5,843 Hits in 9.9 sec

Special Issue of Journal of Statistical Physics Devoted to Complex Networks

Diego Garlaschelli, Remco van der Hofstad, Frank den Hollander, Michel Mandjes
2018 Journal of statistical physics  
In such models, nodes (d = 0) and edges (d = 1) generalize to triangles (d = 2), tetrahedra (d = 3), and so on.  ...  of d +1 nodes.  ... 
doi:10.1007/s10955-018-2166-y fatcat:nsqkugzycbbr5prm3fknmvd5b4

Neighbourtables – A Cross-layer Solution for Wireless CiNet Network Analysis and Diagnostics

2012 Sensors & Transducers  
The information stored in neighbourtables can be used to monitor network behavior and to improve networks' packet routing and fault recognizing for the nodes, in both, nodes' and centralized applications  ...  The diagnosis of the network's operation can be done using the information gathered by the sensor nodes in the network.  ...  Acknowledgements The work presented in this paper was supported by LuTek-project, funded by the Regional Council of Central Ostrobothnia and European Union structural funds.  ... 
doaj:1b2594cd65264cdbadcdb72d17b045a5 fatcat:po7go35ls5cjfgj64sweurjd2e

Different Solutions to Routing Attacks in MANET

UWB MANET nodes are dynamic and every node acts like a router, due to changing topology UWB MANET is vulnerable to malicious attack.  ...  Routing attack becomes one of the special problem in UWB MANET several routing protocol AODV, AOMDV, CLSAODV are in existence.  ...  D. Spoofing Malicious node wrongly gives its identity so sender will change the topology. E.  ... 
doi:10.35940/ijitee.l3565.1081219 fatcat:smq3u5jy2jbzppzm34mcddpcka

A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network

Priya Maidamwar
2012 International Journal on AdHoc Networking Systems  
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority i.e.  ...  Base station are capable of exhibiting interesting applications due to their ability to be deployed ubiquitously in hostile & pervasive environments.  ...  ACKNOWLEDGEMENTS My sincere thanks to my honorable guide Prof. Niketa A.Chavhan and others who have contributed towards the preparation of the paper.  ... 
doi:10.5121/ijans.2012.2404 fatcat:tsvw2wg2rrbw7icsixta42q7kq

Code-Folding Scheme for Energy Efficient Cooperative Communications in Wireless Sensor Networks

Zhenbang WANG, Zhenyong WANG, Xuemai GU
2013 Sensors & Transducers  
By matching dynamic network topologies with distributed graph network coding, a Code-Folding scheme is proposed to decrease the number of required cooperative terminals in ANCC.  ...  In order to provide high-efficiency monitoring for utilities consumption, a novel cooperative communication is investigated for Wireless Sensor Networks to overcome channel imperfections in an energy-efficient  ...  In a star-topology EECC networks, all sensor nodes are located close to each other and the coordinator is at a distance from the sensor nodes.  ... 
doaj:ac9c4ce44166448aac1d7dfbe5e948a3 fatcat:7ukeyoahgbdvfpxqry6mltcrzu

A Novel Method for Secure RPL for Resource Based attacks in Internet of Things

This paper introduces an allied nodes follow up technique where some allied nodes are staked in the DODAG topology in order to detect the resource based attacks in RPL like version number, neighbour, worst  ...  node in order to eradicate it from DODAG.  ...  number which is associated to topology Less packet delivery ratio, disrupt the entire topology Neighbour attack DIO message will be forwarded to neighbour by the attacker without updating Route disruption  ... 
doi:10.35940/ijitee.b9074.129219 fatcat:4sfyhevczbg3tfonwuhty5tyre

Routing Algorithm To Eliminate Stale Routes (RAESR) In Mobile Ad Hoc Networks

In order to overcome these issues, the routing algorithm to eliminate stare routed in routing cache.  ...  Mobile nodes behave as a host as well as router. As nodes in MANET posse's mobility in traits frequently leads to irregular link between the nodes.  ...  to 1 neighbor) V 4 ->V S , V 7 (Forward to 2 neighbour) V 5 -> V 8 (Forward to 1 neighbour) V 6 ->V 9 ,V D (Forward to 2 neighbour) Next forwarding node may be V 4 (or) V 6 .  ... 
doi:10.35940/ijitee.l3534.1081219 fatcat:sun424z2zvah5fsv4eqvhwmkai

Review and Analysis of the Security Issues in MANET

Preeti Gulia, Sumita Sihag
2013 International Journal of Computer Applications  
MANET is a unstructured network in which nodes are mobile. This mobility may leads to insecurity in MANET. BFOA (Bacterial foraging optimization algorithm) is a Bio-inspired Algorithm.  ...  This paper also reviews Bacteria foraging optimization algorithm and how it can be applied to secure the MANET.  ...  In the former case, nodes issue digital signatures associated with the routing messages.  ... 
doi:10.5120/13131-0498 fatcat:tcnqqpe2nnamnpyyxe2coukhdy

Vol. 2 n. 3 | 2017 | SPECIAL ISSUE | FULL ISSUE

Luisa Bravo
2017 The Journal of Public Space  
I would also like to show my gratitude to the anonymous reviewers for their precious insights.  ...  I want also to acknowledge the invaluable contribution of Jiao Hong, Melanie Milicic, Angelo Bueno and Tanyalak Chalermtip for assistance with the analytical and documental work.  ...  Rhodes, D. Sharp, N.  ... 
doi:10.5204/jps.v2i3.128 fatcat:wjkhilcu6vgvzayoauzszwuy3u

Wireless Sensor and Actuator Networks (WSANs): Insights and Scope of Research

This paper gives an insight into the scope of ongoing and future research in the aspect of preserving temporal relationship among the events, restoring the connectivity in case of node failures, need for  ...  the state of the field of interest by performing the suitable action in it.  ...  To minimize the distance travelled, this algorithm chooses the backup node that results in moving the least distance for restoration of the connectivity.  ... 
doi:10.35940/ijitee.g5998.0981119 fatcat:kxhproawurelzmibh4255zmhom

A Trust based Multipath Routing for Black Hole Attacks with Group Search Optimization Routing

For this, the energy is an important issue that has to be addressed since the ad-hoc network nodes have a limited battery power.  ...  A MANET black-hole attack will occur owing to the malicious nodes attracting data packets by means of a false advertisement of a fresh route to its destination.  ...  For the k-th iteration, a random head angle i  in (9) ; and a random distance as in (12) . 1 max i l a rl  (12) Then it is moved to its new point as in (13) :   11 k k k k i i i i X X l D    ... 
doi:10.35940/ijitee.k2483.0981119 fatcat:avl47ok3g5d2rkqkoo37khzdpi

Multi-Route AODV Protocol in Association with Overhearing Concept for Routes Selection Based on Unified Norm Composed of the Steadiness, Traffic Load and Energy Coefficients for Nodes

leading to elongate life time of nodes.  ...  Outcome of simulation proved that functioning of proposed scheme outdo the original AODV with regard to: ratio of successfully delivered packets, retard time, routing cost and spent energy of nodes.  ...  Where, the constancy information could be collected via computing prorated speed and relative distance of node regarding to every neighbour node over regular periods.  ... 
doi:10.35940/ijitee.c9028.019320 fatcat:f67yyfuyg5hkjkcpnjolkovt4y

Improved Multiple Gateway Node Based Routing Architecture for Heterogeneous Wireless Sensor Network

In modern era, with technologies shifting from wired to wireless technologies, Wireless Sensor Networks (WSNs) play an essential role in advancement of technology.  ...  IMRA surpasses other protocols by increasing Stability Period, Half Node Dead and Network lifetime by 58.18%, 55.94% and 52.96% respectively as compared to traditional MRA and by 156.99%, 86.2% and 90.12%  ...  energy conservation [8] , heterogeneous network is preferred. d) Topological changes are observed more frequently in case of WSN as compared to the ad-hoc networking.  ... 
doi:10.35940/ijitee.j9387.0881019 fatcat:llvjse7ak5a5xbfrb7jj5z4soi

Assessment of Software Modeling Techniques for Wireless Sensor Networks: A Survey

John Khalil Jacoub, Ramiro Liscano, Jeremy S. Bradbury
2012 Sensors & Transducers  
Wireless Sensor Networks (WSNs) monitor environment phenomena and in some cases react in response to the observed phenomena.  ...  One solution to the WSN design challenges is system modeling.  ...  Special Issue,February 2012, pp. 18-46 active components (the CPU and the timers).  ... 
doaj:56508ac93e0841d38b9c1d1780724796 fatcat:jmd7mqpcpjdrvm7ooriearxc6q

Method & Implementation of Fault Detection & Prevention Attack in WSN

All recreations are done in simulation tool. The proposed system is executed with MATLAB. The work has increased the maximum flow of information to 30% with increase in degree of nodes  ...  In WSNs, a major problem is the assaults on nodes or more sinks. In any case, this information rate is obliged by the accessible vitality at every hub just as connection limit.  ...  The primary issue was that the traffic overhead turns out to be high. In this, a disseminated multipath shortcoming tolerant directing plan had created to handle these issues in WSN.  ... 
doi:10.35940/ijitee.i1126.0789s19 fatcat:k4y6nd3r2bhrhm6slaynrxp3nq
« Previous Showing results 1 — 15 out of 5,843 results