Filters








3,173 Hits in 5.2 sec

Modeling and analyzing the impact of location inconsistencies on geographic routing in wireless networks

Yongjin Kim, Jae-Joon Lee, Ahmed Helmy
2004 ACM SIGMOBILE Mobile Computing and Communications Review  
In this paper, we analyze the impact of location inaccuracy on geographic routing.  ...  A Recently, geographic routing in wireless networks has gained attention due to several advantages of location information.  ...  In this paper, we investigate the impact of location inaccuracy on geographic routing.  ... 
doi:10.1145/980159.980168 fatcat:67fc4ahrtvdmzl4ifth732alzu

Impact of location inconsistencies on geographic routing in wireless networks

Yongjin Kim, Jae-Joon Lee, Ahmed Helmy
2003 Proceedings of the 6th international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWIM '03  
In this paper, we analyze the impact of location inaccuracy on geographic routing.  ...  Our study shows the significant impact of location inaccuracy on the performance of geographic routing in terms of packet drops, non-optimal paths and routing loops.  ...  In geographic routing, the routing decision at each node is based on the destination's location contained in the packet header and the location of the forwarding node's neighbors.  ... 
doi:10.1145/940991.941013 dblp:conf/mswim/KimLH03 fatcat:snj445dww5hs5ikbhm53difoku

Impact of location inconsistencies on geographic routing in wireless networks

Yongjin Kim, Jae-Joon Lee, Ahmed Helmy
2003 Proceedings of the 8th international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWIM '03  
In this paper, we analyze the impact of location inaccuracy on geographic routing.  ...  Our study shows the significant impact of location inaccuracy on the performance of geographic routing in terms of packet drops, non-optimal paths and routing loops.  ...  In geographic routing, the routing decision at each node is based on the destination's location contained in the packet header and the location of the forwarding node's neighbors.  ... 
doi:10.1145/941012.941013 fatcat:nsh6ubrfwrchnbof73kqleripm

Modeling and analyzing the correctness of geographic face routing under realistic conditions

Karim Seada, Ahmed Helmy, Ramesh Govindan
2007 Ad hoc networks  
In this work we model and analyze the correctness of geographic routing under non-ideal realistic conditions.  ...  In addition, we analyze the effect of location errors in more detail to identify the possible protocol error scenarios and their conditions.  ...  Acknowledgments Seada and Helmy were partially supported by grants from NSF CAREER, Intel, and Pratt&Whitney. We would like to thank the anonymous reviewers for their feedback.  ... 
doi:10.1016/j.adhoc.2007.02.008 fatcat:fcd4656z6fdjdhqvkf35jkchvu

A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management

Bingxia Yuan, Aruna K K
2022 Wireless Communications and Mobile Computing  
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this  ...  For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining  ...  all nodes know their geographic location information and are able to analyze location data of other nodes.  ... 
doi:10.1155/2022/5955543 fatcat:v7yextergjd7jfn2s6xgeliqt4

Securing location aware services over VANET using geographical secure path routing

Vivek Pathak, Danfeng Yao, Liviu Iftode
2008 2008 IEEE International Conference on Vehicular Electronics and Safety  
Geographic locations of anonymous nodes are authenticated in order to provide location authentication and location privacy simultaneously.  ...  We propose to secure location aware services over vehicular ad-hoc networks (VANET) with our geographical secure path routing protocol (GSPR).  ...  PERFORMANCE ANALYSIS Performance of geographic secure path routing is analyzed by the NS2 network simulator [5] .  ... 
doi:10.1109/icves.2008.4640905 dblp:conf/icves/PathakYI08 fatcat:ajxasmnjhngc5dr6fw5rqunuja

On the effect of localization errors on geographic face routing in sensor networks

Karim Seada, Ahmed Helmy, Ramesh Govindan
2004 Proceedings of the third international symposium on Information processing in sensor networks - IPSN'04  
In this work we provide a detailed analysis of the effects of location errors on the correctness and performance of geographic routing in static sensor networks.  ...  The effects of location errors on geographic routing have not been studied before.  ...  ACKNOWLEDGMENTS Seada and Helmy were partially supported by grants from NSF CAREER, Intel, and Pratt&Whitney. We would like to thank Brad Karp and the anonymous reviewers for their useful feedback.  ... 
doi:10.1145/984622.984633 dblp:conf/ipsn/SeadaHG04 fatcat:kmyrvdnhxrautl3fwh2saqswpy

Location verification and trust management for resilient geographic routing

Ke Liu, Nael Abu-Ghazaleh, Kyoung-Don Kang
2007 Journal of Parallel and Distributed Computing  
Although GR is widely used in ad hoc and wireless sensor networks, its security has rarely been studied; there are a number of attacks that are possible on GR.  ...  In this paper, we consider the security of geographic routing (GR) protocols. In GR, neighbors exchange their location information.  ...  Thus, in this section, we analyze the relationship between δt and ∆T and the impact.  ... 
doi:10.1016/j.jpdc.2006.08.001 fatcat:javyum2gm5fi3gkaqmdtoibcg4

Towards resilient geographic routing in WSNs

Nael Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
2005 Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05  
In this paper, we consider the security of geographical forwarding (GF) -a class of algorithms widely used in ad hoc and sensor networks.  ...  The second contribution of the paper is to propose approaches for route authentication and trust-based route selection to defeat attacks on the network.  ...  While a number of studies consider security in multihop wireless networks such as WSNs and Ad hoc networks, they have mostly focused on conventional routing protocols.  ... 
doi:10.1145/1089761.1089774 dblp:conf/mswim/Abu-GhazalehKL05 fatcat:okg5ztl3krgprdalnpfvtaex6m

Impact of Random Mobility Models on OLSR

Vinayagam P.S
2014 International Journal of Wireless & Mobile Networks  
Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol.  ...  In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability.  ...  The performance of DSR and AODV with reference to varying network load, mobility and network size has been analyzed in [5] .  ... 
doi:10.5121/ijwmn.2014.6607 fatcat:rluxljoytbbt3e6ubwdmenybky

Location errors in wireless embedded sensor networks

Sasha Slijepcevic, Seapahn Megerian, Miodrag Potkonjak
2002 ACM SIGMOBILE Mobile Computing and Communications Review  
First, we model the error in input parameters of the location discovery process.  ...  Then, we study the impact of errors on three selected applications: exposure, best-and worst-case coverage, and shortest path routing.  ...  Furthermore, we analyzed the impact of initial error measurements on the location discovery procedure and the effects on three fundamental yet distinct applications: exposure, worst-and best-case coverage  ... 
doi:10.1145/581291.581301 fatcat:zbdh5mlaanf3bpisoaz2gkloaa

Analysis of the effects of mobility on the grid location service in ad hoc networks

C. Shete, S. Sawhney, S. Hervvadkar, V. Mehandru, A. Helmy
2004 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)  
GLS can be used as a location service in a geographic-based routing protocol to considerably improve the scaling properties of mobile networks.  ...  We attribute this significant variance of performance to the interaction between the dynamics of the network connectivity and the protocol mechanisms, and analyze such interaction in our study.  ...  and overall impact on the routing protocol.  ... 
doi:10.1109/icc.2004.1313367 dblp:conf/icc/SheteSHMH04 fatcat:lyguyjiqgrdqlfgojtzfmj7ubi

VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks

Yang Qin, Dijiang Huang, Xinwen Zhang
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
Selected paths of the routing are globally optimized in terms of message delivery ratio by respecting the constraints of end-to-end delay and communication cost.  ...  its future locations by generating way point messages, which describe the trajectory of the vehicles movement.  ...  Some of the work is also partially sponsored by NSF CNS-1029546 and DUE-0942453. The research outcomes do not necessarily reect the views of sponsors.  ... 
doi:10.1109/trustcom.2012.16 dblp:conf/trustcom/QinHZ12a fatcat:p7cya7uhebdpbe5h57ep472ryq

COGNITIVE AGENTS BASED SECURITY SCHEME TO HANDLE ROUTING LOOPS IN WIRELESS NETWORKS

Kumar
2014 Journal of Computer Science  
Routers in wireless networks are often prone to variety of attacks like a man in the middle, distributed denial of service, smurf, ping of death, routing loops, counting to infinity, .  ...  Among all these attacks routing loop is the most common one and it have a harmful effect on network performance.  ...  Network Model Consider a wireless networking environment i.e., comprised of N nodes (connections) distributed over a wide geographical area (Fig. 4) .  ... 
doi:10.3844/jcssp.2014.1712.1724 fatcat:bp2yhkxowja7hhlxqjqcnyz77i

On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks

Edith H. Ngai, Jiangchuan Liu, Michael Lyu
2006 2006 IEEE International Conference on Communications  
The algorithm first finds a list of suspected nodes, and then effectively identifies the intruder in the list through a network flow graph.  ...  A sinkhole attack forms a serious threat to sensor networks, particularly considering that such networks are often deployed in open areas and of weak computation and battery power.  ...  We focus on a general many-to-one communication model, where the routes are established based on the reception of route advertisements.  ... 
doi:10.1109/icc.2006.255595 dblp:conf/icc/NgaiLL06 fatcat:7u72ntopqzcuvnwdyctmj4kucu
« Previous Showing results 1 — 15 out of 3,173 results