160 Hits in 7.7 sec

Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

Prof. A. K. Naikwadi
2012 IOSR Journal of Engineering  
Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks.  ...  The protocols use spatial diversity accessible among a set of dispersed terminals that relay messages for one another in such a way that the target terminal can average the loss.  ...  Medium-Access Control For medium-access control, nodes transmit on basically channels as in many current wireless networks.  ... 
doi:10.9790/3021-02815967 fatcat:fp54m3relngfra2i46k3tc2kae

MAC protocols using directional antennas in IEEE 802.11 based ad hoc networks

Young-Bae Ko, Jong-Mu Choi, Nitin H. Vaidya
2008 Wireless Communications and Mobile Computing  
To best utilize directional antennas, a suitable Medium Access Control (MAC) protocol must be designed.  ...  In this paper, we present modified MAC protocols suitable for 802.11 based ad hoc networks using directional antennas.  ...  To best utilize directional antennas, a suitable Medium Access Control (MAC) protocol must be used.  ... 
doi:10.1002/wcm.526 fatcat:potegk6fyjekdkxxlhenabvnka

Outlines of Vehicular Ad-Hoc networks

Ing. Boris Cucor
2021 Transportation Research Procedia  
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management.  ...  In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management.  ...  In DSRC/ WAVE networks it is used to make PHY (Physical layer) layer and MAC (Medium Access Control) sublayer too. In the upper layers, protocols IEEE 1609.4, 1609.3, and 1609.2 are implemented.  ... 
doi:10.1016/j.trpro.2021.07.115 fatcat:hw2ybxrxxzehbbf5yzuc4sl6bq

Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines

Ying-Dar Lin, Shun-Lee Chang, Jui-Hung Yeh, Shau-Yu Cheng
2011 Ad hoc networks  
The testbed is constructed in a laboratory and a field crossing three floors of a building.  ...  On the other hand, sparser deployments should use a shorter beacon interval, e.g. 100 ms, to enhance link stability.  ...  Lin et al. / Ad Hoc Networks xxx (2011) xxx-xxx Please cite this article in press as: Y.-D.  ... 
doi:10.1016/j.adhoc.2011.03.003 fatcat:xbmgsqvkffbn5e7k3aqq2co5jq

Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET

Taj-Aldeen Naser Abdali, Rosilah Hassan, Ravie Chandren Muniyandi, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen, Ahmed Salih Al-Khaleefa
2020 Information  
Mobile Ad-hoc Network (MANETs) is a wireless network topology with mobile network nodes and movable communication routes.  ...  In addition, the network nodes in MANETs are free to either join or leave the network. Typically, routing in MANETs is multi-hop because of the limited communication range of nodes.  ...  Acknowledgments: The authors would like to acknowledge the support provided by the Network and Communication Technology (NCT) Research Groups, FTSM, UKM in providing facilities throughout this paper.  ... 
doi:10.3390/info11110529 fatcat:6ur5g7dijnga7hjdwpscdweda4

MAODV: A Defense against Sybil Attacks in Wireless Networks

Manish Kumar, Sini Shibu
2016 International Journal of Computer Applications  
In mobile ad-hoc networks, data transmission is performed within an untrusted wireless environment. The lack of centralized infrastructure in ad-hoc network makes it vulnerable to various attacks.  ...  Sybil attack is one of the serious attacks, which form a serious threat in the networks, especially against many ad hoc wireless routing protocols, and location based wireless security system.  ...  Section 3 presents the popular secure protocols in ad hoc networks. In Section 4 conclusion is presented. SECURITY ATTACKS Securing remote specially appointed systems is a very difficult issue.  ... 
doi:10.5120/ijca2016908488 fatcat:z7syh3xqvzdx7d3pyvznnaxysq

Medium Access Control Protocols for Unmanned Aerial Vehicle-Aided Wireless Sensor Networks: A Survey

Sabitri Poudel, Sangman Moh
2019 IEEE Access  
INDEX TERMS Wireless sensor network, unmanned aerial vehicle, medium access control, energy efficiency, data aggregation. 65728 2169-3536  ...  In the UAV-aided WSNs (UWSNs), medium access control (MAC) is very important because it affects not only the system performance but also the energy efficiency in battery-powered sensor nodes.  ...  ACKNOWLEDGMENT The authors wish to thank the editor and anonymous referees for their helpful comments in improving the quality of this paper.  ... 
doi:10.1109/access.2019.2917948 fatcat:ell2atlnqnanrdgy66mpmjeklq

Enhanced Security using Mobile Agent based Key Management and Encryption Technique for MANETs

2020 International Journal of Advanced Trends in Computer Science and Engineering  
Mobile Ad hoc Networks (MANETs) isn't made of any pre existing infrastructure for transferring and getting information.  ...  This is an impermanent network which can be setup wherever at any instant due to its uncomplicated infrastructure. No base station is essential in this network.  ...  RESEARCH METHODOLOGY Mobile Ad-hoc networks, because of their ad hoc nature, are often envisaged in insecure environments, that makes them vulnerable to security attacks.  ... 
doi:10.30534/ijatcse/2020/305952020 fatcat:wcjc63aejfczdaash7jp4fyk44

C-Lnrd: A Cross-Layered Neighbor Route Discovery For Effective Packet Communication In Wireless Sensor Network

K. Kalaikumar, E. Baburaj
2017 Zenodo  
In the presented work, the initial process is to discover the route in the sensor network using Dynamic Source Routing based Medium Access Control (MAC) sub layers.  ...  With this shared information, MAC protocol adapts effective functionality maintenance such as route selection on changeable sensor network environment.  ...  Secured Antennae Medium Access Control (SAMAC) [1] ensures communication of the sensor network with the help of an integrated cross-layer protocol to ensure energy efficiency.  ... 
doi:10.5281/zenodo.1130302 fatcat:hhdh4f6kdbdrphjebemgyynsim

Computation of Dynamic Signal Phases for Vehicular Traffic [chapter]

Rajendra S. Parmar, Bhushan H. Trivedi
2018 Lecture Notes in Networks and Systems  
The key technologies are sensor networks and parameter collating methodologies.  ...  The achievable speeds in vehicles are not attained because of traffic congestion, rendering automotive developments ineffective.  ...  The US mobility report in 2011, states the present data is consistent with the past research. Ref.  ... 
doi:10.1007/978-981-10-8360-0_1 fatcat:3kc4k2hvszahhnyet27yxhp72m

Securing Zone Routing Protocol in Ad-Hoc Networks

Ibrahim S. I. Abuhaiba, Hanan M. M. Abu-Thuraia
2012 International Journal of Computer Network and Information Security  
Index Termsad-hoc networks, secure routing, secure neighbor discovery, digital signature, zone routing protocol, secure zone routing protocol Securing Zone Routing Protocol in Ad-Hoc Networks 25 Copyright  ...  This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications.  ...  At the link layer, the simulator implements the complete IEEE 802.11 standard Medium Access Control (MAC) protocol.  ... 
doi:10.5815/ijcnis.2012.10.03 fatcat:w5p5u6ee75c7dj66g7wn6e6z6u

Identifying Retrofitting Opportunities for Federated Satellite Systems

Rustam Akhtyamov, Rob Vingerhoeds, Alessandro Golkar
2019 Journal of Spacecraft and Rockets  
Although the paper concludes that direct modifications of existing satellites are nonfeasible from a technical point of view, it identifies a possible scenario of retrofitting by adding intermediary negotiator  ...  This paper aims at identifying retrofitting possibilities to incorporate existing spacecraft into a network of federated satellite systems.  ...  Design for changeability (DfC) can be used to estimate cost and time involved in redesign and adaptation efforts [37] . "Retrofitting" is a very specific process of adding new functionalities.  ... 
doi:10.2514/1.a34196 fatcat:otwrx43wireqxjetckautnpmr4

Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks

Sk. Md. Mizanur Rahman, Atsuo Inomata, Masahiro Mambo, Eiji Okamoto
2006 IPSJ Digital Courier  
Moreover, this scheme does not depend on node density as long as nodes are connected in the network. 524 Vol. 2 Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks 525  ...  Due to the infrastructure-less, dynamic, and broadcast nature of radio transmissions, communications in mobile ad-hoc networks, MANETs, are susceptible to malicious traffic analysis.  ...  AODPR protocol Carrier sense multiple access with collision avoidance (CSMA/CA) 33) is used as the channel-access mechanism for control messages.  ... 
doi:10.2197/ipsjdc.2.524 fatcat:yajrnup7obh7hklvnodhfpxypu

A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas

Carolina Tripp-Barba, Luis Urquiza-Aguiar, Mónica Igartua, David Rebollo-Monedero, Luis de la Cruz Llopis, Ahmad Mezher, José Aguilar-Calderón
2014 Sensors  
In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably.  ...  Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks.  ...  Vehicular ad hoc networks are a specific type of mobile ad hoc network (MANET) [1] in which the nodes are vehicles.  ... 
doi:10.3390/s140202199 pmid:24476683 pmcid:PMC3958047 fatcat:tw7zlu2cofavbbjznmybaztyl4

Adaptive Communication Techniques for the Internet of Things

Peng Du, George Roussos
2013 Journal of Sensor and Actuator Networks  
This survey provides an overview of current developments in this area, placing emphasis on wireless sensor networks that can provide IoT capabilities for material objects and techniques that can be used  ...  in the context of systems employing low-power versions of the Internet Protocol (IP) stack.  ...  The approach in [71] constantly updates the optimal transmission radius of CHs, i.e., cluster sizes, using the Ad Hoc network design algorithm (ANDA).  ... 
doi:10.3390/jsan2010122 fatcat:4dngjrb5kzhopdkffqiaxktubq
« Previous Showing results 1 — 15 out of 160 results