The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of mobile devices and the amount of mobile traffic are increasing rapidly. The users of mobile device use various services such as web surfing, email, video and audio streaming, etc. Analyzing mobile traffic is necessary to provide high quality mobile network services such as QoS management, traffic engineering, etc. In fact, several multi-flow applications consume a lot of mobile network...
The number of mobile devices and the amount of mobile traffic are increasing rapidly. The users of mobile device use various services such as web surfing, email, video and audio streaming, etc. Analyzing mobile traffic is necessary to provide high quality mobile network services such as QoS management, and traffic engineering. In fact, several multi-flow applications consume a lot of mobile network...
Peer-to-Peer file sharing, computing and communication services are widely used by internet community and thoroughly studied by academia. However, main utilization of such services is in the wired networks due to several significant issues in the wireless world like connectivity, bandwidth, battery, unwillingness of cellular operators, etc. In the recent years, offering femtocell access points to...
This paper proposes a cooperative session control method over core and overlay networks for a new generation network (NWGN). In the method, the call setup time is guaranteed via cooperating core and overlay networks while minimizing processing and traffic loads on the core network. During session control, each peer selects either the core or overlay network to establish the session based on the measured...
In a mobile ad hoc network, efficient routing, resource allocation, and energy management can be achieved through clustering of mobile nodes into local groups. In this paper we propose a clustering scheme that allows self-configuration and adaptation of the network, prolonging its lifetime by distributing energy consumption among clusters. A combined weighted metric approach is used to select cluster-head...
Peer-to-Peer overlay network provide various services for the feature of storing, discovering and locating resources efficiently. However, P2P platform raise more security-related challenges while providing more services. When P2P security mainly focusing on the security problems on Overlay, this paper first shows in-depth how can security threats intrude from underlay and penetrate into the whole...
The research and development of the wireless mesh networks (WMNs) now still popular. P2P was an old technique, but it is coming back for building an virtual overlay network on top of physical network. Open Chord as varian of Chord is a tool based on distributed hash table that can be used to build overlay. In swarm intelligence presented the particle swarm optimization (PSO) algorithm. One application...
We present a distributed verification algorithm to check the existence of multiple disjoint paths between all nodes in a wireless network. In contrast to the expensive algorithms computing full disjoint paths between nodes, our proposed algorithm distributes the computation across the network and makes statements regarding the interconnectedness of the entire network. Specifically, it allows each...
Data Management is the execution of a pool of activities on a set of data to conform to the end user data requisitions. MANET is an emerging discipline of computer networks in which a group of roaming hosts spontaneously establishes the network among themselves. The employment of data management in MANET can engender a number of useful applications. However, data management in MANET is a taxing job...
Peer-to-peer networks offer advantages over traditional client-server networking models, such as the lack of a need for connectivity to trusted intermediary hosts or servers and the use of less costly communication links. While they have become popular in the wired broadband environment, they have not yet been effectively adapted to the resource-constrained mobile network environment. They promise...
We propose a novel trust and probabilistic node selection mechanism for content distribution in mobile ad hoc networks, which aims to achieve trustworthy node selection and to preserve mobile node resources. The proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that our proposal achieves its goals.
In the past years there has been substantial amount of research focused on the transition mechanisms to allow the Internet to gradually evolve into a fully fledged IPv6 network. With the prevalence of smartphones, internet tablets and netbooks, a large portion of the end users has become truly mobile. Now, that all of the remaining IPv4 addresses have been allocated, the transition from IPv4 to IPv6...
Video streaming is considered as one of the most important and challenging applications for next generation cellular networks. Current infrastructures are not prepared to deal with the increasing amount of video traffic. The current Internet, and in particular the mobile Internet, was not designed with video requirements in mind and, as a consequence, its architecture is very inefficient for handling...
In previous work, we designed a distributed AAA framework for MANETs for which we defined a simple and robust AAA authentication and authorization protocol whose specification carries some implementation latitude. The protocol, therefore, offers several options. In this paper, we propose some of the possible implementation options for which we conducted an analytical study and computationally intensive...
In this paper we propose a decentralized privacy-preserving scheme for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the common friends of two nodes. Through our experimental results we verify the correctness of our scheme given the limitations of MANETs.
This work centers on data dissemination in delay-tolerant mobile networks, where data fall into a range of interest types and each node may have one or multiple interests. The goal is to deliver data messages from sources to nodes with corresponding interests. We consider selfish nodes with rational behavior, and propose a credit-based incentive scheme to promote nodal collaboration. The key challenge...
In mobile ad hoc networks, since all nodes are mobile and there is no fixed infrastructure, the design of routing protocols becomes one of the most challenging issues. Due to the utilization of location information, geographic ad hoc routing present superiority in scalability compared with traditional topology-based routing in mobile ad hoc networks. In this paper a location-based routing protocol...
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The multiplicatively weighted Voronoi diagram (MW-Voronoi diagram) is used to discover the coverage holes corresponding to different sensors with different sensing...
Dissemination latency is critical to the applications of {\em cognitive radio networks}, which have become an important component of current communication infrastructure. This paper investigates the distribution of dissemination latency in a cognitive radio network where licensed users (primary users) are static and cognitive radio users (secondary users) are moving under general mobility, which provides...
Restoring connectivity subjected to the failure of mobile node(s) is an important research challenge in mobile ad hoc networks. To achieve this objective, a Connectivity Restoration Strategy (CRS) is developed, aiming at restoring the connectivity of mobile network whenever it is partitioned from multiple simultaneous node failures. The proposed strategy is fully distributed and requires only local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.