The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It has been found that almost all routing protocols can induce network congestion due to control message complexity. To overcome this overhead various optimization processes are used. One such process is gossiping, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. In this paper, we show how gossiping can be used to improve the performance of...
Vehicular Ad Hoc Networks (VANET) have become one of the most important research areas for the successful and deployment of intelligent transportation system and the unmanned vehicle technologies. In VANET, Travel Prediction-based Data Forwarding (TPD) was proposed as one of novel data forwarding schemes based on road traffic statistics. However, the TPD could not guarantee good performance in the...
The enhanced method of calculating the probability of message compromising in a communication network when using overlapping routes with series-parallel and combined structure are considered. A number of numerical examples have been used to analyze the influence on message compromising of security parameters belonging to certain elements (links) and fragments of the network. It is shown that the proposed...
Our objective in this paper is to improve the communications performance for IoT applications by proposing a new solution called IC-IoT (Improving Communication for IoT). The principle used is the exploitation of three existing communication protocol by incorporating some mechanisms to consider the different parameters which can cause the data loses. A probabilistic approach is used to know the impact...
Vehicular Ad-hoc Networks may be used for multitude of services including those related to human safety, traffic management and providing comfort to the users as applicable to Intelligent Transportation Systems, Smart Communication Systems, Internet-of-Things etc. In most scenarios, vehicles are owned by different entities and therefore it may not be in the best of interest of VANETs nodes to forward...
A flow-aware approach of evaluating the probability of compromise in combined structure network is presented. Experimental and numerical examples have been used to analyze the influence on flow compromising of security parameters of network links and fragments. It is shown that the proposed approach gives more precise results of calculation the probability of flow compromise when using overlapping...
The Delay Tolerant Networks (DTNs), are emerging as one of the most efficient network that allow nodes in intermittently connected networks to communicate with each other. They are designed to overcome high latency and lack in connectivity due to poor infrastructure and short range radios. However, the DTNs relay nodes have limited resources (i.e., low-power RF module, low computation capacity, limited...
The Prophet routing algorithm is a multi-copy algorithm which is based on historical information and transitive probability, which selects the relay node with a high probability to encounter the destination node. However, the selection of a relay node does not consider the current congestion level of node. Even if the current relay node has a high delivery probability to the destination node, it may...
Opportunistic networks offer a delay-tolerant end-to-end message delivery in networks with intermittently connected nodes and communication islands. Routing based on knowledge in those networks is classified into two main types which are utility-based and flooding-based approaches. In general, flooding-based approaches result in very high resource consumption and buffer congestion. In this paper,...
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs backtracing strategy to locate source nodes by analyzing transmission paths. With the popularity of the Internet of Things in recent years, source privacy protection has attracted a lot of attentions. In order to mitigate this threat, many proposals show their merits. However, they fail to get the tradeoff...
In providing new telecommunication services, the requisition for quality of network is more and more popular and sophisticated with high bandwidth, small value of delay time or packet loss etc. To assure the quality of network, the localized routing schemes have recently been researched as a promising alternative to the currently deployed global QoS routing schemes. Different from the traditional...
The emerging Internet of Things paradigm has triggered an explosion in ad-hoc applications that require connectivity among the nodes of wireless networks. However, the channel randomness and the random deployment of such networks could cause missed detections by isolated (i.e., unable to disseminate their messages) or inactive (i.e., without enough energy to transmit) nodes. Moreover, as the number...
In this paper, we deal with the resource search problem in a probabilistic setting. In a resource search problem, there are spatially located static resources and a mobile agent. The agent looks to obtain one of the resources while minimizing the cost. This cost may consist of different types of costs the agent has to pay, from travel time to the cost of obtaining a certain resource. We assume that...
In mission critical networks, nodes need to communicate with minimum delay and loss. This calls for routing protocols that can quickly and efficiently route the application traffic to their destinations. This paper proposes a distance-based routing protocol, named as Smallworld, which finds efficient routes to target nodes often through a very short chain of intermediate nodes, without using any routing...
Road traffic information is considered vital for drivers and passengers in a VANET. Recently many approaches have been proposed for sharing the road information among the vehicles on the roads. Applications that use hovering information for road safety consider TTL and a radial distance from a center point to disseminate the information in a geographically limited area. These approaches generally...
In this work, routing strategies of an arriving request to a server in a prioritized limited multi-server processor-sharing (PS) system are studied in order to optimize a given performance criterion. In this system, an arriving request enters the dispatcher, which routes this request to each server according to a predetermined strategy. In the prioritized limited PS server, a high-priority request...
Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet delivery rate, which challenges routing protocols. To address this issue, we propose a Geographic Opportunistic Routing protocol based on Link state and Forwarding quality inside nodes (LF-GOR). We first put forward a hybrid approach of filtering and prioritizing to determine a candidate nodes set of the sending...
A novel efficient forwarding protocol (NEFP) for 3-D underwater wireless sensor networks (UWSNs) is proposed in this paper. Three strategies are adopted in NEFP. Firstly, the forwarding zone is presented to avoid the unnecessary forwarding. Secondly, in order to balance the energy consumption and reduce the collisions between the neighboring nodes, the time interval of the nodes for holding the received...
In this paper, we address the problem of finding a resource in a probabilistic setting. In this problem, there are spatially located static resources and a mobile agent. The agent looks to obtain one of the resources while minimizing the cost. This cost may consist of several sub-costs the agent has to pay, from travel time to monetary cost of using a resource. We assume that the agent has no knowledge...
In CONs (Content-Oriented Networks), a router can have multiple entries for the same content name when multiple repositories produce the same content. This is the inherent feature of CONs that users do not care about the places of contents servers. When an Interest packet finds multiple entries at a router on a path, a routing strategy of the router plays a very important role for effective content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.