The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growing number of smartphone users, peer-to-peer ad hoc data forwarding is expected to occur more often. The forwarding performance improves when knowledge regarding the expected topology and the social context information of the networks. In this paper, we introduce a new metric for data forwarding based on social context information, in which node's social context information is used to...
VANET (Vehicular Ad-hoc Network) is an emerging technology that has taken great attention in the recent years. Due to its changing topology and frequent disconnection naturally, it must have a flexible and optimum routing protocol to accommodate its behaviour. Hybrid Wireless Mesh Protocol (HWMP) is a routing protocol that has both reactive and proactive components that can be applied to the VANET...
In this paper we propose a security system to protect external communications for self-driving and semi self-driving cars. The proposed system can detect malicious vehicles in an urban mobility scenario. The anomaly detection system is based on fuzzy petri nets (FPN) to detect packet dropping attacks in vehicular ad hoc networks. The experimental results show the proposed FPN-IDS can successfully...
This paper presents a method of calculating the minimal required transmission period for control messages and power margin for MANET with constrained resources, namely for communication and control systems on-planet robotic systems. For a system with ten robotic devices, with velocities of 10 cm/s, the sufficient power margin for worst case scenario will be equal to dP = 1 dB, which gives a transmission...
Heterogeneous Wireless Mesh Networks (HetMesh) is a promising high throughput technology for multi-hop data forwarding by mobile clients and backbone routers in a dynamic environment. HetMesh supports Wifi-Direct facility and other separate access technologies in its mobile clients, which makes the selection of a suitable next hop forwarder for data transmission challenging. This paper proposes a...
Studying ad hoc routing protocols goes through three fundamental steps, namely: simulation, performance analysis and finally results interpretation. Undoubtedly, NS2 is widely used in ad hoc networks simulation. However, the analysis of generated simulation trace-files often requires the use of different software tools and programing languages. This makes the post simulation phase difficult and inefficient...
The importance of wireless communication systems for reliable mobile communications has increased significantly over the past decade. The dynamic topology offered by Mobile Ad-Hoc Networks provides flexibility and reduced time to operation. In this paper we analyze the communication of nodes based on their states and hop-count. The analysis is based on the Markov random walk model and we analyze the...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
The new standard for narrowband PLC-based communications IEEE P1901.2 defines two mechanisms which do not exist in the majority of its wireless counterparts — dynamic frequency mapping (tone mapping), and existence of several modulations. Until now, the benefit of these mechanisms was not taken explicitly into account by the routing protocols. In this paper, we propose a novel metric for RPL — the...
Intermittently Connected Mobile Networks (ICMNs) are sparse wireless networks where most of the time an end-to-end path does not exist from source to destination. These networks are characterized by opportunistic connectivity, long and variable delay, asymmetric data rate and high error rate. Hence, they can be appropriately modeled as Delay-Tolerant Networks (DTNs). In this paper, the performance...
Aim of this paper is the design of specific routing metrics correction algorithm for scalable and highly loaded by workflows service network. The most challenging idea is to use continuous dynamic correction of workflows' routing metrics by pervasive structural routing.
Regionally-correlated failures or attacks pose a great challenge to the normal network communication for physical backbone networks. When the same intensity of challenges occur at different physical locations, the damage to the network connectivity varies greatly. In this paper, we propose a critical region identification model and demonstrate its effectiveness in finding critical regions for fiber-level...
With the increasing number of wireless mobile devices, the possibility of mobile communications without network infrastructure is becoming a reality. The decentralized mobile social network (MSN) is a paradigm where nodes can move freely and organize themselves arbitrarily. Therefore, the key challenge is to find routes that can provide satisfactory delivery performance and low average end-to-end...
Routing algorithm improvement in the ways of unequal cost for the EIGRP protocol with the introduction of such a measure as the risk of information security into the metric is proposed in this paper. It is proposed to evaluate the risk of information security using the methodology of the NIST CVSS standard and the theory of information systems survivability.
In this paper, we propose a novel routing protocol by overcoming the security issues of node disjoint multipath routing protocols to ensure the reliability by discovering multiple secure paths. The proposed protocol considers link compromise probabilities to generate multiple routes with low compromise probabilities. Contrary to contemporary distance metric multipath routing protocols, our proposed...
Optimized Link State Routing (OLSR) has many advantages over other routing protocols for use within MANETs. However, it also has its limitations and cannot easily adapt in real time to the highly dynamic nature of heterogeneous military MANETs. This paper discusses the augmentation of OLSR with a reactive routing algorithm referred to as Priority Aware Dynamic Routing (PADR). PADR along with OLSR...
Recently, IETF standardised a powerful and flexible Routing Protocol for Low Power and Lossy Networks (RPL). It selects the ideal routes from a source to a destination node based on certain metrics injected into the Objective Function (OF). In this study, the performance of RPL has been investigated in terms of two OFs (i.e. Minimum Rank with Hysteresis Objective Function (MRHOF) and Objective Function...
We tackle the problem of locality-aware message spreading in a network composed of smart mobile devices, without resorting to any backbone communication infrastructure. The motivations for our work are two-fold. First, recent smart mobile devices are capable of capturing and storing location information (at a significant granularity) by using, e.g., GPS service and storage capacity available in the...
In MANETs, link failures are caused frequently due to node's mobility and use of unreliable wireless channels for data transmission. Multipath routing strategy can cope with the problem of the traffic overloads while balancing the network resource consumption. This article proposes an improved approach named DNDR (Dual Node-Disjoint Paths Routing) to enhance the network reliability and robustness...
Existing measurement frameworks typically assume that the communication protocols and mechanisms running on the devices do not change during network operation. However, recent research efforts show that by enabling devices to switch between protocols and mechanisms at runtime the overall network performance can be improved. In this paper, a novel measurement framework that enables the continuous and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.