A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Special Issue of Journal of Statistical Physics Devoted to Complex Networks
2018
Journal of statistical physics
In such models, nodes (d = 0) and edges (d = 1) generalize to triangles (d = 2), tetrahedra (d = 3), and so on. ...
of d +1 nodes. ...
doi:10.1007/s10955-018-2166-y
fatcat:nsqkugzycbbr5prm3fknmvd5b4
Neighbourtables – A Cross-layer Solution for Wireless CiNet Network Analysis and Diagnostics
2012
Sensors & Transducers
The information stored in neighbourtables can be used to monitor network behavior and to improve networks' packet routing and fault recognizing for the nodes, in both, nodes' and centralized applications ...
The diagnosis of the network's operation can be done using the information gathered by the sensor nodes in the network. ...
Acknowledgements The work presented in this paper was supported by LuTek-project, funded by the Regional Council of Central Ostrobothnia and European Union structural funds. ...
doaj:1b2594cd65264cdbadcdb72d17b045a5
fatcat:po7go35ls5cjfgj64sweurjd2e
Different Solutions to Routing Attacks in MANET
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
UWB MANET nodes are dynamic and every node acts like a router, due to changing topology UWB MANET is vulnerable to malicious attack. ...
Routing attack becomes one of the special problem in UWB MANET several routing protocol AODV, AOMDV, CLSAODV are in existence. ...
D. Spoofing Malicious node wrongly gives its identity so sender will change the topology. E. ...
doi:10.35940/ijitee.l3565.1081219
fatcat:smq3u5jy2jbzppzm34mcddpcka
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
2012
International Journal on AdHoc Networking Systems
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority i.e. ...
Base station are capable of exhibiting interesting applications due to their ability to be deployed ubiquitously in hostile & pervasive environments. ...
ACKNOWLEDGEMENTS My sincere thanks to my honorable guide Prof. Niketa A.Chavhan and others who have contributed towards the preparation of the paper. ...
doi:10.5121/ijans.2012.2404
fatcat:tsvw2wg2rrbw7icsixta42q7kq
Code-Folding Scheme for Energy Efficient Cooperative Communications in Wireless Sensor Networks
2013
Sensors & Transducers
By matching dynamic network topologies with distributed graph network coding, a Code-Folding scheme is proposed to decrease the number of required cooperative terminals in ANCC. ...
In order to provide high-efficiency monitoring for utilities consumption, a novel cooperative communication is investigated for Wireless Sensor Networks to overcome channel imperfections in an energy-efficient ...
In a star-topology EECC networks, all sensor nodes are located close to each other and the coordinator is at a distance from the sensor nodes. ...
doaj:ac9c4ce44166448aac1d7dfbe5e948a3
fatcat:7ukeyoahgbdvfpxqry6mltcrzu
A Novel Method for Secure RPL for Resource Based attacks in Internet of Things
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper introduces an allied nodes follow up technique where some allied nodes are staked in the DODAG topology in order to detect the resource based attacks in RPL like version number, neighbour, worst ...
node in order to eradicate it from DODAG. ...
number which is associated to topology
Less packet delivery ratio, disrupt the entire topology Neighbour attack DIO message will be forwarded to neighbour by the attacker without updating
Route disruption ...
doi:10.35940/ijitee.b9074.129219
fatcat:4sfyhevczbg3tfonwuhty5tyre
Routing Algorithm To Eliminate Stale Routes (RAESR) In Mobile Ad Hoc Networks
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In order to overcome these issues, the routing algorithm to eliminate stare routed in routing cache. ...
Mobile nodes behave as a host as well as router. As nodes in MANET posse's mobility in traits frequently leads to irregular link between the nodes. ...
to 1 neighbor) V 4 ->V S , V 7 (Forward to 2 neighbour) V 5 -> V 8 (Forward to 1 neighbour) V 6 ->V 9 ,V D (Forward to 2 neighbour) Next forwarding node may be V 4 (or) V 6 . ...
doi:10.35940/ijitee.l3534.1081219
fatcat:sun424z2zvah5fsv4eqvhwmkai
Review and Analysis of the Security Issues in MANET
2013
International Journal of Computer Applications
MANET is a unstructured network in which nodes are mobile. This mobility may leads to insecurity in MANET. BFOA (Bacterial foraging optimization algorithm) is a Bio-inspired Algorithm. ...
This paper also reviews Bacteria foraging optimization algorithm and how it can be applied to secure the MANET. ...
In the former case, nodes issue digital signatures associated with the routing messages. ...
doi:10.5120/13131-0498
fatcat:tcnqqpe2nnamnpyyxe2coukhdy
Vol. 2 n. 3 | 2017 | SPECIAL ISSUE | FULL ISSUE
2017
The Journal of Public Space
I would also like to show my gratitude to the anonymous reviewers for their precious insights. ...
I want also to acknowledge the invaluable contribution of Jiao Hong, Melanie Milicic, Angelo Bueno and Tanyalak Chalermtip for assistance with the analytical and documental work. ...
Rhodes, D. Sharp, N. ...
doi:10.5204/jps.v2i3.128
fatcat:wjkhilcu6vgvzayoauzszwuy3u
Wireless Sensor and Actuator Networks (WSANs): Insights and Scope of Research
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper gives an insight into the scope of ongoing and future research in the aspect of preserving temporal relationship among the events, restoring the connectivity in case of node failures, need for ...
the state of the field of interest by performing the suitable action in it. ...
To minimize the distance travelled, this algorithm chooses the backup node that results in moving the least distance for restoration of the connectivity. ...
doi:10.35940/ijitee.g5998.0981119
fatcat:kxhproawurelzmibh4255zmhom
A Trust based Multipath Routing for Black Hole Attacks with Group Search Optimization Routing
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
For this, the energy is an important issue that has to be addressed since the ad-hoc network nodes have a limited battery power. ...
A MANET black-hole attack will occur owing to the malicious nodes attracting data packets by means of a false advertisement of a fresh route to its destination. ...
For the k-th iteration, a random head angle i in (9) ; and a random distance as in (12) . 1 max i l a rl (12) Then it is moved to its new point as in (13) : 11 k k k k i i i i X X l D ...
doi:10.35940/ijitee.k2483.0981119
fatcat:avl47ok3g5d2rkqkoo37khzdpi
Multi-Route AODV Protocol in Association with Overhearing Concept for Routes Selection Based on Unified Norm Composed of the Steadiness, Traffic Load and Energy Coefficients for Nodes
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
leading to elongate life time of nodes. ...
Outcome of simulation proved that functioning of proposed scheme outdo the original AODV with regard to: ratio of successfully delivered packets, retard time, routing cost and spent energy of nodes. ...
Where, the constancy information could be collected via computing prorated speed and relative distance of node regarding to every neighbour node over regular periods. ...
doi:10.35940/ijitee.c9028.019320
fatcat:f67yyfuyg5hkjkcpnjolkovt4y
Improved Multiple Gateway Node Based Routing Architecture for Heterogeneous Wireless Sensor Network
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In modern era, with technologies shifting from wired to wireless technologies, Wireless Sensor Networks (WSNs) play an essential role in advancement of technology. ...
IMRA surpasses other protocols by increasing Stability Period, Half Node Dead and Network lifetime by 58.18%, 55.94% and 52.96% respectively as compared to traditional MRA and by 156.99%, 86.2% and 90.12% ...
energy conservation [8] , heterogeneous network is preferred. d) Topological changes are observed more frequently in case of WSN as compared to the ad-hoc networking. ...
doi:10.35940/ijitee.j9387.0881019
fatcat:llvjse7ak5a5xbfrb7jj5z4soi
Assessment of Software Modeling Techniques for Wireless Sensor Networks: A Survey
2012
Sensors & Transducers
Wireless Sensor Networks (WSNs) monitor environment phenomena and in some cases react in response to the observed phenomena. ...
One solution to the WSN design challenges is system modeling. ...
Special Issue,February 2012, pp. 18-46
active components (the CPU and the timers). ...
doaj:56508ac93e0841d38b9c1d1780724796
fatcat:jmd7mqpcpjdrvm7ooriearxc6q
Method & Implementation of Fault Detection & Prevention Attack in WSN
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
All recreations are done in simulation tool. The proposed system is executed with MATLAB. The work has increased the maximum flow of information to 30% with increase in degree of nodes ...
In WSNs, a major problem is the assaults on nodes or more sinks. In any case, this information rate is obliged by the accessible vitality at every hub just as connection limit. ...
The primary issue was that the traffic overhead turns out to be high. In this, a disseminated multipath shortcoming tolerant directing plan had created to handle these issues in WSN. ...
doi:10.35940/ijitee.i1126.0789s19
fatcat:k4y6nd3r2bhrhm6slaynrxp3nq
« Previous
Showing results 1 — 15 out of 5,843 results