1,664 research outputs found
HYMAD: Hybrid DTN-MANET Routing for Dense and Highly Dynamic Wireless Networks
In this paper we propose HYMAD, a Hybrid DTN-MANET routing protocol which
uses DTN between disjoint groups of nodes while using MANET routing within
these groups. HYMAD is fully decentralized and only makes use of topological
information exchanges between the nodes. We evaluate the scheme in simulation
by replaying real life traces which exhibit this highly dynamic connectivity.
The results show that HYMAD outperforms the multi-copy Spray-and-Wait DTN
routing protocol it extends, both in terms of delivery ratio and delay, for any
number of message copies. Our conclusion is that such a Hybrid DTN-MANET
approach offers a promising venue for the delivery of elastic data in mobile
ad-hoc networks as it retains the resilience of a pure DTN protocol while
significantly improving performance.Comment: 7 pages, 6 figure
On Leveraging Partial Paths in Partially-Connected Networks
Mobile wireless network research focuses on scenarios at the extremes of the
network connectivity continuum where the probability of all nodes being
connected is either close to unity, assuming connected paths between all nodes
(mobile ad hoc networks), or it is close to zero, assuming no multi-hop paths
exist at all (delay-tolerant networks). In this paper, we argue that a sizable
fraction of networks lies between these extremes and is characterized by the
existence of partial paths, i.e. multi-hop path segments that allow forwarding
data closer to the destination even when no end-to-end path is available. A
fundamental issue in such networks is dealing with disruptions of end-to-end
paths. Under a stochastic model, we compare the performance of the established
end-to-end retransmission (ignoring partial paths), against a forwarding
mechanism that leverages partial paths to forward data closer to the
destination even during disruption periods. Perhaps surprisingly, the
alternative mechanism is not necessarily superior. However, under a stochastic
monotonicity condition between current v.s. future path length, which we
demonstrate to hold in typical network models, we manage to prove superiority
of the alternative mechanism in stochastic dominance terms. We believe that
this study could serve as a foundation to design more efficient data transfer
protocols for partially-connected networks, which could potentially help
reducing the gap between applications that can be supported over disconnected
networks and those requiring full connectivity.Comment: Extended version of paper appearing at IEEE INFOCOM 2009, April
20-25, Rio de Janeiro, Brazi
Secure Energy Aware Optimal Routing using Reinforcement Learning-based Decision-Making with a Hybrid Optimization Algorithm in MANET
Mobile ad hoc networks (MANETs) are wireless networks that are perfect for applications such as special outdoor events, communications in areas without wireless infrastructure, crises and natural disasters, and military activities because they do not require any preexisting network infrastructure and can be deployed quickly. Mobile ad hoc networks can be made to last longer through the use of clustering, which is one of the most effective uses of energy. Security is a key issue in the development of ad hoc networks. Many studies have been conducted on how to reduce the energy expenditure of the nodes in this network. The majority of these approaches might conserve energy and extend the life of the nodes. The major goal of this research is to develop an energy-aware, secure mechanism for MANETs. Secure Energy Aware Reinforcement Learning based Decision Making with Hybrid Optimization Algorithm (RL-DMHOA) is proposed for detecting the malicious node in the network. With the assistance of the optimization algorithm, data can be transferred more efficiently by choosing aggregation points that allow individual nodes to conserve power The optimum path is chosen by combining the Particle Swarm Optimization (PSO) and the Bat Algorithm (BA) to create a fitness function that maximizes across-cluster distance, delay, and node energy. Three state-of-the-art methods are compared to the suggested method on a variety of metrics. Throughput of 94.8 percent, average latency of 28.1 percent, malicious detection rate of 91.4 percent, packet delivery ratio of 92.4 percent, and network lifetime of 85.2 percent are all attained with the suggested RL-DMHOA approach
Adoption of vehicular ad hoc networking protocols by networked robots
This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan
A Brain-Inspired Trust Management Model to Assure Security in a Cloud based IoT Framework for Neuroscience Applications
Rapid popularity of Internet of Things (IoT) and cloud computing permits
neuroscientists to collect multilevel and multichannel brain data to better
understand brain functions, diagnose diseases, and devise treatments. To ensure
secure and reliable data communication between end-to-end (E2E) devices
supported by current IoT and cloud infrastructure, trust management is needed
at the IoT and user ends. This paper introduces a Neuro-Fuzzy based
Brain-inspired trust management model (TMM) to secure IoT devices and relay
nodes, and to ensure data reliability. The proposed TMM utilizes node
behavioral trust and data trust estimated using Adaptive Neuro-Fuzzy Inference
System and weighted-additive methods respectively to assess the nodes
trustworthiness. In contrast to the existing fuzzy based TMMs, the NS2
simulation results confirm the robustness and accuracy of the proposed TMM in
identifying malicious nodes in the communication network. With the growing
usage of cloud based IoT frameworks in Neuroscience research, integrating the
proposed TMM into the existing infrastructure will assure secure and reliable
data communication among the E2E devices.Comment: 17 pages, 10 figures, 2 table
Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
This book presents collective works published in the recent Special Issue (SI) entitled "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks”. These works expose the readership to the latest solutions and techniques for MANETs and VANETs. They cover interesting topics such as power-aware optimization solutions for MANETs, data dissemination in VANETs, adaptive multi-hop broadcast schemes for VANETs, multi-metric routing protocols for VANETs, and incentive mechanisms to encourage the distribution of information in VANETs. The book demonstrates pioneering work in these fields, investigates novel solutions and methods, and discusses future trends in these field
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles
Vehicular Ad-hoc Networks (VANET) enable efficient communication between
vehicles with the aim of improving road safety. However, the growing number of
vehicles in dense regions and obstacle shadowing regions like Manhattan and
other downtown areas leads to frequent disconnection problems resulting in
disrupted radio wave propagation between vehicles. To address this issue and to
transmit critical messages between vehicles and drones deployed from service
vehicles to overcome road incidents and obstacles, we proposed a hybrid
technique based on fog computing called Hybrid-Vehfog to disseminate messages
in obstacle shadowing regions, and multi-hop technique to disseminate messages
in non-obstacle shadowing regions. Our proposed algorithm dynamically adapts to
changes in an environment and benefits in efficiency with robust drone
deployment capability as needed. Performance of Hybrid-Vehfog is carried out in
Network Simulator (NS-2) and Simulation of Urban Mobility (SUMO) simulators.
The results showed that Hybrid-Vehfog outperformed Cloud-assisted Message
Downlink Dissemination Scheme (CMDS), Cross-Layer Broadcast Protocol (CLBP),
PEer-to-Peer protocol for Allocated REsource (PrEPARE), Fog-Named Data
Networking (NDN) with mobility, and flooding schemes at all vehicle densities
and simulation times
Quality management of surveillance multimedia streams via federated SDN controllers in Fiwi-iot integrated deployment environments
Traditionally, hybrid optical-wireless networks (Fiber-Wireless - FiWi domain) and last-mile Internet of Things edge networks (Edge IoT domain) have been considered independently, with no synergic management solutions. On the one hand, FiWi has primarily focused on high-bandwidth and low-latency access to cellular-equipped nodes. On the other hand, Edge IoT has mainly aimed at effective dispatching of sensor/actuator data among (possibly opportunistic) nodes, by using direct peer-to-peer and base station (BS)-assisted Internet communications. The paper originally proposes a model and an architecture that loosely federate FiWi and Edge IoT domains based on the interaction of FiWi and Edge IoT software defined networking controllers: The primary idea is that our federated controllers can seldom exchange monitoring data and control hints the one with the other, thus mutually enhancing their capability of end-to-end quality-aware packet management. To show the applicability and the effectiveness of the approach, our original proposal is applied to the notable example of multimedia stream provisioning from surveillance cameras deployed in the Edge IoT domain to both an infrastructure-side server and spontaneously interconnected mobile smartphones; our solution is able to tune the BS behavior of the FiWi domain and to reroute/prioritize traffic in the Edge IoT domain, with the final goal to reduce latency. In addition, the reported application case shows the capability of our solution of joint and coordinated exploitation of resources in FiWi and Edge IoT domains, with performance results that highlight its benefits in terms of efficiency and responsiveness
- …