1,069 research outputs found

    Trusted and secure clustering in mobile pervasive environment

    Get PDF

    Socially-aware congestion control in ad-hoc networks: Current status and the way forward

    Get PDF
    Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in whicha user’s social properties (such as the social connections and communications metadata as wellas application data) are leveraged for offering enhanced services in a distributed infrastructurelessenvironments. However, the wireless medium, due to limited bandwidth, can easily suffer from theproblem of congestion when social metadata and application data are exchanged among nodes—a problem that is compounded by the fact that some nodes may act selfishly and not share itsresources. While a number of congestion control schemes have been proposed for the traditional ad-hoc networks, there has been limited focus on incorporating social awareness into congestion controlschemes. We revisit the existing traditional ad-hoc congestion control and data distribution protocolsand motivate the need for embedding social awareness into these protocols to improve performance.We report that although some work is available in opportunistic network that uses socially-awaretechniques to control the congestion issue, this area is largely unexplored and warrants more researchattention. In this regards, we highlight the current research progress and identify multiple futuredirections of research

    An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm

    Get PDF
    Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for boosting the performance of WSNs and QoS metrics. In this paper, an optimization approach using Particle Swarm Optimization (PSO) algorithm is proposed to develop a multipath protocol, called a Particle Swarm Optimization Routing Protocol (MPSORP). The MPSORP is used for WSN-based IoT applications with a large volume of traffic loads and unfairness in network flow. For evaluating the developed protocol, an experiment is conducted using NS-2 simulator with different configurations and parameters. Furthermore, the performance of MPSORP is compared with AODV and DSDV routing protocols. The experimental results of this comparison demonstrated that the proposed approach achieves several advantages such as saving energy, low end-to-end delay, high packet delivery ratio, high throughput, and low normalization load.publishedVersio

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks

    Get PDF
    Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. One of the goals in the research is to find a method to prevent black hole attacks without decreasing network throughput or increasing routing overhead. The routing mechanism in define uses route requests (RREQs; for discovering routes) and route replies (RREPs; for receiving paths). However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. This method avoids dependency exclusively on the hop counts and destination sequence numbers (DSNs) that are exploited by malicious nodes in the standard AODV protocol. The experiment by performance metrics End-to-End delay and packet delivery ratio are compared in order to determine the best effort traffic. The results showed the PGO-DLLA improvement of the shortest and secure routing from black hole attack in MANET. In addition, the results indicate better performance than the related works algorithm with respect to all metrics excluding throughput which AntNet is best in routing when the pause time be more than 40 seconds. PGODLLA is able to improve the route discovery against the black hole attacks in AODV. Experiments in this thesis have shown that PGO-DLLA is able to reduce the normalized routing load, end-to-end delay, and packet loss and has a good throughput and packet delivery ratio when compared with the standard AODV protocol, BAODV protocol, and the current related protocols that enhance the routing security of the AODV protocols

    Can nature help in the routing problem?

    Get PDF
    To communicate through Internet, we need some intermediate nodes to route information from one extreme to another. These nodes use a routing protocol based on algorithms. Today there are multitude of routing protocols that work quite well in large networks without much changes. Internet is becoming a site with an increasing number of heterogenic changes. We need a protocol to meet these needs. The idea is to develop algorithms based on swarm intelligence. There are several studies about trying to emulate the animal swarms. This algorithms use cooperating individuals through self-organization (with no central control which operates on the swarm members).For this scenario I have ruled out the bees based algorithms that are designed to operate in three dimensions, and I have focused on algorithms based on Ant Colony Optimization (ACO). To reach a conclusion on the effectiveness of these new algorithms, I have relied on a protocol version by J. NetAnts Baras and I have compared it with a traditional protocol such as Ad hoc On-Demand Distance Vector (AODV). To make the implementation and the comparison between the protocols I have used the network simulator NS-2 version 2.34 running under Linux. These two protocols have been tested in very different scenarios to see the limitations of each algorithm and to see which one suits better in each scenario. After the simulations we can conclude that the algorithm NetAnt is not optimal as AODV to operate in Ad-hoc networks. The limitations would be given by the high number of packages that need to be sent to build a path. These packets are sent proactively to all nodes causing congestion and filling the buffers of the nodes. Loops have also been observed to fail to find the correct route. Therefore, the algorithm NetAnt works but is not the most optimal for Ad-hoc network
    corecore