The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dynamic nature of mobile nodes in mobile ad-hoc networks (MANETs), causes their association and disassociation to and from clusters perturb the stability of network and problem becomes worse if nodes are clusterheads (CH). Therefore cluster maintenance schemes are needed to handle new admissions and releases of node in the clusters. In this paper, we introduce a novel cluster maintenance algorithm...
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources...
The specific characteristics of Mobile Ad Hoc Networks (MANETs) make secure transmission important issues in its research. In this paper, we present a scheme using soft encryption combined with multipath routing to provide security of data transmission over MANETs. In the scheme, the messages are divided into different parts and encrypted by simple operations such as XOR function and bits rearrangement...
On a mobile ad-hoc network environment, where the resources are scarce, the knowledge about the network's link state is essential to optimize the routing procedures. This paper presents a study about different pheromone evaluation models and how they react to possible changes in traffic rate. Observing how the pheromone value on a link changes, it could be possible to identify certain patterns which...
Peer-to-peer networks are rather well-studied and currently there are numerous systems based on peer-to-peer principles running on the Internet. On the other hand peer-to-peer networks for mobile ad-hoc networks have attracted attention only in the recent years. In this paper, we propose a novel peer-to-peer file sharing system particularly designed for mobile ad-hoc networks. The proposed system,...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
In partially connected ad hoc networks (PCANETs), the whole structure is partitioned into several unconnected regions. To address the communication problem between these regions, an on-demand routing technology based on task-relay (OR-TR) is proposed. Single or multiple task-relay nodes are adopted to act as the special communication medium in PCANETs. Simulations have been conducted to study the...
The integration cellular networks, wireless local area networks (WLANs), and the new paradigm of mobile ad hoc networks (MANETs) is the trend for next generation mobile networks. And the multi-hop routing mechanism is an open and challenge issue in this area. In this paper, a multi-hop routing mechanism with fuzzy estimation of links for heterogeneous wireless networks (HWNs) is proposed. The mechanism...
Recently, there are many researches about a trace-back method which specifies the source of transmitted packets in mobile ad-hoc network. In ad-hoc network, since there is no fixed infrastructure, each node has to record the traceback information and reconstruct the trace-path by itself. In conventional researches, since traceback is handled by each node, the variation of network topology by mobility...
Eavesdropping is an important threat in the context of mobile ad-hoc networks due to the use of open air as the transmission medium. As a consequence, some works trying to prevent this threat have been proposed. Some of these proposals focus on the use of anonymous routing protocols. In this paper we analyze two of the most popular: ANODR and MASK. We evaluate their performance through simulation...
A new routing mechanism for intermittently connected mobile networks is presented in this article. Due to high mobility, it is difficult to maintain a reliable path in intermittently connected mobile networks. In order for data transmission among nodes, the flooding-based routing methods were commonly used. Although the deliver ratio can be increased, it exhausts too much network resources. The proposed...
Recently, because of the rising popularity of multimedia applications and potential commercial usage of MANET(Mobile Ad Hoc Network)s, and the limited bandwidth and dynamic topology in MANETs. providing required bandwidth for these applications in MANETs has become an unavoidable and urgent task to achieve sufficient QoS (Quality of Service). Time slot assignment is essential to provide the calculated...
In mobile ad hoc networks, channel bandwidth is a very limited resource. When the network is heavily loaded, the rate of collisions and hence the number of retransmissions increase. This leads to a notable decrease in network throughput and hence reduces quality of service because more and more bandwidth is wasted. MAC layer enables sharing the channel among all the nodes in the network effectively...
We introduce prefix ordering for efficient multicasting (POEM), the first approach to multicast routing in MANETs in which the network-wide dissemination of control information is independent of the number of groups and sources per group. POEM establishes a labeled directed acyclic graph (LDAG) rooted at an elected node in the MANET and assigns a prefix label to each node denoting its network location...
Quality of service support for MANETs is a challenging task due to dynamic topology and limited resources. The main purpose of QoS routing is to find a feasible path that has sufficient resources to satisfy the constraints. In this paper a novel QoS routing algorithm based on ant colony optimization is proposed. The proposed algorithm uses Ant-like agents to discover and maintain paths, that satisfy...
In vehicular ad hoc networks (VANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Trust propagation is the principle by which new trust relationships can be derived from pre-existing trust relationship. Modeling for trust propagation is a fundamental block in an ad hoc environment. The main contribution of this work is a novel scheme to enhancing...
This paper studies optimal relay-based multicast routing to improve throughput in multirate-aware MANETs. The main idea is trying to replace a lower rate transmission of upstream node with some higher rate transmissions by relay nodes to minimize the total transmission time of the upstream node and relay nodes. Firstly, we formulate this problem as an optimization problem and prove that it is NP-hard...
The scale of network and bandwidth of link have been limited by current routing technologies in hybrid wireless ad-hoc networks, so we present a new routing algorithm. In the routing algorithm, the routing information is treated as a resource, and it can be stored and searched in a distributed way with Chord. The routing of data packet prefers to forward by infrastructure. In comparison with OLSR,...
The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally preferred that the CDS protocol not only creates CDS of small size, incurs less communication and computational overheads, adapts to the nodal mobility, but also generates CDS as quickly as possible. Unfortunately, none of the...
Mobile ad-hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. The highly dynamic topology, limited bandwidth availability and energy constraints make the routing problem a challenging one. Recently a new family of algorithms emerged inspired by Swarm Intelligence, which provides a novel approach to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.