Filters








8,763 Hits in 5.6 sec

Modeling and Efficient Verification of Wireless Ad hoc Networks [article]

Behnaz Yousefi, Fatemeh Ghassemi, Ramtin Khosravi
2017 arXiv   pre-print
We address main challenges of modeling wireless ad hoc networks such as local broadcast, underlying topology, and its changes, and discuss how they can be efficiently modeled at the semantic level to make  ...  Wireless ad hoc networks, in particular mobile ad hoc networks (MANETs), are growing very fast as they make communication easier and more available.  ...  on the paper, Wan Fokkink and Bas Luttik for their helpful comments on the paper.  ... 
arXiv:1604.07179v2 fatcat:rbr6kvuuqrhazk6mh7lt75hvuq

Secure Data Transmission in Mobile ADHOC Network with Verification of Neighbor Positions

Priyadarshini. P
2019 International Journal for Research in Applied Science and Engineering Technology  
It monitors the events taking place in the network system. In our proposed system, we ensure data transmission in efficient ways and reduce the effectiveness of the IDS.  ...  Mobile adhoc network is a wireless, infrastructure less and dynamic wireless network in which node contain the resource.  ...  High End to end delay and Low throughput. 8. A survey of mobility for ad hoc network research. Various mobility models in ad hoc networks.  ... 
doi:10.22214/ijraset.2019.3224 fatcat:xloa7i47qjervm6carwvb4deeu

Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter

Anuradha T.Thakre, Sandeep Kadam
2014 International Journal of Computer Applications  
In Mobile Ad Hoc network (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor's position for effective and  ...  This new protocol fundamentally deals with Mobile Ad Hoc network where a persistent infrastructure is unavailable and the location identification is necessarily learnt via.  ...  The antenna models used in ad hoc networks are directional antenna model or Omni directional antenna model.  ... 
doi:10.5120/17413-7997 fatcat:ylkgw35esjf6di75a7x7oewa6y

Preventing clone attacks using dynamic cryptography in MANETs

Saravanan R, Ilavarasan E
2018 Biomedical Research  
Security-aware Ad Hoc routing for wireless networks.  ...  Packet received rates of AODV and PK-AODV Distance vector routing for mobile wireless ad hoc (hierarchical). networks.  ... 
doi:10.4066/biomedicalresearch.29-17-1404 fatcat:fbv4nyonnbhjrbfhicoq7tzpdy

A Small World Network Model for Energy Efficient Wireless Networks

Tiankui Zhang, Jinlong Cao, Yue Chen, Laurie Cuthbert, Maged Elkashlan
2013 IEEE Communications Letters  
Wireless ad hoc networks can be modeled as small world networks based on the complex network theory.  ...  Index Terms-Ad hoc networks, energy efficiency, small world networks.  ...  INTRODUCTION A WIRELESS ad hoc network is a decentralized type of wireless network.  ... 
doi:10.1109/lcomm.2013.081313.131394 fatcat:zl4anpajivf4bfivsc2lzadwbi

EFFICIENT AND SECURE AUTHENTICATION BY USING 3-PATH TRANSMISSION IN AD HOC NETWORKS

VETRI SELVI S, PURUS HOTHAMAN
2012 International Journal of Smart Sensor and Adhoc Network.  
They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median.  ...  Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network.  ...  Smetters proposed a solution for secure communication and authentication in ad-hoc wireless networks & also for presented new schemes for peer-to-peer authentication in ad-hoc wireless networks.  ... 
doi:10.47893/ijssan.2012.1144 fatcat:n7syrf5dn5bwjimz5r3u4t5lly

Mobile Networking and Ad hoc routing protocols validation

Simanta Sarma
2012 IOSR Journal of Computer Engineering  
In this paper we describe mobile network and efficient routing protocol for wireless ad hoc networks. We report on its implementation, on performance comparisons and on a formal validation result.  ...  This paper evaluates two model checking tools, SPIN and UPPAAL, using the verification of the Ad hoc Routing protocol as a case study.  ...  Acknowledgements: The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation.  ... 
doi:10.9790/0661-0631524 fatcat:bpdoen5nt5bjvbok4jtsoebeve

Facilitating secure ad hoc service discovery in public environments

Feng Zhu, Matt Mutka, Lionel Ni
2005 Journal of Systems and Software  
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging.  ...  We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications.  ...  In this model, a mobile client only has the wireless ad hoc communication channel.  ... 
doi:10.1016/j.jss.2004.07.014 fatcat:kvccpctj2zbtplkygvw67fgr2i

A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks

Zhe Chen, Daqiang Zhang, Rongbo Zhu, Yinxue Ma, Ping Yin, Feng Xie
2013 Sensor Letters  
This paper surveys how formal verification can be used to prove the correctness of ad hoc routing protocols, which are fundamental infrastructure of wireless sensor networks.  ...  We believe that they can together aid the development of correct ad hoc routing protocols and their reliable implementations.  ...  The authors wish to thank the editor and the anonymous referees for their detailed comments and helpful suggestions.  ... 
doi:10.1166/sl.2013.2653 fatcat:6fiqkogbu5dr7caef46gwfrjw4

Highly responsive and efficient QoS routing using pre- and on-demand computations along with a new normal measure

Yanxing Zheng, Turgay Korkmaz, Wenhua Dou, Jing Tian
2006 Computer Networks  
Lower-Priority-Triggered Distributed MAC-layer Priority Scheduling in Wireless Ad Hoc Networks.  ...  HEAP: Hop-by-hop Efficient Authentication Protocol For Mobile Ad-hoc Networks. ACM 10th Communications and Networking Simulation Symposium CNS 07 (pp. 157-165). Norfolk, VA:. 1. Korkmaz, T.  ... 
doi:10.1016/j.comnet.2006.04.006 fatcat:phtr2lqlmvaq5ktndtrs3v7hlu

Highly Responsive and Efficient QoS Routing Using Pre- and On-demand Computations Along with a New Normal Measure [chapter]

Yanxing Zheng, Turgay Korkmaz, Wenhua Dou
2005 Lecture Notes in Computer Science  
Lower-Priority-Triggered Distributed MAC-layer Priority Scheduling in Wireless Ad Hoc Networks.  ...  HEAP: Hop-by-hop Efficient Authentication Protocol For Mobile Ad-hoc Networks. ACM 10th Communications and Networking Simulation Symposium CNS 07 (pp. 157-165). Norfolk, VA:. 1. Korkmaz, T.  ... 
doi:10.1007/11422778_5 fatcat:6k5bg42b45d3zevgfmwzg2qafi

A Review of Modern Adaptive Routing Algorithm for Wireless ADHOC N/W

Ms. Vaishali Matvankar
2018 International Journal for Research in Applied Science and Engineering Technology  
In comparison to cellular networks the ad hoc networks are more adaptable to changing physical conditions and traffic demands.  ...  In this synopsis, we are presenting a review of some modern adaptive opportunistic scheme for the wireless ADHOC network.  ...  The Wireless ad hoc networks also commonly known as Mobile Ad Hoc Networks (MANETs) can form stand-alone sets of wireless terminals.  ... 
doi:10.22214/ijraset.2018.1094 fatcat:ljszly2hbrbfnb2wxddh5qim2u

Energy Consumption Model in Ad Hoc Mobile Network

Maher HENI
2012 International Journal of Computer Networks & Communications  
The aim of this work is to model the nodes battery discharge in wireless ad hoc networks. Many work focus on the energy consumption in such networks.  ...  Indeed, the nodes that form such network are mobiles, so no instant recharge of battery. Also with special type of ad hoc networks are wireless sensors networks using non-rechargeable batteries.  ...  In this work, our aim is to model the batteries power discharge, in ad hoc wireless networks.  ... 
doi:10.5121/ijcnc.2012.4314 fatcat:dhyh5rdfxjhilfw3o3qiq53b4e

An Efficient Hybrid Message Authentication Scheme in Vehicular Ad Hoc Networks

2019 International journal of recent technology and engineering  
Vehicular ad hoc networks (VANETs) are under active development phase, especially due to the latest and foremost wireless communication and networking technologies.  ...  First we explain the properties of the attacks in security model.  ...   Abstract: Vehicular ad hoc networks (VANETs) are under active development phase, especially due to the latest and foremost wireless communication and networking technologies.  ... 
doi:10.35940/ijrte.b1048.0782s419 fatcat:7uzqj6gfz5c4rowv4ubcvgsulq

Energy Consumption Model in ad hoc Mobile Network [article]

Maher Heni and Ammar Bouallegue and Ridha Bouallegue
2012 arXiv   pre-print
The aim of this work is to model the nodes battery discharge in wireless ad hoc networks. Many work focus on the energy consumption in such networks.  ...  Indeed, the nodes that form such network are mobiles, so no instant recharge of battery. Also with special type of ad hoc networks are wireless sensors networks using non-rechargeable batteries.  ...  In this work, our aim is to model the batteries power discharge, in ad hoc wireless networks.  ... 
arXiv:1206.1426v1 fatcat:f7sm3qsd2bamhpaeya7is6u5su
« Previous Showing results 1 — 15 out of 8,763 results