60,526 Hits in 3.7 sec

Formal verification of secure ad-hoc network routing protocols using deductive model-checking

Levente Buttyan, Ta Vinh Thong
2010 WMNC2010  
Secure ad-hoc network routing protocols using deductive model-checking 2011 55 1-2 Per. Pol. Elec. Eng.  ...  In order to cope with this problem, several secured routing protocols have been proposed for ad-hoc networks.  ...  Acknowledgement The work described in this paper has been supported by the High Speed Networks Laboratory (HSN Lab) at the Budapest University of Technology and Economics.  ... 
doi:10.1109/wmnc.2010.5678752 dblp:conf/mwcn/ButtyaT10 fatcat:yiluv2cwvrh2bep7nejjjnonwq

Using the IEEE 802.11 Frame Check Sequence as a pseudo random number for packet sampling in wireless networks

S. Raynel, A. McGregor, M. Jorgensen
2009 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks  
This theory is tested by analysing the distribution of Frame Check Sequences from a large, real world capture.  ...  In order for such devices to be used to perform link-level measurement on IEEE 802.11 networks, a packet sampling technique is required in order to reliably capture a representative sample of frames.  ...  The MadWiFi driver [6] was set to capture all frames, including those that failed their Frame Check Sequence check in hardware.  ... 
doi:10.1109/wiopt.2009.5291575 dblp:conf/wiopt/RaynelMJ09 fatcat:jtmuwqk7kvhuvlshaqpzacv3oq

Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling

Simanta Sarma
2013 IOSR Journal of Computer Engineering  
Finally we survey the current checking of the modeling solutions for the mobile ad hoc network.  ...  We discuss for another process of copying with the state explosion in Ad Hoc Networks and checking of the mobile ad hoc network.  ...  We completely introduced computer network and mobile ad hoc with routing protocols validation process in my research work.  ... 
doi:10.9790/0661-1413337 fatcat:4rnxvjaepvartkvibt3wk5safa

Agent Based Trust Estimation for Mobile Ad Hoc Network

M. B. Mukesh Krishnan, T. Balachander, P. Rajasekar
2015 Indian Journal of Science and Technology  
This paper develops novel mechanisms for providing Agent Based Trust Estimation for Mobile Ad Hoc Network. The primary aim of the scheme is to provide trust among the nodes.  ...  The proposed model is tested by comparing the other trust models and the results shows good improvement than the other trust models for MANET.  ...  Model Conclusion To provide a reliable communication in mobile ad hoc network (MANET) communication, this paper proposed Agent based Trust estimation model.  ... 
doi:10.17485/ijst/2015/v8is9/58398 fatcat:zdjce2ioubcnxbvwttvumagz2e

A Trust Model Based Routing Protocol For MANET

Divya Gupta
2016 International Journal Of Engineering And Computer Science  
In mobile ad hoc networks (MANETs), the provision of quality of service (QoS) guarantees is much more challenging than in wire line networks, mainly due to node mobility, multi hop communications, contention  ...  Another model is Mobile Ad-hoc network .Mobile Ad-Hoc Networks (MANETs) are comprised of mobile nodes (MNs) that are self-organizing and cooperative to ensure efficient and accurate packet routing between  ...  IMPLEMENTATION Reputation Management Modified AODV is a trust based ad-hoc on demand vector routing (TAODV), is a protected routing protocol based on trust model for Mobile ad-hoc network.  ... 
doi:10.18535/ijecs/v5i6.37 fatcat:3o262lr2onf6zclsdteof2kyx4

A group mobility model for ad hoc wireless networks

Xiaoyan Hong, Mario Gerla, Guangyu Pei, Ching-Chuan Chiang
1999 Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '99  
We show that group motion occurs frequently in ad hoc networks, and introduce a novel group mobility model -Reference Point Group Mobility (RPGM) -to represent the relationship among mobile hosts.  ...  In this paper, we present a survey of various mobility models in both cellular networks and multi-hop networks.  ...  Recently, mobility models have been explored also in ad hoc networks.  ... 
doi:10.1145/313237.313248 fatcat:6rsqnbbignc3ldglzx4lwkp2i4


2009 Journal of Engineering Science and Technology  
Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from  ...  Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks.  ...  Coloured Petri Net model has been used to describe how different agents coordinate to protect the mobile ad hoc network from intruding and attack.  ... 
doaj:9cfa90dcca2040aaa7f85864176cb2fd fatcat:ptlckaar6vbhfpo7g6vyygrdtq

DSR based Routing Algorithm with Delay Guarantee for Ad Hoc Networks

Sofiane Ouni, Jihen Bokri, Farouk Kamoun
2009 Journal of Networks  
Applying real time applications with deadline guarantee for Ad Hoc network seems to be a difficult challenge and to be an impossibility in general. This is due to the features of such networks.  ...  An admission control is made to preserve the reserved node resources and is adapted to node mobility by preventing path breaking.  ...  Mobility models for Ad hoc networks To study the mobility prediction issue, several models for Ad hoc networks have been proposed in literature [3] [15], [24] , [19] .  ... 
doi:10.4304/jnw.4.5.359-369 fatcat:zd4eenhhirfklikcdsulsm7pwy

Energy Efficient Ad-hoc Routing Protocol for Disaster Scenario

Vishal M.Patel, Nikhil N. Gondaliya
2014 International Journal of Computer Applications  
There are many issues for designing of ad hoc network like MAC layer protocol, security, mobility of nodes, routing protocol, quality of service etc...  ...  The most challenging is design of routing protocol which may affects the performance of ad hoc network.  ...  INTRODUCTION The mobile ad hoc networks (MANETs) are wireless networks which are deployed without the need of infrastructure.  ... 
doi:10.5120/17287-7799 fatcat:6sgfniw3yvehlpkqatpclpznvq

An Algorithm to Detect Attacks in Mobile Ad Hoc Network

Radhika i Sain, Manju Khari
2011 International Journal of Smart Sensor and Adhoc Network.  
Each node in Mobile Ad Hoc Network (MANETs) communicates with each other for transferring the packet (or data) to destination node.  ...  Therefore, the need of monitoring the nodes arises to keep a check on the behavior of a node.  ...  INTRODUCTION Mobile Ad Hoc Network is a kind of network which does not require any fixed infrastructure (or central entity) to work.  ... 
doi:10.47893/ijssan.2011.1006 fatcat:vn3dxo56jzbgjimhgzqkeelnbu

Concept and design of Ad Hoc and Mobile classrooms

C.Y. Chang, J.P. Sheu, T.W. Chan
2003 Journal of Computer Assisted Learning  
This investigation describes the concept of mobile learning and the design of Ad Hoc and Mobile classrooms.  ...  Four classes of mobile learning and implementation of Ad Hoc and eSchoolbag systems are presented.  ...  The Ad Hoc and Mobile classroom and the eSchoolbag systems were designed and implemented to experiment with the mobile outdoor group learning model.  ... 
doi:10.1046/j.0266-4909.00035.x fatcat:xktaznosp5cfrfm7haf5wk3vrm

Mobile Networking and Ad hoc routing protocols validation

Simanta Sarma
2012 IOSR Journal of Computer Engineering  
This paper evaluates two model checking tools, SPIN and UPPAAL, using the verification of the Ad hoc Routing protocol as a case study.  ...  In this paper we describe mobile network and efficient routing protocol for wireless ad hoc networks. We report on its implementation, on performance comparisons and on a formal validation result.  ...  Mobile Ad-Hoc Network Theoretical mobile ad hoc networking research [CCL03] started some decades ago. But commercial digital radio technologies appeared in the mid-nineties.  ... 
doi:10.9790/0661-0631524 fatcat:bpdoen5nt5bjvbok4jtsoebeve

Security Of Mobile Agent In Ad Hoc Network Using Threshold Cryptography

S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam
2010 Zenodo  
In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS.  ...  Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security.  ...  Ad hoc Network 'Ad hoc' is a Latin phrase. It means "for this purpose" [1] .  ... 
doi:10.5281/zenodo.1059882 fatcat:lkhjm2vqezcj3caeq7xcs7vpci

HWN* Mobility Management Considering QoS, Optimisation and Cross Layer Issues

Chong Shen
2007 Journal of Communications Software and Systems  
Congestion avoidance control and adaptive handover mechanisms are implemented for efficient cooperation within the mobile heterogeneous network environment consisting of a TDMA network, ad hoc network  ...  In this paper, we address mobility management for 4th generation heterogeneous networks from a quality of service (QoS), optimisation and cross layer design perspective.  ...  His research interests include resource management in heterogeneous wireless networks, network and service modeling in ad hoc and sensor networks, and dynamic service composition in mobile and wireless  ... 
doi:10.24138/jcomss.v3i4.244 fatcat:coazbe7sljaefkdacotbpehwwa

Performance comparison of cellular and multi-hop wireless networks

Hung-Yun Hsieh, Raghupathy Sivakumar
2001 Performance Evaluation Review  
Finally, we present a simple hybrid wireless network model that has the combined advantages of cellular and ad-hoc wireless networks but does not suffer from the disadvantages of either.  ...  In this paper we study the performance trade-offs between conventional cellular and multi-hop ad-hoc wireless networks.  ...  The physical layer implementations for the cellular model is the same as the one used for the ad-hoc network model.  ... 
doi:10.1145/384268.378441 fatcat:ztz6ju5kmba4bakf2ifbrsrdae
« Previous Showing results 1 — 15 out of 60,526 results