The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile computing increasingly often entails applications that embody opportunistic or delay-tolerant communication, and while much work has focused on refining and optimizing the technical underpinnings for providing delay-tolerant communication constructs, there is almost a complete lack of support for integrating opportunistic communication functionality at the application level. This paper introduces...
Named Data networking(NDN) has emerged as a new communication paradigm designed for efficient dissemination of data. However, mobility issues are not considered sufficiently. Consumer or producer mobility can incur request staleness issue, the loss of Interest and Data packets and communication delay. Through analysis, we consider how to forward the buffered data from old access point(AP) to new one...
CCN(Content-Centric Networking) enables users to retrieve content using the content's name. Researchers face critical challenges in terms of mobility. Since the routing information is part of the content name, when the provider moves, it is necessary to update all the routers' routing information. However, this requires significant costs. In this paper, we propose PNPCCN(Proactive Neighbor Pushing...
In this work we study the problem of delay-constrained data transmission in mobile opportunistic networks. In contrast to the single-copy single-path and multi-copy multi-path routing schemes that have been discussed in the literature, we aim to determine an optimal single-copy multi-path transmission strategy that satisfies delay requirement and at the same time minimizes communication cost. We first...
DTNs are prone to congestion due to limited resource on each node and unpredictable end-to-end delay. We aim to develop an effective congestion control mechanism in this paper. For this purpose, we first identify a list of major congestion factors by analyzing the causes of congestion. We then model the congestion control as a multiple attribute decision making problem (MADM), in which the weight...
The routing efficiency in Delay Tolerant Networks (DTN) with social characteristics degrades owing to intermittent connection and high latency. Additionally, congestion is another issue because of the limited resources of nodes. To solve these problems, an improved Socially Aware Congestion Control algorithm (SACC) is proposed. In this algorithm, the social features and the congestion level of the...
Vehicular Ad hoc Network (VANET) has been gaining the attention from the academic and industry communities due to the promising applications in road safety, traffic management and passenger comfort. However, the short vehicle-to-vehicle (V2V) communication range and the nature of vehicle mobility impose many challenges in packet routing and, accordingly, infrastructure-based applications, e.g., Internet...
Recent advances in Delay Tolerant Networks (DTNs) allow delivering packets among mobile devices via opportunistic communications during intermittent contacts. However, the lack of rich contact opportunities still causes poor delivery ratio and long delay of DTN routing, especially for large-scale networks. Deployment of additional stationary throwboxes can create a greater number of contact opportunities,...
We address the route optimization problem for a nested mobile IPv6 NEtwork MObility (NEMO) environment. We propose an adaptive scheme which can optimize the routing process of the data communication, and minimize the end-to-end delay. The adaptive scheme consists of two sub-schemes: mobility-transparency sub-scheme and time-saving sub-scheme. The mobility-transparency sub-scheme performs well for...
In this paper, an up-and-down routing protocol is proposed for mobile opportunistic social networks, which exhibit a nested core-periphery structure. In such a network, a few active nodes with large weighted degrees form the network core, while the network peripheries are composed of many inactive nodes with small weighted degrees. By nested, it means that the core-periphery structure is preserved,...
This paper presents the routing recovery problem of mobile sink wireless sensor networks (mWSNs), which is caused by the sink mobility. We propose an immune orthogonal learning particle swarm optimization algorithm (IOLPSOA) based routing recovery method to build and optimize the alternative path, in order to repair the broken path and maintain the available route from the source nodes to the mobile...
Proxy Mobile IPv6 (PMIPv6) and its multicast extensions have been designed by the IETF as a deployment friendly mobility scheme. Although easy to implement, the basic multicast proxy solution suffers from unwanted delay and jitter due to suboptimal traffic flows. In this paper, we recap recent IETF work on peering extensions for multicast proxies and make the following two contributions. First we...
Mobile sinks are proposed as a possible solution to the hotspot problem, which leads to the early death of the nodes close to the sink, due to the concentration of data traffic towards the sinks. However, the route updates employed by the source nodes to determine the position of the sinks introduce an overhead in terms of data reporting delays and energy consumptions. On the other hand, decreased...
In this paper, we present a novel bio-inspired trusted routing framework (B-iTRF) which composed of trust mechanism and routing strategy. For trust mechanism, B-iTRF monitors neighbors' behavior in real time and then assesses neighbors' trust value based on the priori knowledge. For routing strategy, each node finds routes to the Sink based on ant colony optimization. In the process of path finding,...
Opportunistic routing (OR) employs a list of candidates to improve reliability of wireless transmission. However, list-based OR features restrict the freedom of opportunism, since only the listed nodes can compete for packet forwarding. Additionally, the list is statically generated based on a single metric prior to data transmission, which is not appropriate for mobile ad-hoc networks. This paper...
Wireless Mesh Networks (WMNs) have been a major research focus in the recent years leading to a profusion of protocol proposals. While most existing implementations address routing aspects, none of the proposals addressing security aspects have gained acceptance in practice, due to their high overhead or strong assumptions. To cope with security issues in current WMN deployments, well-known non-secure...
According to the store-carry-forward method in Opportunistic Networks, the status on data transmitting has the relationship with the selection of relay node, and the distributed estimating results can make the assistance on the designing on effective data forwarding mechanism. A novel method to estimate delivery probability of data is proposed in our paper. First, we estimate the chance of meeting...
Video delivery to mobile users is one of the largest challenges that network operators face today. In this work we consider a heterogeneous cellular network with storage capable small-cell base stations, and study this problem for pre-stored video files that can be encoded with two different schemes, namely versions or layers, in various qualities. We introduce a framework for the joint derivation...
In the case of medical applications, the main requirement is to improve the control overhead and to achieve the reliable data transmission. A ZigBee based mobile patient monitoring network model is proposed, and its performance improvement is analysed based on reduced delay and enhanced throughput. We are focusing on the separate and comparative performance evaluation of AODV and DSR routing protocol...
MANET is gaining more popularity due to two main characteristics, dynamic topology and no requirement of centralized administration. But due to these two properties, MANET is highly prone to various security attacks. One of the most important categories of attack is the Denial of Service (DoS) and the most important attacks under this category are the Blackhole and Grayhole Attacks. Lot of research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.