3,436 research outputs found

    Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications

    Get PDF
    We propose a vehicle-to-roadside communication protocol based on distributed clustering where a coalitional game approach is used to stimulate the vehicles to join a cluster, and a fuzzy logic algorithm is employed to generate stable clusters by considering multiple metrics of vehicle velocity, moving pattern, and signal qualities between vehicles. A reinforcement learning algorithm with game theory based reward allocation is employed to guide each vehicle to select the route that can maximize the whole network performance. The protocol is integrated with a multi-hop data delivery virtualization scheme that works on the top of the transport layer and provides high performance for multi-hop end-to-end data transmissions. We conduct realistic computer simulations to show the performance advantage of the protocol over other approaches

    Cross-layer Balanced and Reliable Opportunistic Routing Algorithm for Mobile Ad Hoc Networks

    Full text link
    For improving the efficiency and the reliability of the opportunistic routing algorithm, in this paper, we propose the cross-layer and reliable opportunistic routing algorithm (CBRT) for Mobile Ad Hoc Networks, which introduces the improved efficiency fuzzy logic and humoral regulation inspired topology control into the opportunistic routing algorithm. In CBRT, the inputs of the fuzzy logic system are the relative variance (rv) of the metrics rather than the values of the metrics, which reduces the number of fuzzy rules dramatically. Moreover, the number of fuzzy rules does not increase when the number of inputs increases. For reducing the control cost, in CBRT, the node degree in the candidate relays set is a range rather than a constant number. The nodes are divided into different categories based on their node degree in the candidate relays set. The nodes adjust their transmission range based on which categories that they belong to. Additionally, for investigating the effection of the node mobility on routing performance, we propose a link lifetime prediction algorithm which takes both the moving speed and moving direction into account. In CBRT, the source node determines the relaying priorities of the relaying nodes based on their utilities. The relaying node which the utility is large will have high priority to relay the data packet. By these innovations, the network performance in CBRT is much better than that in ExOR, however, the computation complexity is not increased in CBRT.Comment: 14 pages, 17 figures, 31 formulas, IEEE Sensors Journal, 201

    Real valued negative selection for anomaly detection in wireless ad hoc networks

    Get PDF
    Wireless ad hoc network is one of the network technologies that have gained lots of attention from computer scientists for the future telecommunication applications. However it has inherits the major vulnerabilities from its ancestor (i.e., the fixed wired networks) but cannot inherit all the conventional intrusion detection capabilities due to its features and characteristics. Wireless ad hoc network has the potential to become the de facto standard for future wireless networking because of its open medium and dynamic features. Non-infrastructure network such as wireless ad hoc networks are expected to become an important part of 4G architecture in the future. In this paper, we study the use of an Artificial Immune System (AIS) as anomaly detector in a wireless ad hoc network. The main goal of our research is to build a system that can learn and detect new and unknown attacks. To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network

    A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Full text link
    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research

    Intrusion detection and response model for mobile ad hoc networks.

    Get PDF
    This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system parameters of a MANET that are affected by various types of attacks, and continuously monitoring the values of these parameters to detect and respond to attacks. This dissertation explains the design and development of the detection framework and the response framework of the IDRMAN. The main aspects of the detection framework are data mining using CART to identify attack sensitive network parameters from the wealth of raw network data, statistical processing using six sigma to identify the thresholds for the attack sensitive parameters and quantification of the MANET node state through a measure called the Threat Index (TI) using fuzzy logic methodology. The main aspects of the response framework are intruder identification and intruder isolation through response action plans. The effectiveness of the detection and response framework is mathematically analyzed using probability techniques. The detection framework is also evaluated by performance comparison experiments with related models, and through performance evaluation experiments from scalability perspective. Performance metrics used for assessing the detection aspect of the proposed model are detection rate and false positive rate at different node mobility speed. Performance evaluation experiments for scalability are with respect to the size of the MANET, where more and more mobile nodes are added into the MANET at varied mobility speed. The results of both the mathematical analysis and the performance evaluation experiments demonstrate that the IDRMAN model is an effective and viable security model for MANET

    Na neizrazitoj logici zasnovano upravljanje frekvencijom za ODMRP u mobilnim ad hoc mrežama

    Get PDF
    On Demand Multicast Routing Protocol (ODMRP) is a popular solution designed for ad hoc networks with mobile hosts. Its efficiency, simplicity, and robustness to mobility render it one of the most widely used multicast routing protocols in Mobile Ad hoc NETworks (MANET). In ODMRP, there is no input rate control for upper layer traffic. So, it’s possible that high dense traffic flow causes congestion in networks. In this work, an enhancement to ODMRP is proposed referred to as fuzzy logic based Rate Control ODMRP (FRC-ODMRP). FRC-ODMRP attempts to adapt the arrival rate from upper layers to the state in the network by using feedback information from receivers of the multicast group. Accordingly, source comes up with a decision whether to increase or decrease its transmission rate based on information collected from the receivers. In this research, delay and packet delivery ratio reconsidered as indicators of congestion in addition to number of received packets. Simulation results demonstrate that FRC-ODMRP achieves significant performance improvements in comparison to conventional ODMRP and QoS-ODMRP. Indeed, it efficiently handles simultaneous traffic flows such that no one could dominate available bandwidth of networks.On Demand Multicast Routing Protocol (ODMRP) popularno je rješenje namijenjeno ad hoc mrežama s mobilnim domaćinima. Efikasnost, jednostavnost i robusnost u smislu mobilnosti učini su ovu metodu jednom od najraširenijih multicast protokola u ad hoc mobilnim mrežam (eng. MANET). Kod ODMRP-a nema upravljanja ulaznom frekvencijom za promet višeg sloja. Zbog toga je moguće da gusti promet uzrokuje zagušenje u mrežama. U ovome je radu predstavljeno poboljšanje ODMRP-a nazvano ODMRP zasnovan na fuzzy logici (FRC-ODRMP). FRC-ODRMP pokušava prilagoditi dolazne signale iz viših slojeva stanju u mreži koristeći povratnu informaciju od primatelja iz multicast grupe. Prilikom istraživanja dodatno je uzet omjer kašnjenja i dostavljenih paketa kao pokazatelj zagušenosti mreže uz broj dostavljenih paketa. Simulacijski rezultati pokazuju kako FRC-ODMRP značajno poboljšava performanse u odnosu na konvencionalni ODMRP i Qos-ODMRP. Dodatno, simultani promet efikasno je upravljan tako da nitko ne može dominirati dostupnom propusnošću mreže
    corecore