The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Routing delivery is one of the key techniques in mobile ad hoc network, which involves many aspects such as topology update, routing exchange and so on. In this paper, we firstly apply routing tree to describe the complete topology of ad hoc network, and then store the information of routing tree into every node's routing table. Sparse routing tree, as a pruned tree, is used to exchange topology information,...
It is worth noting that securing group communication in Wireless Sensor Networks (WSNs) has recently been extensively investigated. Although many works have addressed this problem, they have considered the concept of grouping differently. In this paper, we consider a group as being a set of nodes sensing the same type of data and we alternatively propose an efficient secure group communication scheme...
Wireless links are often asymmetric due to heterogeneity in the transmission power of devices, non-uniform environmental noise, and other signal propagation phenomenon. Because of the variable and unpredictable capacity of wireless links, packet loses may happen frequently. Several routing protocols have been proposed for Mobile Adhoc networks, yet there is no one for all schemes that works well in...
In order to operate as efficiently as possible, appropriate on-demand routing protocols have to be incorporated in the ad hoc networks. Most common routing protocols, simply assume that all network links are bidirectional, and thus may need additional protocol actions to remove unidirectional links from route computations. The proposed algorithm makes use of selective unidirectional links so that...
Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting...
Modified optimized link state routing (M-OLSR) has been developed for adaptability in wireless mesh networking (WMNs) scenarios and exhibits a much better scalability of traffic load and mobility in sparse and dense network. The protocol uses some refresh timers for periodic updates of link information and for subsequent topology maintenance. In this paper, we investigate the impact of configuring...
With the spread of mobile nodes, studies on MANET (Mobile Ad-hoc Network) that can build networks solely with mobile nodes are drawing much attention. However, most of the ad-hoc routing protocols have not considered the traffic conditions in the network. Thus, we propose an ad-hoc routing protocol that takes account of traffic conditions, by way of extending OLSR (Optimized Link State Routing).
A particularly severe attack on routing protocols in mobile ad hoc networks (MANETs) is the collusion attack, in which a pair of colluding attackers prevent routes to a specific node (targeted node) from being established. This attack has devastating impact on Optimized Link State Routing (OLSR) protocol which is one of the standard routing protocols for MANETs. When there is a collusion attack in...
The complexity and dynamics of Border Gateway Protocol (BGP), the only inter-domain routing protocol available for the Internet, is driving the need for efficient, scalable, realistic and meaningful network simulations. To properly simulate the behavior of BGP as currently deployed, one requires both a realistic topology and a realistic model of BGP. Although a large number of topology generators...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.