The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Bittorrent P2P (Peer-to-Peer) network is now well-known and widely used. In Europe, it is mainly used with people connected to ADSL networks. However, with the emergence of various access networks with various capabilities (bandwidth, delay, etc.), we might wonder if Bittorrent is well suited to those heterogeneous networks. Moreover, some mobile 3G network operators even forbid the use of P2P...
Ensuring timely delivery of event reports is a critical requirement in mobile sensor networks, as the effectiveness of area surveillance depends largely on the sensor network response delay. However, due to the sensor mobility and the energy limitation, fast report transportation is constrained by the intermittent wireless link connections between sensor nodes. We derive lower and upper analytical...
Traffic analysis is considered the most powerful strategy of disclosing the hidden communication relations in an anonymous communication system. Statistical traffic analysis attacks are even more subtle in that the attackers are usually eavesdroppers who do not modify the network's behaviors. Moreover, the attackers even do not need to look into the traffic content, which may be encrypted, in order...
In wireless networks, interference that is generated by undesired transmitters dominantly limits network performance. The correlation of node locations (in mobile or static networks) makes the interference temporally correlated. In this paper, we quantify the temporal correlation of the interference in mobile Poisson networks. More specifically, we obtain closed-form expressions for the interference...
In this paper we study the connection availability of wireless networks from the perspective of end users with individual mobility, in contrast to existing studies mainly focusing on network-centric connectivity. Specifically, we evaluate the user connectivity by two metrics: neighbor connection time and neighbor isolation time. The former is the time for a node being connected with at least one neighbor;...
Cooperative communication can significantly enhance transmission reliability and bandwidth efficiency in wireless networks. Most existing works are focused on physical layer issues of cooperative communications. Many upper layer aspects of cooperative communications merit further research. In this paper, we investigate its impacts on network topology and capacity. Specifically, we present a novel...
In the open MANETs, nodes with different goals expect to benefit from others, but are unwilling to share their own resources. These selfish behaviors have posed increasing research challenges for cooperation. Negotiation as a key form of interaction for two or more parties enables nodes to announce their contradictory demands and seek to an agreement by concession. In the paper, the Service Negotiation...
Source-independent broadcasting protocols select a subset of nodes in a network as broadcasting nodes to cover the entire network. The selection of broadcasting nodes is performed prior to actual message transmission. These broadcasting nodes collectively form a connected dominating set or CDS. Aiming at finding a minimum CDS, a source-independent broadcasting protocol consists of two phases. In this...
In most mobile-assisted localization schemes, mobile anchors follow predefined or random trajectories to send beacon messages around. Although working well in regular and uniform networks, predefined or random trajectories lead to wasted efforts in irregular and non-uniform deployment. We propose a novel scheme of trajectory design by utilizing the topology information of the network. Based on rigidity...
Most existing reputation systems designed to cope with selfish MANET nodes rely on heuristics and are studied via simulation, with a focus on the consistency of obtained reputation metrics and their effect on network performance given specific corrective actions. We present a novel data-centric reputation system and an analytic evaluation framework where the notion of effectiveness is internal to...
Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and rescue, vehicular networks). In these networks it is important to be able to efficiently propagate information across domains in multicast mode (e.g., situation awareness dissemination, commands, streams). Several multicast protocols...
Data collection with mobile elements in wireless sensor networks brings in new opportunities to reduce and balance the energy consumption of sensor nodes, however, it may result in high data collection latency. The optimal scheduling of mobile element's limited mobility is of great importance to reduce this latency, and a lot of research efforts have been made on it. Focusing on the on-demand data...
The 2-hop relay algorithm and its variants have been attractive for ad hoc mobile networks, because they are simple yet efficient, and more importantly, they enable the capacity and delay to be studied analytically. This paper considers the 2-hop relay with $f$-cast (2HR-$f$) under i.i.d. mobility model, a general 2-hop relay algorithm that allows one packet to be delivered to at most distinct relay...
A Flow Driven MAC Protocol(FD-MAC) is a slot based MAC protocol which is designed for long distance wireless multihop transmission. With the flow-driven resource reservation mechanism, FD-MAC protocol is especially suitable to be used for wireless ad hoc network with dynamic traffic pattern. We argue that the Flow Classification Threshold(FCTs) of the protocol are the key parameters to the performance...
Seamless IP-diversity based NEtwork MObility (SINEMO) was proposed to address a number of drawbacks of the Network Mobility (NEMO) protocol for mobility management of a number of hosts moving together in a Local Area Network. Increasing number of mobile hosts results in higher level of signalling cost on the mobility agents in a mobility protocol. Previous works on cost analysis of mobility protocols...
The home agent can be a single point of failure in mobile IPv6 networks. Fault tolerance can be used to provide reliable home agent service. This paper proposes a home agent fault-tolerant method for mobile IPv6 networks. All home agents are formed into the structure of ring detection & backup chain by sorting them using a deterministic sorting algorithm, in which each home agent backups its bindings...
Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically employment of mobility nature of nodes and the storage space of all nodes. In order to overcome mobility randomness and subsequently uncertainty of future network state, multi-copy-based routing approaches are widely considered. However, scalability is still an issue, even extra...
Cooperative communication has been proposed to increase the capacity of wireless networks. By exploiting a relay node, it achieves spatial diversity to cope with fading channel without requiring wireless nodes to be equipped with multiple antennas. However, the selection of relay nodes has a significant impact on the final capacity. In this paper, we study the problem of relay assignment in cooperative...
In mobile ad hoc networks, one challenge in certificate revocation design is to revoke malicious nodes' certificates accurately. In this paper, we build up on our previously proposed scheme [1], which enables the recovery of falsely accused nodes' certificates. This scheme is a cluster-based certificate revocation scheme that divides the network into clusters of one cluster head and cluster members...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.