The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Among the research community, on-going efforts are being continued to efficiently interconnect MANETs to fixed infrastructure in order to expand the reach of the Internet to Wireless access networks. Such scenario gives raise to a number of challenges that require solutions involving Internet gateway selection scheme, extensions to ad hoc routing technique. In this paper, we depict a network architecture...
A personal network (PN) is a network of personal devices regardless of their geographical locations. A PN may consist of several ad-hoc sub-networks, each of which is referred to as a cluster. Different clusters are connected to each other through their gateways and using interconnecting structures, e.g., the Internet. Inside each cluster, there might be several nodes that are able to act as gateway...
In the boundless digital world and global society of the Internet, anonymity and privacy are becoming increasingly important issues. Many anonymous networking protocols have been proposed and numerous empirical investigations over these networks analyzed; however, no known taxonomies exist for consumers to quickly and easily identify which anonymity properties are offered by the disparate wired and...
We model the multi-path multi-hop routing in networks with selfish nodes as an auction and provide a novel solution from the game-theoretical perspective. We design a mechanism that results in Nash equilibria rather than the traditional strategy proofness, which alleviates the over-payment problem of the widely used VCG mechanism. Through theoretical analysis, the proposed protocol is shown to be...
Because of easy accessible medium in wireless networks, use of these wireless networks in military applications poses several security issues. Likewise, in the business field, despite the emerging static wireless Internet access, the same security issues remains. On example is the passive attack in which attackers attempt to overhear network communications from the outside. Confidentiality can be...
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol.In this paper, Mobile-IP is integrated with Hierarchical...
Wireless mesh access networks (WMANs) have become popular to provide 'last-mile' broadband wireless Internet access to large communities. Wireless mesh access networks comprise of powerful, dedicated routers which act as the backbone access networks for users. Wireless mesh access networks have neither mobility nor energy constraints as the routers act as fixed wireless access points for providing...
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol. In this paper, Mobile-IP is integrated with Hierarchical...
Distributed denial of service (DDoS) attacks have become a major threat to organizations and especially to Internet and intranet. In DDoS attacks targets are overwhelmed by sending an enormous amount of traffic from number of attack sites. The major tasks of any defense system are to detect these attacks accurately and early on, before it causes an unrecoverable loss. Most of the research in this...
Wireless mesh network (WMN) has gained popularities due to its quick and inexpensive ways to access to the Internet. While the traditional wireless network uses single access point for data transmission, WMN uses multiple radios for simultaneous transmission. However, WMN may have poor performance during the transmission of TCP. TCP congestion control mechanism in WMN causes packet delay. Having known...
New social networks are born each day, at a formal conference, at informal social gathering, at family reunions etc. Internet has already been playing an important role in modern way of socialising. But it is still not the optimal way of interaction as one has to be very active updating profiles. With the easy access to mobile devices, modern technologies have now started to adopt to new ways of socialising...
The next generation mobile communication systems will be based on Infrastructure wireless LAN technologies like cellular and ad hoc networks. Such hybrid networks benefit the extension of infrastructure network coverage using Ad Hoc connectivity apart from offering the ad hoc nodes access to the resources of the Wired/Infrastructure networks. In most of the integration strategies Mobile IP is integrated...
The integration of wired and wireless networks is gaining popularity due to its usefulness and practical use. Internet connectivity would benefit users from mobility offered by mobile ad hoc networks and connectivity provided by the Internet. This integration however faces problem due to architectural differences in terms of infrastructure, topology, and mobility mechanisms. A number of integration...
Over the last few years, multimedia content sharing through different service providers have gained popularity among the Internet users. The development of wireless mobile devices with enhanced features have further fueled this phenomenon. While such content sharing in Internet is accommodated through an overlay architecture, for infrastructure-less environment such as wireless mobile ad hoc networks...
The rapid growth of high-speed multimedia services for mobile, residential and small business customers has created an increasing demand for last mile broadband access. The wireless broadband connectivity to the Internet is becoming increasingly available as an alternative to traditional wired technologies in cities across the globe and have the potential to fulfill the vision to high-speed broadband...
A wireless mesh network (WMN) provides a flexible and low-cost solution for end users to connect to the Internet through its multi-hop infrastructure. For such a network to proliferate, a fundamental problem that must be solved is to ensure the fair allocation of network bandwidth to all participating parties. This paper proposes a cross-layer design for achieving end-to-end maxmin fairness in WMNs...
With the significant development of wireless technologies, vehicular ad-hoc network (VANET) has gradually become the killing application for automobile industry. Many VANET systems have been developed in recent years. However, the majority of them have the assumption that all or most vehicles have wireless communication devices installed along with an elaborate road side infrastructure. This assumption...
We investigate the bootstrapping of policy-based access control in a deny-by-default mission-critical MANET. In the absence of any initial policies, a deny-by-default system fundamentally prevents all traffic flow. Providing all policies prior to deployment assumes advanced knowledge of all possible future scenarios - an assumption that is often unrealistic in practice; furthermore, policies may change...
One of the popular wireless network architectures is mobile ad hoc network (MANET) which can be deployed easily in almost any environment, without any underlying backbone and infrastructure support. The MANET Nodes (Routers and Hosts) can move randomly and re-organize themselves into an arbitrary network. Because of the limited range of each hostpsilas wireless transmission, to communicate with hosts...
The routing architecture in today's IP networks relies on IP addresses that are overloaded in the sense that they are used as both identifiers (IDs) and addresses (locators). This makes it hard to support the need for multi-homing, traffic engineering, and mobility while maintaining address hierarchy that is essential for scalable routing. Thus, there is a need to separate identifiers from locators...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.