Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Solutions for Vehicular Ad-Hoc Network (VANET) are challenging due to the intrinsic nature of the network which involves, by definition, node mobility, scarce or null fixed nodes and, at the current state of art, lack of solutions for the real-time tracking of positions. Moreover VANETs are meant to provide primarily a solution for the improvement of road safety, by the proper forwarding of messages:...
A distributed trust evaluation model is presented for MANETs by which uncertainties of trust are transformed into probability vectors giving the probability distribution of trust levels. The system evolves over time as a finite-state Markov process with variant transition matrixes. We attempt to predict the trustworthiness values of entities that are determined by their inherent error patterns. The...
Jamming attack, in the form of either continuous or periodic, can easily be deployed in wireless network due to openness of the underlying medium. Traditional strategies do not work against jammer, therefore either nodes passively doze out till the jamming phase is over or they actively move out of the jammed region. For small devices having lesser or no mobility, channel hop is an alternate where...
The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This...
Key management is a most important issue in MANET. Signcryption, as a new cryptographic technique, which combines the functions of digital signature and encryption algorithm for authenticity and confidentiality in an efficient way, is very useful to secure key management in MANET. For design secure and efficient ID-based and threshold key management protocols in MANET, in this paper, we propose a...
Self-Organized radio wireless networks are composed of dynamically distributed mobile nodes without any wired backbone or centralized entities. This network is known MANET. In this paper, we proposed traffic load Estimation method based on an exponential decrease function and then present in Traffic-Sensitive S-TDMA Scheduling algorithm. Furthermore, we look into two parameters window size and gamma...
Geographic forwarding has been widely studied as a routing strategy for mobile ad hoc networks, mainly due to the low complexity, scalability of the routing algorithm. However, in a network with routing holes, existing geographic routing schemes such as GPSR, GOAFR could cause the throughput capacity to drop significantly due to concentration of traffic on the face of the holes. The slope-based stateless...
Ad hoc mobile networks are composed of mobile nodes communicating through wireless medium, without any fixed backbone infrastructure. In these networks, Congestion occurs in any intermediate nodes when data packets travel from source to destination and they incur high packet loss and long delay, which cause the performance degradations of a network. This paper presents the early detection congestion...
In this paper, we propose a tree-based adaptive broadcasting (TAB) algorithm for data dissemination to improve data access efficiency in vehicle communications. The proposed TAB algorithm first constructs a broadcast tree to determine the broadcast frequency of each data, and splits the broadcast tree into some broadcast wood to generate the broadcast program. In addition, this paper develops an analytical...
Because of shortage of raw materials, the energy-saving issues become popular in Vehicular Ad-hoc Networks (VANETs). A VANET is formed by traveling vehicles with communicating capability and thus it brings various applications. Navigation system is one of important applications in VANETs. The traditional navigation system usually plans a shortest path for users according to geographic maps but the...
Vehicular ad hoc networks (VANETs) provide the means to add convenience, services, and safety to the road. This paper introduces a means to adapt the concepts of Public Key Infrastructure for a VANET environment under the worst case scenario of a pseudonym shift every second. Regions are used to scale down the size of certificate revocation lists (CRLs), administrative overhead, and the search space...
The increased traffic density in urban areas should be handled by a robust collision avoidance and traffic control system that is based on decentralized inter-vehicle communication. In such a special ad hoc network traditional routing protocols cannot cope with the high mobility and low link reliability, while flooding based approaches consume too many resources. Our proposed solution, Carefully Localized...
We focus on the problem of efficient dissemination of available gateways information throughout a Vehicular Ad-hoc Network (VANET). Contrary to previous works, we also consider how the gateway discovery protocol affects user data flows that are routed to the infrastructure network. The cases of both delay-tolerant and delay-constrained user traffic are studied. We propose two schemes targeted at reliable,...
The effort dedicated to the ultimate goal of designing an architectural framework for tactical mobile ad hoc networks (MANETs) has long been hindered by the excessive control overhead of routing protocols to maintain a full view of the network topology. This paper explores the viability of adopting network coding as a means of improving reliable data delivery while lowering control overhead in large...
Mobile ad hoc networking technologies have increasingly been applied to civilian applications, in areas in which there is little or no communication infrastructure or the existing infrastructure is expensive or inconvenient to use, wireless mobile users will still be able to communicate through the formation of a MANET. Since the advent of wireless communication, the need for mobile ad hoc networks...
In VANETs(Vehicular Ad Hoc Networks), moving from one RSU's coverage region to another will bring reauthentication in the new security domain, which can be named security handover problem. In this paper, based on mobility predictability, we propose a novel anonymous communication scheme called SCPT to address the security handover problem. It uses hash chain for vehicle's anonymous authentication...
Deterministic approach to broadcasting in Mobile Ad Hoc Networks (MANETs) is effective in reducing redundant broadcasting. In this approach, a transmitting node selects a subset of its immediate or 1-hop neighbors to rebroadcast the message such that all its 2-hop neighbors will receive the message, or being covered. In order to reduce redundant broadcasting, the set of 1-hop neighbors to be covered...
We consider the problem of designing cooperative driver assistance and collision warning systems in vehicular networks. In this problem each car has a small size state information message that should be received by its neighborhood within a short lifetime of L timeslots. Because of the safety nature of the application, communication reliability (success probability) and delay are of critical importance...
The possibility of connecting vehicles to fixed IP networks through roadside units (RSUs) or even access gateways is seen as a very interesting alternative to fully infrastructure-less VANETs. However, getting access to those fixed networks must be controlled and only authorized users should be able to use those RSUs or gateways. However, that authentication process incurs in a not-negligible delay...
The following topics are dealt with :optical communication networks; intelligent transportation system; optical communication device; wireless vehicular networks; optical transmission; cloud computing; quantum cryptography; satellite communication; mobile ad-hoc and sensor mesh networks; mobile communication; quality of service; WLAN and mobile WiMAX; RFID; OFDM; ultrawideband communication; network...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.