Filters








3,437 Hits in 2.6 sec

Truthful routing for wireless hybrid networks

Yu Wang, Weizhao Wang, T.A. Dahlberg
2005 GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.  
We first present a VCG-based routing protocol for hybrid networks, and show it is truthful but could be expensive.  ...  In this paper, we specifically study how to design routing protocols in wireless hybrid networks with selfish nodes.  ...  The VCG-based routing mechanism is truthful (i.e. each node will declare its true cost) and easy to implement for selfish hybrid networks.  ... 
doi:10.1109/glocom.2005.1578416 dblp:conf/globecom/0003WD05 fatcat:2a4l54vxfbbtph7nzmz3h23u3e

Routing game in hybrid wireless mesh networks with selfish mesh clients

Yu Wang, Teresa A. Dahlberg, Weizhao Wang
2008 International Journal of Autonomous and Adaptive Communications Systems  
We first show that the totalpayment of the classical Vickrey-Clarke-Groves (VCG)-based routing protocol could be very expensive and inefficient for hybrid mesh networks.  ...  Wireless mesh networks (WMNs) consist of mesh routers and mesh clients where fixed mesh routers form the multi-hop backbone of the network.  ...  Conclusions In this article, we studied the routing game in hybrid WMNs with selfish mesh clients.  ... 
doi:10.1504/ijaacs.2008.021490 fatcat:xw2omb7tojbhngrqkjmcey4ovm

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION

Snigdhamayee Biswal, A.Agal Veena, Shilpi Kumar, G. Michael
2015 International Journal of Computer Applications Technology and Research  
dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time  ...  energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for  ...  IMPLEMENTATION IN ACTION CONCLUSION The proposed hierarchical dynamic trust management protocol for cluster-based wireless sensor networks, considering two aspects of truthfulness, namely, social truth  ... 
doi:10.7753/ijcatr0404.1009 fatcat:pbfytuqf4bbhppx5mfgtxmlvc4

Incentive Mechanism Design for Selfish Hybrid Wireless Relay Networks

Hung-yu Wei, Richard D. Gitlin
2005 Journal on spesial topics in mobile networks and applications  
Keywords: incentive mechanism design, hybrid multihop wireless relay networks, game theory, cooperation in mobile ad hoc networks  ...  The relay nodes in the two-hop-relay system can be wireless relay routers deployed by wireless service providers, or dual-mode users who voluntarily relay traffic for other users.  ...  Introduction Hybrid wireless relay networks are emerging wireless systems that integrate conventional cellular network paradigm with the emerging wireless relay network paradigm.  ... 
doi:10.1007/s11036-005-4449-1 fatcat:aj7id6flynflxg2ujzifumc2cm

Hybrid Topology Control Based on Clock Synchronization in Wireless Sensor Network

Navneet Kaur, Rajan Kumar
2016 Indian Journal of Science and Technology  
Objectives: The main objective of this work is to lessen energy utilization of Wireless Sensor Network.  ...  The Radio Frequency Identification is the protocol of Wireless Sensor Network which provides channel access using TDMA protocol.  ...  Hybrid Topology Control based on Clock Synchronization in Wireless Sensor Network is by deploying redundant nodes 3 . • Scalability: Number of nodes in real life is for the most part application subordinate  ... 
doi:10.17485/ijst/2016/v9i31/95334 fatcat:sacxtba6cfdfrap3ugzfshtpje

Wireless Machine-to-Machine Networks

Jianhua He, Yan Zhang, Zhong Fan, Hsiao-Hwa Chen, Lin Bai
2012 International Journal of Distributed Sensor Networks  
Acknowledgments The Guest Editors would like to thank all the authors for their contributions to this special issue.  ...  Our special thanks go to all the reviewers for their hard work in providing timely responses and constructive comments.  ...  In the paper entitled "A vector algebraic algorithm for coverage compensation in hybrid wireless sensor networks" by N.-N.  ... 
doi:10.1155/2012/535927 fatcat:jgjhyed65rbhfos2mf7jdntoye

A Survey: Security in Patient Data Communication using Cryptographic Algorithm

Prof. Dr. Kawitkar R. S., Nikita S. Karekar
2017 IJARCCE  
Wireless medical sensor networks are more vulnerable to many more attacks than the wired networks.  ...  MANET has number of routing protocols Ad hoc On-Demand Distance Vector (AODV) routing protocol is one of them which is the most suitable protocol for healthcare application purpose.  ...  The Ad hoc On-Demand Distance Vector (AODV) routing protocol is derived from the Destination-Sequenced Distance Vector (DSDV) routing protocol for wireless Ad hoc networks.  ... 
doi:10.17148/ijarcce.2017.6649 fatcat:gvdwm6cpf5dydg65zqio7lm62a

A study on reliability of Manets using trust management system

G Bindu, R A. Karthiga, S Sridevi
2018 International Journal of Engineering & Technology  
To overcome this, few algorithms are developed for Trust management. In this paper we discussed the different types of MANET, Applications, protocols and Trust management schemes.  ...  Mobile Adhoc Networks is a network where nodes keep moving geographically and doesn't have an infrastructure.  ...  Advanced Hybrid Intrusion Detection System (AHIDS) Rupinder Singh Jatinder Singh [17] proposed Advanced Hybrid Intrusion Detection System (AHIDS) is an algorithm which is very advantageous for WSNs.  ... 
doi:10.14419/ijet.v7i2.21.12452 fatcat:ol77ig44yjgpzkpz3a4ifuuycm

A Unified Metric for Correlated Diversity in Wireless Networks

Shuai Wang, Anas Basalamah, Song Min Kim, Guang Tan, Yunhuai Liu, Tian He
2016 IEEE Transactions on Wireless Communications  
Specifically, this work focuses on a unified transmission cost metric for diversity based routing schemes including opportunistic routing, network coding, and hybrid routing.  ...  Since wireless link correlation affects a wide range of protocol designs, it is essential to quantify the impact generically.  ...  We provide the first extensive study to build a unified metric for diversity based routing schemes, including opportunistic routing, network coding, and hybrid routing, covering both unicast and broadcast  ... 
doi:10.1109/twc.2016.2581821 fatcat:zamfv4r6rzg3ni7kup7b6u4vee

Wireless Machine-to-Machine Networks 2013

Jianhua He, Yan Zhang, Zhong Fan, Hsiao-Hwa Chen, Lin Bai
2014 International Journal of Distributed Sensor Networks  
Due to the large diversities of the M2M applications (e.g., smart grids, smart home, wireless sensor networks, vehicle ad hoc networks, etc.) and M2M devices, various wireless network technologies (e.g  ...  It holds huge potential for applications in a wide range of industries.  ...  Acknowledgments The Guest Editors would like to thank all the authors for their contributions to this special issue.  ... 
doi:10.1155/2014/857139 fatcat:eyv46bo6mrduzowjrpja33wr2q

IEEE Access Special Section Editorial: Survivability Strategies for Emerging Wireless Networks

Muhammad Imran, Joel J. P. C. Rodrigues, Ahmed E. Kamal, Ejaz Ahmed, Feng Xia, Irfan Awan
2020 IEEE Access  
Song et al., in ''Localized fault tolerant and connectivity restoration algorithms in mobile wireless ad hoc network,'' proposed three hybrid recovering algorithms for dynamic networks, namely cascade  ...  network routing strategies in green Internet of Things.''  ... 
doi:10.1109/access.2020.3042585 fatcat:wjd7kkdtszcj3lwnotjxgdae5m

Intrusion Detection System and Neutrosophic Theory for MANETs: A Comparative Study

Haitham ElWahsh, Mona Gamal, A. A. Salama, I.M. El-Henawy
2018 Figshare  
Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organized in arbitraryand temporary network topologies without communication infrastructure.  ...  This network may change quickly and unforeseeable.The unique characteristics of MANET give an adversary the opportunity to launch numerous attacks against ad-hoc networks.  ...  The use of security technologies built for wired networks to protect wireless networks isn't direct also not easy to perform.  ... 
doi:10.6084/m9.figshare.7442162 fatcat:q72rprkyf5b5laqyawfeox3l6a

Guest Editorial - Special Issue on Internet of Things (IoT): Architecture, Protocols and Services

Chonggang Wang, Mahmoud Daneshmand, Mischa Dohler, Xufei Mao, Rose Qingyang Hu, Honggang Wang
2013 IEEE Sensors Journal  
He is on the editorial board for several journals, including the IEEE Communications Magazine, the IEEE Wireless Communications Magazine, and the IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT.  ...  He has organized and is coorganizing several special issues respectively for the IEEE SENSORS JOURNAL, the IEEE JSAC, the IEEE Network Magazine, the IEEE Communications Magazine, and the IEEE Communications  ...  in multi-hop wireless sensor networks with collection tree protocol as the routing strategy.  ... 
doi:10.1109/jsen.2013.2274906 fatcat:lkyji65yjfhptajet6jvhuovga

A Review On Recent Routing Protocols In Field Of Wireless Communication

Ritu Ranii
2017 International Journal for Research in Applied Science and Engineering Technology  
But as the time passes, so many issues took place which becomes a hindrance for achieving efficient routing in WSN. This study provides an overview to the concept of routing.  ...  The type of routing is also discussed under this in section 1. Section 2 represents the various issues and challenges that falls on the way to achieve effective route for data transfer.  ...  Chou (2005) , [1] proposed straight line routing algorithm i.e. SLR that is being used in wireless sensor network.  ... 
doi:10.22214/ijraset.2017.4219 fatcat:dodit4cfqjdjbpdbrrqvtshr6i

Routing and Scheduling Issues in Vehicular Ad-hoc Networks

2019 International journal of recent technology and engineering  
We present a comprehensive study on routing protocol in VANETs like position-based routing, Geo-Cast based routing, etc. and scheduling in VANETs like deadline-based scheduling, hybrid-based scheduling  ...  VANETs permit intelligent vehicles to generate their own organized network without the need of the stable network.  ...  Also, the authors would like to thank Dr Mohammed Riyaz from school of ECE, REVA University for their continuous support and encouragement.  ... 
doi:10.35940/ijrte.c5168.098319 fatcat:wpnbsx5b7zbpla6ta7jcs3y2sa
« Previous Showing results 1 — 15 out of 3,437 results