A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Modeling and analyzing the impact of location inconsistencies on geographic routing in wireless networks
2004
ACM SIGMOBILE Mobile Computing and Communications Review
In this paper, we analyze the impact of location inaccuracy on geographic routing. ...
A Recently, geographic routing in wireless networks has gained attention due to several advantages of location information. ...
In this paper, we investigate the impact of location inaccuracy on geographic routing. ...
doi:10.1145/980159.980168
fatcat:67fc4ahrtvdmzl4ifth732alzu
Impact of location inconsistencies on geographic routing in wireless networks
2003
Proceedings of the 6th international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWIM '03
In this paper, we analyze the impact of location inaccuracy on geographic routing. ...
Our study shows the significant impact of location inaccuracy on the performance of geographic routing in terms of packet drops, non-optimal paths and routing loops. ...
In geographic routing, the routing decision at each node is based on the destination's location contained in the packet header and the location of the forwarding node's neighbors. ...
doi:10.1145/940991.941013
dblp:conf/mswim/KimLH03
fatcat:snj445dww5hs5ikbhm53difoku
Impact of location inconsistencies on geographic routing in wireless networks
2003
Proceedings of the 8th international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWIM '03
In this paper, we analyze the impact of location inaccuracy on geographic routing. ...
Our study shows the significant impact of location inaccuracy on the performance of geographic routing in terms of packet drops, non-optimal paths and routing loops. ...
In geographic routing, the routing decision at each node is based on the destination's location contained in the packet header and the location of the forwarding node's neighbors. ...
doi:10.1145/941012.941013
fatcat:nsh6ubrfwrchnbof73kqleripm
Modeling and analyzing the correctness of geographic face routing under realistic conditions
2007
Ad hoc networks
In this work we model and analyze the correctness of geographic routing under non-ideal realistic conditions. ...
In addition, we analyze the effect of location errors in more detail to identify the possible protocol error scenarios and their conditions. ...
Acknowledgments Seada and Helmy were partially supported by grants from NSF CAREER, Intel, and Pratt&Whitney. We would like to thank the anonymous reviewers for their feedback. ...
doi:10.1016/j.adhoc.2007.02.008
fatcat:fcd4656z6fdjdhqvkf35jkchvu
A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management
2022
Wireless Communications and Mobile Computing
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this ...
For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining ...
all nodes know their geographic location information and are able to analyze location data of other nodes. ...
doi:10.1155/2022/5955543
fatcat:v7yextergjd7jfn2s6xgeliqt4
Securing location aware services over VANET using geographical secure path routing
2008
2008 IEEE International Conference on Vehicular Electronics and Safety
Geographic locations of anonymous nodes are authenticated in order to provide location authentication and location privacy simultaneously. ...
We propose to secure location aware services over vehicular ad-hoc networks (VANET) with our geographical secure path routing protocol (GSPR). ...
PERFORMANCE ANALYSIS Performance of geographic secure path routing is analyzed by the NS2 network simulator [5] . ...
doi:10.1109/icves.2008.4640905
dblp:conf/icves/PathakYI08
fatcat:ajxasmnjhngc5dr6fw5rqunuja
On the effect of localization errors on geographic face routing in sensor networks
2004
Proceedings of the third international symposium on Information processing in sensor networks - IPSN'04
In this work we provide a detailed analysis of the effects of location errors on the correctness and performance of geographic routing in static sensor networks. ...
The effects of location errors on geographic routing have not been studied before. ...
ACKNOWLEDGMENTS Seada and Helmy were partially supported by grants from NSF CAREER, Intel, and Pratt&Whitney. We would like to thank Brad Karp and the anonymous reviewers for their useful feedback. ...
doi:10.1145/984622.984633
dblp:conf/ipsn/SeadaHG04
fatcat:kmyrvdnhxrautl3fwh2saqswpy
Location verification and trust management for resilient geographic routing
2007
Journal of Parallel and Distributed Computing
Although GR is widely used in ad hoc and wireless sensor networks, its security has rarely been studied; there are a number of attacks that are possible on GR. ...
In this paper, we consider the security of geographic routing (GR) protocols. In GR, neighbors exchange their location information. ...
Thus, in this section, we analyze the relationship between δt and ∆T and the impact. ...
doi:10.1016/j.jpdc.2006.08.001
fatcat:javyum2gm5fi3gkaqmdtoibcg4
Towards resilient geographic routing in WSNs
2005
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05
In this paper, we consider the security of geographical forwarding (GF) -a class of algorithms widely used in ad hoc and sensor networks. ...
The second contribution of the paper is to propose approaches for route authentication and trust-based route selection to defeat attacks on the network. ...
While a number of studies consider security in multihop wireless networks such as WSNs and Ad hoc networks, they have mostly focused on conventional routing protocols. ...
doi:10.1145/1089761.1089774
dblp:conf/mswim/Abu-GhazalehKL05
fatcat:okg5ztl3krgprdalnpfvtaex6m
Impact of Random Mobility Models on OLSR
2014
International Journal of Wireless & Mobile Networks
Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. ...
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. ...
The performance of DSR and AODV with reference to varying network load, mobility and network size has been analyzed in [5] . ...
doi:10.5121/ijwmn.2014.6607
fatcat:rluxljoytbbt3e6ubwdmenybky
Location errors in wireless embedded sensor networks
2002
ACM SIGMOBILE Mobile Computing and Communications Review
First, we model the error in input parameters of the location discovery process. ...
Then, we study the impact of errors on three selected applications: exposure, best-and worst-case coverage, and shortest path routing. ...
Furthermore, we analyzed the impact of initial error measurements on the location discovery procedure and the effects on three fundamental yet distinct applications: exposure, worst-and best-case coverage ...
doi:10.1145/581291.581301
fatcat:zbdh5mlaanf3bpisoaz2gkloaa
Analysis of the effects of mobility on the grid location service in ad hoc networks
2004
2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)
GLS can be used as a location service in a geographic-based routing protocol to considerably improve the scaling properties of mobile networks. ...
We attribute this significant variance of performance to the interaction between the dynamics of the network connectivity and the protocol mechanisms, and analyze such interaction in our study. ...
and overall impact on the routing protocol. ...
doi:10.1109/icc.2004.1313367
dblp:conf/icc/SheteSHMH04
fatcat:lyguyjiqgrdqlfgojtzfmj7ubi
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks
2012
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Selected paths of the routing are globally optimized in terms of message delivery ratio by respecting the constraints of end-to-end delay and communication cost. ...
its future locations by generating way point messages, which describe the trajectory of the vehicles movement. ...
Some of the work is also partially sponsored by NSF CNS-1029546 and DUE-0942453. The research outcomes do not necessarily reect the views of sponsors. ...
doi:10.1109/trustcom.2012.16
dblp:conf/trustcom/QinHZ12a
fatcat:p7cya7uhebdpbe5h57ep472ryq
COGNITIVE AGENTS BASED SECURITY SCHEME TO HANDLE ROUTING LOOPS IN WIRELESS NETWORKS
2014
Journal of Computer Science
Routers in wireless networks are often prone to variety of attacks like a man in the middle, distributed denial of service, smurf, ping of death, routing loops, counting to infinity, . ...
Among all these attacks routing loop is the most common one and it have a harmful effect on network performance. ...
Network Model Consider a wireless networking environment i.e., comprised of N nodes (connections) distributed over a wide geographical area (Fig. 4) . ...
doi:10.3844/jcssp.2014.1712.1724
fatcat:bp2yhkxowja7hhlxqjqcnyz77i
On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
2006
2006 IEEE International Conference on Communications
The algorithm first finds a list of suspected nodes, and then effectively identifies the intruder in the list through a network flow graph. ...
A sinkhole attack forms a serious threat to sensor networks, particularly considering that such networks are often deployed in open areas and of weak computation and battery power. ...
We focus on a general many-to-one communication model, where the routes are established based on the reception of route advertisements. ...
doi:10.1109/icc.2006.255595
dblp:conf/icc/NgaiLL06
fatcat:7u72ntopqzcuvnwdyctmj4kucu
« Previous
Showing results 1 — 15 out of 3,173 results