A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network
2012
IOSR Journal of Engineering
Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. ...
The protocols use spatial diversity accessible among a set of dispersed terminals that relay messages for one another in such a way that the target terminal can average the loss. ...
Medium-Access Control For medium-access control, nodes transmit on basically channels as in many current wireless networks. ...
doi:10.9790/3021-02815967
fatcat:fp54m3relngfra2i46k3tc2kae
MAC protocols using directional antennas in IEEE 802.11 based ad hoc networks
2008
Wireless Communications and Mobile Computing
To best utilize directional antennas, a suitable Medium Access Control (MAC) protocol must be designed. ...
In this paper, we present modified MAC protocols suitable for 802.11 based ad hoc networks using directional antennas. ...
To best utilize directional antennas, a suitable Medium Access Control (MAC) protocol must be used. ...
doi:10.1002/wcm.526
fatcat:potegk6fyjekdkxxlhenabvnka
Outlines of Vehicular Ad-Hoc networks
2021
Transportation Research Procedia
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management. ...
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management. ...
In DSRC/ WAVE networks it is used to make PHY (Physical layer) layer and MAC (Medium Access Control) sublayer too. In the upper layers, protocols IEEE 1609.4, 1609.3, and 1609.2 are implemented. ...
doi:10.1016/j.trpro.2021.07.115
fatcat:hw2ybxrxxzehbbf5yzuc4sl6bq
Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines
2011
Ad hoc networks
The testbed is constructed in a laboratory and a field crossing three floors of a building. ...
On the other hand, sparser deployments should use a shorter beacon interval, e.g. 100 ms, to enhance link stability. ...
Lin et al. / Ad Hoc Networks xxx (2011) xxx-xxx
Please cite this article in press as: Y.-D. ...
doi:10.1016/j.adhoc.2011.03.003
fatcat:xbmgsqvkffbn5e7k3aqq2co5jq
Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET
2020
Information
Mobile Ad-hoc Network (MANETs) is a wireless network topology with mobile network nodes and movable communication routes. ...
In addition, the network nodes in MANETs are free to either join or leave the network. Typically, routing in MANETs is multi-hop because of the limited communication range of nodes. ...
Acknowledgments: The authors would like to acknowledge the support provided by the Network and Communication Technology (NCT) Research Groups, FTSM, UKM in providing facilities throughout this paper. ...
doi:10.3390/info11110529
fatcat:6ur5g7dijnga7hjdwpscdweda4
MAODV: A Defense against Sybil Attacks in Wireless Networks
2016
International Journal of Computer Applications
In mobile ad-hoc networks, data transmission is performed within an untrusted wireless environment. The lack of centralized infrastructure in ad-hoc network makes it vulnerable to various attacks. ...
Sybil attack is one of the serious attacks, which form a serious threat in the networks, especially against many ad hoc wireless routing protocols, and location based wireless security system. ...
Section 3 presents the popular secure protocols in ad hoc networks. In Section 4 conclusion is presented.
SECURITY ATTACKS Securing remote specially appointed systems is a very difficult issue. ...
doi:10.5120/ijca2016908488
fatcat:z7syh3xqvzdx7d3pyvznnaxysq
Medium Access Control Protocols for Unmanned Aerial Vehicle-Aided Wireless Sensor Networks: A Survey
2019
IEEE Access
INDEX TERMS Wireless sensor network, unmanned aerial vehicle, medium access control, energy efficiency, data aggregation. 65728 2169-3536 ...
In the UAV-aided WSNs (UWSNs), medium access control (MAC) is very important because it affects not only the system performance but also the energy efficiency in battery-powered sensor nodes. ...
ACKNOWLEDGMENT The authors wish to thank the editor and anonymous referees for their helpful comments in improving the quality of this paper. ...
doi:10.1109/access.2019.2917948
fatcat:ell2atlnqnanrdgy66mpmjeklq
Enhanced Security using Mobile Agent based Key Management and Encryption Technique for MANETs
2020
International Journal of Advanced Trends in Computer Science and Engineering
Mobile Ad hoc Networks (MANETs) isn't made of any pre existing infrastructure for transferring and getting information. ...
This is an impermanent network which can be setup wherever at any instant due to its uncomplicated infrastructure. No base station is essential in this network. ...
RESEARCH METHODOLOGY Mobile Ad-hoc networks, because of their ad hoc nature, are often envisaged in insecure environments, that makes them vulnerable to security attacks. ...
doi:10.30534/ijatcse/2020/305952020
fatcat:wcjc63aejfczdaash7jp4fyk44
C-Lnrd: A Cross-Layered Neighbor Route Discovery For Effective Packet Communication In Wireless Sensor Network
2017
Zenodo
In the presented work, the initial process is to discover the route in the sensor network using Dynamic Source Routing based Medium Access Control (MAC) sub layers. ...
With this shared information, MAC protocol adapts effective functionality maintenance such as route selection on changeable sensor network environment. ...
Secured Antennae Medium Access Control (SAMAC) [1] ensures communication of the sensor network with the help of an integrated cross-layer protocol to ensure energy efficiency. ...
doi:10.5281/zenodo.1130302
fatcat:hhdh4f6kdbdrphjebemgyynsim
Computation of Dynamic Signal Phases for Vehicular Traffic
[chapter]
2018
Lecture Notes in Networks and Systems
The key technologies are sensor networks and parameter collating methodologies. ...
The achievable speeds in vehicles are not attained because of traffic congestion, rendering automotive developments ineffective. ...
The US mobility report in 2011, states the present data is consistent with the past research. Ref. ...
doi:10.1007/978-981-10-8360-0_1
fatcat:3kc4k2hvszahhnyet27yxhp72m
Securing Zone Routing Protocol in Ad-Hoc Networks
2012
International Journal of Computer Network and Information Security
Index Termsad-hoc networks, secure routing, secure neighbor discovery, digital signature, zone routing protocol, secure zone routing protocol Securing Zone Routing Protocol in Ad-Hoc Networks 25 Copyright ...
This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications. ...
At the link layer, the simulator implements the complete IEEE 802.11 standard Medium Access Control (MAC) protocol. ...
doi:10.5815/ijcnis.2012.10.03
fatcat:w5p5u6ee75c7dj66g7wn6e6z6u
Identifying Retrofitting Opportunities for Federated Satellite Systems
2019
Journal of Spacecraft and Rockets
Although the paper concludes that direct modifications of existing satellites are nonfeasible from a technical point of view, it identifies a possible scenario of retrofitting by adding intermediary negotiator ...
This paper aims at identifying retrofitting possibilities to incorporate existing spacecraft into a network of federated satellite systems. ...
Design for changeability (DfC) can be used to estimate cost and time involved in redesign and adaptation efforts [37] . "Retrofitting" is a very specific process of adding new functionalities. ...
doi:10.2514/1.a34196
fatcat:otwrx43wireqxjetckautnpmr4
Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks
2006
IPSJ Digital Courier
Moreover, this scheme does not depend on node density as long as nodes are connected in the network. 524 Vol. 2 Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks 525 ...
Due to the infrastructure-less, dynamic, and broadcast nature of radio transmissions, communications in mobile ad-hoc networks, MANETs, are susceptible to malicious traffic analysis. ...
AODPR protocol Carrier sense multiple access with collision avoidance (CSMA/CA) 33) is used as the channel-access mechanism for control messages. ...
doi:10.2197/ipsjdc.2.524
fatcat:yajrnup7obh7hklvnodhfpxypu
A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas
2014
Sensors
In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. ...
Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. ...
Vehicular ad hoc networks are a specific type of mobile ad hoc network (MANET) [1] in which the nodes are vehicles. ...
doi:10.3390/s140202199
pmid:24476683
pmcid:PMC3958047
fatcat:tw7zlu2cofavbbjznmybaztyl4
Adaptive Communication Techniques for the Internet of Things
2013
Journal of Sensor and Actuator Networks
This survey provides an overview of current developments in this area, placing emphasis on wireless sensor networks that can provide IoT capabilities for material objects and techniques that can be used ...
in the context of systems employing low-power versions of the Internet Protocol (IP) stack. ...
The approach in [71] constantly updates the optimal transmission radius of CHs, i.e., cluster sizes, using the Ad Hoc network design algorithm (ANDA). ...
doi:10.3390/jsan2010122
fatcat:4dngjrb5kzhopdkffqiaxktubq
« Previous
Showing results 1 — 15 out of 160 results