The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient deployment strategies are proposed for a mobile sensor network, where the coverage priority of different points in the field is specified by a prescribed weight function. According to these strategies, each sensor detects coverage holes within its Voronoi polygon, and then moves in a proper direction to reduce them. Since the coverage priority of different points in the field is not the...
Heterogeneous networks utilizing relay nodes with low transmission power becomes an important deployment scenario in 4G cellular standards. It can offer high data rate delivery as well as ubiquitous end-user experience. For such a network, an efficient mobile association and load balancing scheme is critical to achieve high system capacity and satisfactory user experience. In this paper, the main...
With the ever-growing demands of wireless communications, traffic load sharing is essentially important to provide consistent high quality of service (QoS). It is known that the QoS of mobile users is affected by the limited bandwidth in both wireless link and wired backhaul link beyond a base station (BS). Femtocell is a promising technology to bear part of the traffic load from the BS. Nonetheless,...
In mobile multimedia streaming services, important requirements consist of the support of service continuity, the guarantee of acceptable Quality of Service (QoS) and insurance of steady Quality of Experience (QoE). How to get a uniform data exchange rate during the entire (or partial) course of a streaming service while a user is on the move is an important challenge. Generally speaking, the streaming...
In this paper, a new sensor localization approach is presented, which is based on the use of a mobile beacon and a map registration algorithm for wireless sensor network applications. The localization system consists of a mobile beacon and beacon receiving modules on each sensor node. Internode distances are obtained during the stage of sensor node deployment using the mobile beacon. The map registration...
In this paper, we propose a secure data-forwarding scheme, called SATS, for delay-tolerant wireless networks. SATS uses credits (or micropayment) to stimulate the nodes' cooperation in relaying other nodes' messages and to enforce fairness. SATS also makes use of a trust system to assign a trust value for each node. A node's trust value is high when the node actively forwards others' messages. The...
In a wireless sensor network with mobile sinks, the maintenance of efficient data delivery structure often brings a large amount of control overhead, which may offset the benefit of introducing mobile sinks. In this paper, we propose a multi-stage data routing protocol (called MLRP) to address this problem. To reduce the protocol overhead, MLRP integrates layered Voronoi scoping and dynamic anchor...
Securing the transfer of data in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes a method for providing message security in MANETs when nodes cooperate in routing. Our approach combines a trust-based multipath routing scheme and a real-time recurrent neural network-based (RRNN) cipher (yielding our so-called TR-RRNN scheme) to deal with the issues underlying message...
Mobile Ad Hoc Networks (MANETs) offer a dynamic environment in which data exchange can occur without the need of a centralized server or human authority, providing that nodes cooperate among each other for routing. In such an environment, the protection of data en route to its destination is still a challenging issue in the presence of malevolent nodes. This paper proposes a message security approach...
The multi-hop cellular network (MCN) is an evolved paradigm for mobile communications, which integrates the ad hoc characteristics into the conventional cellular systems. Similar to ad hoc networks, the performance of MCNs relies on the hypothesis that each node accepts to forward traffic for the benefit of others, which may not hold with the possible presence of selfish users. In order to stimulate...
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black...
Deploying the static wireless devices (throw-boxes) at certain locations can help message dissemination among mobile nodes in delay tolerant networks. The mobile nodes traveling between throw-boxes form network links that carry the temporally stored messages at one box to another. However, the aggregated mobility between pairs of boxes reveals a time-dependent nature on its link delay (travel time)...
Disruption-tolerant networks (DTNs) have gained great attractions recently by addressing intermittent network connectivity suffered due to short radio transmission range, high node mobility, sporadic node densities, etc. Data communication across DTN is achieved over store-carry-forward (SCF) paradigm by exploiting temporary wireless links and connections opportunistically arising from mobility nature...
This paper investigates the {\em access time} of mobile nodes to infrastructure networks in Mobile Hybrid Networks (MHNs), e.g., sensor-actuator networks, where mobile nodes move around the coexisting infrastructure networks. In such networks, mobile nodes may relay data packets in a hop-by-hop fashion, and eventually deliver packets to the wired networks. Our objective is to study the lower bound...
In the environment of Mobile Ad-hoc Networks (MANETs), devices can collaborate under the service-oriented architecture (SOA). However, as MANETs are infrastructure-less, devices may move randomly and join and leave the network at any time which leads to a permanently changing topology of the network. What adds to the unpredictability of the network is the limited resource of the nodes, including battery...
This paper investigates the performance limits of delay tolerant networks (DTNs) with intermittently connected nodes deployed for wildlife monitoring, wherein information is either transmitted or carried to static accesspoints by free-ranging animals whose movement is assumed to be random. Specifically, in such mobility-aided applications where routing is performed in a store-carry-and-drop manner,...
To facilitate reliable communications, efficacious signaling is of crucial importance for information dissemination control, especially in dynamic and infrastructureless networking paradigms such as mobile ad hoc networks (MANETs). Since data transportation much resembles the spread of epidemics, two signal distribution schemes, self healing and vaccine spreading, are proposed to analyze the information...
Mobile Ad Hoc Networks (MANETs) allow mobile hosts to form a communication network without a prefixed infrastructure. Although it provides high flexibility, it also brings more challenges for MANETs to fight against malicious attacks. However, the property of mobility and redundancy also inspires new ideas to design defence strategy. In this paper, we propose a strategy to mitigate DDoS attacks in...
Mobile IPv6 wireless networking is an integration of heterogeneous wireless networks that serves and supports different mobile nodes with seamless communications, in order to enhance the performance. However, the anonymity and location privacy are critical problems in seamless roaming environments. In this paper, we propose an anonymous home binding update scheme (AHBU) for mobile IPv6 networks to...
Rapid advancements of wireless technologies allow users to access real-time data, and stay connected with friends and business while they are on the move. However, most emerging mobile applications assume users have cellular data services, and hence not everyone can enjoy new mobile applications. In addition, some emerging mobile applications e.g. mobile recommender system are data-centric but existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.