14 research outputs found

    An Analytical Expression for k-connectivity of Wireless Ad Hoc Networks

    Get PDF
    Over the last few years coverage and connectivity of wireless ad hoc networks have fascinated considerable attention. The presented paper analyses and investigates the issues of k-connectivity probability and its robustness in wireless ad hoc-network while considering fading techniques like lognormal fading, Rayleigh fading, and nakagami fading in the ad hoc communication environment, by means of shadowing and fading phenomenon. In case of k-connected wireless sensor network (WSNs), this technique permits the routing of data packets or messages via individual (one or more) of minimum k node disjoint communication paths, but the other remaining paths can also be used. The major contribution of the paper is mathematical expressions for k-connectivity probability

    On the minimum number of neighbours for good routing performance in MANETs

    No full text
    In a mobile ad hoc network, where nodes are deployed without any wired infrastructure and communicate via multihop wireless links, the network topology is based on the nodes’ locations and transmission ranges. The nodes communicate through wireless links, with each node acting as a relay when necessary to allow multihop communications. The network topology can have a major impact on network performance. We consider the impact of number and placement of neighbours on mobile network performance. Specifically, we consider how neighbour node placement affects the network overhead and routing delay. We develop an analytical model, verified by simulations, which shows widely varying performance depending on source node speed and, to a lesser extent, number of neighbour nodes

    Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

    Full text link
    In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.Comment: Full version of a paper published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) 201
    corecore