying ad-hoc network using combined omnidirectional and directional transmissions. The proposed scheme features hybrid use of unicasting and geocasting routing using...
Routing protocols for Mobile Ad hoc Networks (MANETs) have been extensively studied. However, the presence of malicious nodes makes it difficult to establish a valid route. Some of the well-known source routing protocols presented in the literature which claim to establish secure routes are prone to hidden channel attacks. In this paper, we address this issue and present a novel protocol based on...
Providing efficient routing service over tactical multi-hop ad-hoc networks is a crucial building block in wireless communication networks especially during a disaster relief. To date, there is still a lack of routing standards for such networks. Indeed, in such harsh environment, medical rescue teams, firefighters, military, police and even victims need to be steadily connected to a distant command...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
Information-Centric Networks (ICNs) operating over Mobile Ad hoc Networks (MANETs) are challenged by the node churn, evolving topologies, and limited resources of the underlying network. The complex interplay of publishers, subscribers, and brokers brings with it a corresponding set of security concerns, where precisely-defined trust boundaries are needed to guarantee the confidentiality and integrity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.