The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years the use of wireless ad hoc networks has seen an increase of applications. A big part of the research has focused on Mobile Ad Hoc Networks (MAnETs), due to its implementations in vehicular networks, battlefield communications, among others. These peer-to-peer networks usually test novel communications protocols, but leave out the network security part. A wide range of attacks can happen...
This work studies centrality metrics as forwarding load predictors, for both unicast and multicast traffic, within dynamic ad hoc network topologies. We present results from a series of emulation experiments based around an emergency response mobile network scenario. From collected temporal topological and traffic data, we calculate a rank correlation measure between predictive centrality metrics...
Efficient network communications are essential to enable network-centric warfare. However, tactical edge networks present an extremely challenging and heterogeneous networking environment due to heterogeneous architectures, dynamic topologies, unwanted adversarial behavior, interference, and other wireless channel conditions. In order to support end-user applications and guarantee system performance...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
The rapid increase of the number of mobile devices has been directing research and industry attention to Mobile Ad hoc wireless Networks (MANETs), mainly due to their adaptability and flexibility. In this context, gossip protocols have emerged as a powerful mechanism to develop highly scalable and reliable broadcast communication, but reliability, performance and efficiency are many times conflicting...
Current Internet traffic is carried mainly by the Transmission Control Protocol (TCP), and the performance of the Internet depends strongly on how well TCP works. Detecting and mitigating the congestion is one of the main tasks of this protocol, in fact, different TCP versions are defined by their congestion control algorithm. Also, Active Queue Management (AQM) algorithms share the same goal of congestion...
A promising approach for dealing with the increasing demand of data traffic is the use of device-to-device (D2D) technologies, in particular when the destination can be reached directly, or though few retransmissions by peer devices. Thus, the cellular network can offload local traffic that is transmitted by an ad hoc network, e.g., a mobile ad hoc network (MANET), or a vehicular ad hoc network (VANET)...
The mobile ad hoc network and their concept is one of the most popular technologies now in these days. The wide range of applications are developed using this concept where the rapid development of network is required such disaster management and others. But according to the literature there are some issues are remain to fix such as security and performance. In this paper the security aspect of mobile...
As MANET is an infrastructure less, problems related to reduce Flooding by Propagating Neighborhood Information Algorithm (PNIA) is instant path transformation with reverence to transform in topology and blocking in the network. In this paper we have explained on PNIA with Grid Fisheye State Routing Protocol for MANET and implemented with various metrics in NS3 Simulator. Also the proposed work is...
In the existing system, the node may sometimes behave selfishly. To act selfishly means that nod sometimes is unwilling to forward the packets to the further node as prescribed in route from source to destination in order to save their resources and this may seriously affect the performance of the network. In the proposed system, the network is distributed into clusters and every cluster has their...
For detection of possible problems in designing of MANET networks in space conditions new modern development environments like NS3 should be used. During development of complex space missions involving usage of robots, there exists a big risk of failure of such missions, cause previously unexpected problems arise. Operability testing of such systems often costly requires big amounts of time. This...
Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to...
In the present time, the Research and industry are showing more interest in Vehicular Networks. Vehicular Network is providing the Road Safety, Security, traffic monitoring, comfort driving types of applications for person safety. It is the essential point that the servers which are using for safety not give any drawback and problem. For proper communication, it is essential that the communication...
Tactical Edge Networks are one of the most challenging communication environments, where node mobility, constrained devices, and the wide use of wireless ad hoc channels for communications cause frequent link disruption and network partitioning. Additionally, applications running in Tactical Edge Networks often follow one-to-many and many-to-many communication models that require the nodes' cooperation...
Tactical Edge Networks provide one of the most challenging communication environments. In order to cope with node mobility, constrained resources, and link unreliability, communication solutions designed for Tactical Edge Networks typically present highly configurable interfaces to be adaptable for various networking conditions. However, the extreme dynamicity and heterogeneity of tactical scenarios...
In ongoing efforts, our team has developed DISCO (Distributed Cross-layer Architecture for Network Awareness and Opportunistic Transport), a cross-layer framework to enable network awareness and automated adaptation of transport, network and application parameters in a MANET. DISCO automates discovery of new applications and services, and applies rule-based logic and machine learning to enable the...
We introduce POSTAL, a new range-free positioning protocol for mobile ad hoc networks (MANETs) that eliminates the need of constantly flooding the whole network with positioning information. The proposed protocol is based on regions of interest which are connected components of the MANET spanning a beacon (or reference) node and one or more nodes interested in estimating their position. These regions...
Due to the lack of centralized coordination and time-varying network topologies, designing an efficient query processing scheme is admittedly challenging in mobile ad hoc networks (MANETs). Each node often broadcasts a query, retrieves its queried data item, and periodically checks its freshness but a non-negligible communication overhead may incur. In tight of this, we propose a set of query processing...
Mobile Ad hoc Network often called as MANET, which does not have any particular infrastructure, in which each mobile devices are connected wirelessly and can move freely in any direction without having any restrictions in the network. Malicious nodes present in this network can easily launch highly vulnerable attacks like collaborative Black hole attack and Gray hole attack due to its dynamically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.