The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the lack of a centralized management, mobile ad hoc networks (MANETs) are prone to various types of attacks. Trust management systems has been proposed to allow such networks to identify misbehaving nodes, enforce their collaboration in network functions. However, the trust management can be challenged by unique characteristics of MANETs in terms of absence of centralized management, severe...
Aeronautical ad hoc networks (AANETs) can have a hybrid topology of intermittently connected clusters and mesh network. The hybrid network topology compounded with highly dynamic nature of AANET leads to variable connectivity in the network. The connectivity in the network for direct air-to-air communication between aircrafts is primarily a function of velocity of air vehicles, position of air vehicles,...
Nodes in MANETs are subject to many security leaks, because the communication between nodes occurs using the wireless medium without an infrastructure. Each node has a limited amount of energy available, because they are powered by batteries. Performing monitoring operations to establish whether a node is fair or not requires a large amount of energy, hence their reduction is desirable when they are...
In this work, we propose an adaptive congestion control and avoidance mechanism as an enhancement to our earlier proposed QoS-aware routing protocol. We utilize Ant Colony Optimization (ACO) algorithms for adaptive multipath routing and use the monitoring feature of the Simple Network Management Protocol (SNMP) for QoS computation. So, merging these two methodologies we propose a powerful adaptive...
Crowdsourcing is a novel paradigm which has applications in a plethora of disciplines including software development, public administration, and communication technologies. In the field of telecommunications, crowdsourcing makes a viable addition to state of the art benchmarking methods for mobile networks, when combined with mobile sensing approaches to employ smartphones as end nodes. In this paper,...
In Mobile Wireless Sensor Networks (MWSN), during routing, there may be an increase in congestion levels. It is required to automatically alter the traffic rate accordingly. In this paper, we propose to design an intra and inter cluster congestion control technique for MWSN. In intra-cluster congestion control, the Cluster Head (CH) proactively monitors the congestion within the cluster each time...
With the increasing adoption of mobile 4G LTE networks, video streaming as the major contributor of 4G LTE data traffic, has become extremely hot. However, the battery life has become the bottleneck when mobile users are using online video services. In this paper, we deploy a real mobile system for power measurement and profiling of online video streaming in 4G LTE networks. Based on some designed...
Network size and number of mobile users are ever-increasing with the advancements in cellular network technologies. Hence, this situation makes the network monitoring highly complex. Although there are numerous network tomography approaches, service providers need real-time network monitoring tools to provide better network utilization. In this paper, we propose a crowdsourcing-based real-time network...
Resource allocation in multi-operator scenarios requires an estimate of the tenants' traffic needs. This is necessary in the scenario where a Mobile Network Operator (MNO) owns the Radio Access Network (RAN) and many Mobile Virtual Network Operators (MVNOs) act as resellers of their host network's capacity under their own brands, to their own customers. In such scenarios, the forecasted MVNO traffic...
The purpose of this paper is to develop measuring complex for monitoring of mobile network's coverage area. Measuring complex is client-server software. The client part of software is installed on the mobile device and the server part of software is installed on the Internet server. The complex allows collecting the following types of information: the level of signal power, the identification numbers...
The evidence that mobile data traffic is enormously increasing is forcing the whole telecommunications industry to rethink most of the paradigms which have driven until now the design of mobile networks, traditionally very efficient for voice and limited data communications. It is foreseen that 5G technology will introduce disruptive changes with respect to how radio resources are managed and consumed...
There is a large number of European Union (EU) projects that deal with Smart Grids research and deployment. Overall, they provide a substantial amount of knowledge that can be mined to gain useful insights for future projects and on-going roll-outs of Smart Grid related utilities. In the current paper, we focus on Smart Meters and we evaluate different communication-related architectural styles within...
In a mobile Self-Organizing Network (SON), the SON coordinator has been introduced to control the application of Configuration Management (CM) changes, in order to prevent conflicts between independent SON function instances running in parallel. However, there is always a trade-off between stability and efficiency. On one hand we need to avoid conflicts, on the other we want fast, parallelized execution...
Hypertensive disorders are the most common problems during pregnancy. They cause about 10% of maternal deaths. The world mortality rate has decreased but many women are still dying every day from pregnancy complications. Various technic resources are being used in an integrated manner in order to minimize even more the death of both mothers and babies. Mobile devices with Internet access have a great...
In this paper, we studied for the synchronization of CCNx that is one of the Content Centric Network (CCN) projects by using Hazelcast. CCN is considered as a way to solve the explosive growth of Internet traffic. Hazelcast is an open source In-Memory Data Grid. Hazelcast, that one of the consensus-based in-memory data grid, has the strength to speed, high-availability, and secure. To effectively...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
A lot of mobile network works in today network Mobile Ad-hoc Network is a special kind of network which works on variable (not fixed) networks. Due to dynamic characteristics and addictive functionality, these are suffers from various types of attacks. Black-hole and gray-hole attack is one type of attack which harms and attacks on MANET. In this attack the malicious (unwanted node) distract the data...
In order to continue to provide high quality communication services, mobile network operators want to detect the degradation of the communication quality when it occurs. Since actively evaluating LTE network performance is costly and time consuming, mobile network operators passively monitor the network. A finite state machine is a powerful approach for monitoring the network condition. However, in...
In this paper, we have proposed an efficient cluster based fault detection and recovery in MWSN. If the Cluster head (CH) turns to be a selfish or malicious node, then the system will fail to detect the fault and the subsequent recovery process. Hence identifying selfish or misbehaving CH is essential. At the same time, identifying faulty data from sensors is another important issue in data gathering...
In Mobile Adhoc Networks, each node depends on other nodes to forward the data to its intended destination. But due to selfish behavior, some nodes are not ready to share its resources. The reputation systems and price system individually provide the solution for this issue. Yet these systems are not providing adequate solution for cooperation inducement as well as for expeditious resource consumption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.