The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In most of wireless sensor network (WSN) applications, energy-efficiency and low end-to-end transmission delay (E2ETD) are essential requirements. This paper presents a contention based routing enhanced MAC protocol, named as CR-MAC, for E2ETD reduction in a multi-hop WSN. CR-MAC reduces E2ETD by optimizing the time interval between the successively sent data packets of a node in a scheduled flow...
Power consumption is a key issue for wireless network design. Cooperative routing, an efficient scheme for saving transmission power in wireless networks, combines the advantage of the cooperative communication in the physical layer and the routing technology in the network layer. In this paper, we propose a distributed minimum power cooperative routing algorithm based on optimal power allocation,...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
The paper investigates a problem of allocating three types of flows (unicast, anycast, multicast) in elastic optical network (EON) with dedicated path protection (DPP). We model the problem using integer linear programming (ILP) and propose solution methods: two greedy algorithms and column generation (CG)-based approach. The main paper focus is put on proposal and comparison of several CG versions...
Failing to make use of multi-path advantages in data center networks (DCNs) has confined accessible resources and increased the possibility of congestion. In this paper, we have presented a new algorithm for traffic engineering (TE) in a modular mode. In the proposed algorithm, the less loaded paths for conduction of current are selected with regard to the present conditions as soon as a current is...
Delay Tolerant Network (DTN) is a network that allows nodes to move dynamically and doesn't always provide for end-to-end connection. The dynamically of nodes make the movement of the nodes becomes important. The movement model of nodes will record their behavior and this could be utilized to develop a new routing protocol in DTN. One of the DTN routing protocol that utilize it is CSI: T routing....
The Local Rarest Bundle First (LRBF) and Local Rarest Generation First (LRGF), content distribution strategies for delayed-tolerance networks (DTNs), reach high delivery rate in the vehicular ad-hoc networks (VANETs), where intermittent connectivity due to permanent network fragmentation and node mobility are main challenges. However, in order to achieve a high delivery rate, both strategies require...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
In the age of Big Data, advances in distributed technologies and cloud storage services provide highly efficient and cost-effective solutions to large scale data storage and management. Supporting self-emerging data using clouds is a challenging problem. While straight-forward centralized approaches provide a basic solution to the problem, unfortunately they are limited to a single point of trust...
Releasing private data to the future is a challenging problem. Making private data accessible at a future point in time requires mechanisms to keep data secure and undiscovered so that protected data is not available prior to the legitimate release time and the data appears automatically at the expected release time. In this paper, we develop new mechanisms to support self-emerging data storage that...
Jamming is one of the most famous and powerful attacks in wireless networks, and is advancing to be more stealthy and long-lasting with limited energy. Stealthy attackers transmit short jamming signals to become less detectable with less energy, and yet powerful enough to ruin the entire packet transmission procedures. For this study, we deal with three types of stealthy attacks: 'reactive jamming',...
New applications where anyone can broadcast video are becoming very popular on smartphones. With the advent of high definition video, ISP providers may take the opportunity to propose new high quality broadcast services to their clients. Because of its centralized control plane, Software Defined Networking (SDN) seems an ideal way to deploy such a service in a flexible and bandwidth-efficient way...
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
In this paper, we study the performance of two cross-layer optimized dynamic routing techniques for radio interference mitigation across multiple coexisting wireless body area networks (BANs), based on real-life measurements. At the network layer, the best route is selected according to channel state information from the physical layer, associated with low duty cycle TDMA at the MAC layer. The routing...
The transmission of GNSS constellation-wide messages through multiple satellites can be more flexible than the transmission of clock and ephemeris by each satellite. Messages may be divided into packets and routed through different satellites to optimize reception performance. This paper proposes some basic routing strategies based on packet offsetting. It then proposes a performance analysis methodology...
Geographic routing has received a lot of attention from researchers all over the world due to availability of low cost Global Positioning System (GPS) devices. It is considered as efficient routing for large scale networks and offers encouraging solutions for information dissemination in Vehicular ad hoc Networks (VANETs). The efficacy and scalability of all the geographic routing depends on the accuracy...
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to black hole and grey hole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case...
Friendly jamming is a physical layer security technique that utilizes extra available nodes to jam any eavesdroppers. This paper considers the use of additional available nodes as friendly jammers in order to improve the security performance of a route through a wireless area network. One of the unresolved technical challenges is the combining of security metrics with typical service quality metrics...
On — chip communication suffer from bit error especially at highly dense implemented system on chip. Reducing the rate of bit error in On-chip communication is carried out by error detection and correction codes. But it has its own limitation. So reconfigurable multiple code based system is suitable for heterogeneous system design. But selecting correct code for the correct subsystem or for current...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.