952 Hits in 3.2 sec

Declarative policy-based adaptive MANET routing

Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo, Yun Mao
2009 2009 17th IEEE International Conference on Network Protocols  
This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols.  ...  Third, we conduct extensive evaluation results of declarative policy-based adaptation of MANET routing on the ORBIT wireless testbed and the cluster-based emulation environment.  ...  EVALUATION OF POLICY-BASED MANET ROUTING In this section, we perform an experimental evaluation to validate the benefits of policy-based adaptation via declarative networking.  ... 
doi:10.1109/icnp.2009.5339669 dblp:conf/icnp/LiuCLBLM09 fatcat:wugcsam6kvaazcpyfm2yzbihfm

Declarative Policy-Based Adaptive Mobile Ad Hoc Networking

Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo, Yun Mao
2012 IEEE/ACM Transactions on Networking  
This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols.  ...  We experimentally validate a variety of policy-based adaptive MANETs in various dynamic settings using a combination of ns-3 simulations and deployment on the ORBIT testbed.  ...  Policy-based routing adaptation is dictated by adaptive routing policies via a series of adaptation policy rules [16] specified in the same declarative language as routing protocols.  ... 
doi:10.1109/tnet.2011.2165851 fatcat:5xvsblerrrdzdjmhlu5qje2hn4

A declarative perspective on adaptive manet routing

Changbin Liu, Yun Mao, Mihai Oprea, Prithwish Basu, Boon Thau Loo
2008 Proceedings of the ACM workshop on Programmable routers for extensible services of tomorrow - PRESTO '08  
Second, we show that the declarative framework enables policy-driven adaptation, in which a generic set of declarative rule-based policies are used to make runtime decisions on the choice of MANET protocols  ...  In this paper, we present a declarative perspective on adaptable extensible MANET protocols.  ...  CONCLUSION In this paper, we present a declarative perspective on adaptive MANET routing.  ... 
doi:10.1145/1397718.1397733 dblp:conf/sigcomm/LiuMOBL08 fatcat:e5r53x72dfczbkk4rhfk3hnsgq

NETSAQ: Network State Adaptive QoS Provisioning for MANETs [chapter]

Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Ali Hammad Akbar, Ki-Hyung Kim
2006 Lecture Notes in Computer Science  
In this paper, we propose a Network State Adaptive QoS provision algorithm (NETSAQ) that works with many underlying routing protocol.  ...  Our simulation results show that NETSAQ adapts well in MANET environments where multiple services are contending for limited resources.  ...  In this work we have proposed an architecture for cluster based MANETs. Each cluster head is equipped with a Domain Policy Manager (DPM).  ... 
doi:10.1007/11876601_18 fatcat:iaicer62zzcrxasbazjthc4cu4

Limitations of equation-based congestion control in mobile ad hoc networks

K. Chen, K. Nahrstedt
2004 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.  
To this end, we propose an alternative scheme (called EXACT-AA) based on router's explicit rate signaling and application's adaptation policies.  ...  Index Terms-Equation-based congestion control, TFRC, fairness, smoothness, mobile ad hoc networks (MANET).  ...  The utility-based adaptation approach allocates bandwidth for the flows based on their declared utility functions, and equalizes each flow's utility to resolve resource contentions.  ... 
doi:10.1109/icdcsw.2004.1284118 dblp:conf/icdcsw/ChenN04 fatcat:zdzmurrq7fg6tfazcpezl7v3da

A Survey on Contemporary MANET Security: Approaches for Securing the MANET

Rajan Patel, Pariza Kamboj
2017 International Journal of Engineering and Technology  
This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data  ...  There is a requirement to secure the MANET from threats and vulnerability. Many security mechanisms are established to secure and protect the MANET.  ...  SECURE MANET ROUTING PROTOCOLS Position based, proactive, reactive, topology based and hybrid are the strategies of MANET routing protocol.  ... 
doi:10.21817/ijet/2017/v9i1/170901413 fatcat:kepeg6nwofcjjce6ubghravk4a

Survey on Power-Aware Optimization Solutions for MANETs

Dimitris Kanellopoulos, Varun Kumar Sharma
2020 Electronics  
Even though improvements in battery design have not yet reached that great a level, the majority of the routing protocols have not emphasized energy consumption at all.  ...  In this survey, we assess the suggested power-aware policies in the past in every aspect so that, in the future, other researchers can find new potential research directions.  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/electronics9071129 fatcat:ac57hj7nhfgxrmc4upw6txus74


Shivkumar C. Muthukumar, Xiaozhou Li, Changbin Liu, Joseph B. Kopena, Mihai Oprea, Ricardo Correa, Boon Thau Loo, Prithwish Basu
2009 Proceedings of the 4th ACM international workshop on Experimental evaluation and characterization - WINTECH '09  
We experimentally validate declarative MANET routing protocols in dynamic settings within RapidMesh operating in ns-3 simulation environment and on the ORBIT wireless testbed.  ...  The same declarative specifications can also be used as actual implementations using the ns-3 network emulator, hence providing a bridge between simulation and testbed-based experimentation.  ...  Reference [9] first proposes the use of declarative programming to prototype and adapt MANET routing protocols.  ... 
doi:10.1145/1614293.1614295 fatcat:hkeemip77vdblgr4cvbue27wbu

A New QoS Management Scheme for VoIP Application over Wireless Ad Hoc Networks

Said El brak, Mohamed El brak, Driss Benhaddou
2014 Journal of Computer Networks and Communications  
Our work represents a first step toward improving aspects at the network layer by addressing issues from the standpoint of adaptation, claiming that effective adaptation of routing parameters can enhance  ...  The most important contribution is the adaptive OLSR-VA algorithm which provides an integrated environment where VoIP activity is constantly detected and routing parameters are adapted in order to meet  ...  Conflict of Interests The authors declare that they have no financial or personal conflict of interests which may interfere with the study outcome.  ... 
doi:10.1155/2014/945695 fatcat:ctweweixjzfzbhmxsfsu4l6c6q

High Performance Firewalls in MANETs

Hang Zhao, S M Bellovin
2010 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks  
Doing route selection based in part on source addresses is a form of policy routing, which has started to receive increased amounts of attention.  ...  ROFL is the first scheme to provide a concrete defense against some battery exhaustion attacks in MANETs.  ...  There, we are particularly interesting in adaption to policy changes and how that would affect generation and dissemination of ROFL advertisements in consequence. Fig. 1 : 1 MANET topologies.  ... 
doi:10.1109/msn.2010.30 dblp:conf/msn/ZhaoB10 fatcat:wk3oaeo355hu3b5lmklwvhlohe

Bio Inspired Approach To Secure Routing In MANETs

V Venkata Ramana
2012 International Journal of Artificial Intelligence & Applications  
to security issues in MANETs.  ...  In this paper, the author explore the challenges with respect to the security aspect in MANETs and propose a new approach which makes use of a bio-inspired methodology.  ...  AODV-SEC [16] -It is a secure routing protocol for MANETs based on AODV (Ad hock On Demand Distance Vector Routing) called AODV-SEC.  ... 
doi:10.5121/ijaia.2012.3411 fatcat:xwzp72q26rahtdskor5gq3pseu

Enhancing congestion control to address link failure loss over mobile ad-hoc network [article]

Mohammad Amin Kheirandish Fard, Sasan Karamizadeh, Mohammad Aflaki
2011 arXiv   pre-print
This paper explores an end-to-end threshold-based algorithm which enhances congestion control to address link failure loss in MANET. It consists of two phases.  ...  Second phase adjusts RTO for new route by comparing capabilities of new route to the broken route using available information in Transport layer such as ROTT and number of hops.  ...  TCP gradually adapts RTO to its actual value after receiving some RTTs from reconstructed route in adaptation period.  ... 
arXiv:1110.2289v1 fatcat:noe5uv44lvcufhqm5crqys5ijy

Enhancing Congestion Control To Address Link Failure Loss Over Mobile Ad-Hoc Network

Mohammad Amin Kheirandish Fard, Sasan Karamizadeh, Mohammad Aflaki
2011 International Journal of Computer Networks & Communications  
This paper explores an endto-end threshold-based algorithm which enhances congestion control to address link failure loss in MANET. It consists of two phases.  ...  Second phase adjusts RTO for new route by comparing capabilities of new route to the broken route using available information in Transport layer such as ROTT and number of hops.  ...  Being even a little bit less (/greater) than previous RTT declares MANET in normal (/congested) state no matter MANET has heavy or light traffic.  ... 
doi:10.5121/ijcnc.2011.3513 fatcat:ptbyw6xxmrhu3dqaxuzzit6znm

Smart detection and prevention procedure for DoS attack in MANET

A. S. M. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Imdadul Hoque, Md. Majharul Islam, Md. Mahmudul Hasan
2021 Recent Research in Science and Technology  
A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET).  ...  Existing methodologies for finding a malicious node that causes traffic jamming is based on node's retains value.  ...  So, the node adapts the data packet and drop it. In protocol based on flooding, the malicious node reply will be received by the requesting node before the reception of reply from any actual node.  ... 
doi:10.25081/rrst.2021.13.6848 fatcat:b6ch6kdyxzfsbnys55umrjkqkq

Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy

Chethan B. K., M. Siddappa, Jayanna H. S.
2020 International Journal of Electrical and Computer Engineering (IJECE)  
At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found.  ...  The outcome shows proposed system outshines existing security scheme in MANET.  ...  The technique uses an adaptive process in order to evolve up with a decision makig system. Agent-based approaches are also used by Harrabi et al.  ... 
doi:10.11591/ijece.v10i2.pp1561-1569 fatcat:fwz4bm2osre6rd7u5ecxv5gkwi
« Previous Showing results 1 — 15 out of 952 results