613 research outputs found
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes
or terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it's
an autonomous system in which mobile hosts connected by wireless links are free
to be dynamically and some time act as routers at the same time, and we discuss
in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time, there is no direction
or limit the movement and so on, and thus needed a new optional path Agreement
(Routing Protocol) to identify nodes for these actions communicate with each
other path, An ideal choice way the agreement should not only be able to find
the right path, and the Ad Hoc Network must be able to adapt to changing
network of this type at any time. and we talk in details in this paper all the
information of Mobile Ad Hoc Network which include the History of ad hoc,
wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc
networks, and then we present more than 13 types of the routing Ad Hoc Networks
protocols have been proposed. In this paper, the more representative of routing
protocols, analysis of individual characteristics and advantages and
disadvantages to collate and compare, and present the all applications or the
Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa
Joint Channel Selection and Power Control in Infrastructureless Wireless Networks: A Multi-Player Multi-Armed Bandit Framework
This paper deals with the problem of efficient resource allocation in dynamic
infrastructureless wireless networks. Assuming a reactive interference-limited
scenario, each transmitter is allowed to select one frequency channel (from a
common pool) together with a power level at each transmission trial; hence, for
all transmitters, not only the fading gain, but also the number of interfering
transmissions and their transmit powers are varying over time. Due to the
absence of a central controller and time-varying network characteristics, it is
highly inefficient for transmitters to acquire global channel and network
knowledge. Therefore a reasonable assumption is that transmitters have no
knowledge of fading gains, interference, and network topology. Each
transmitting node selfishly aims at maximizing its average reward (or
minimizing its average cost), which is a function of the action of that
specific transmitter as well as those of all other transmitters. This scenario
is modeled as a multi-player multi-armed adversarial bandit game, in which
multiple players receive an a priori unknown reward with an arbitrarily
time-varying distribution by sequentially pulling an arm, selected from a known
and finite set of arms. Since players do not know the arm with the highest
average reward in advance, they attempt to minimize their so-called regret,
determined by the set of players' actions, while attempting to achieve
equilibrium in some sense. To this end, we design in this paper two joint power
level and channel selection strategies. We prove that the gap between the
average reward achieved by our approaches and that based on the best fixed
strategy converges to zero asymptotically. Moreover, the empirical joint
frequencies of the game converge to the set of correlated equilibria. We
further characterize this set for two special cases of our designed game
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has
begun and many research challenges still need to be addressed. Location privacy
continues to be in the top of these challenges. Indeed, both of academia and
industry agreed to apply the pseudonym changing approach as a solution to
protect the location privacy of VANETs'users. However, due to the pseudonyms
linking attack, a simple changing of pseudonym shown to be inefficient to
provide the required protection. For this reason, many pseudonym changing
strategies have been suggested to provide an effective pseudonym changing.
Unfortunately, the development of an effective pseudonym changing strategy for
VANETs is still an open issue. In this paper, we present a comprehensive survey
and classification of pseudonym changing strategies. We then discuss and
compare them with respect to some relevant criteria. Finally, we highlight some
current researches, and open issues and give some future directions
Self-certified sybil-free pseudonyms
Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks. In this paper, we introduce self-certified Sybil-free pseudonyms as a means to provide privacy-friendly Sybil-freeness without requiring continuous online availability of a trusted third party. These pseudonyms are self-certified and computed by the users themselves from their cryptographic longterm identities. Contrary to identity certificates, we preserve location privacy and improve protection against some notorious attacks on anonymous communication systems
Adaptive Power Allocation and Control in Time-Varying Multi-Carrier MIMO Networks
In this paper, we examine the fundamental trade-off between radiated power
and achieved throughput in wireless multi-carrier, multiple-input and
multiple-output (MIMO) systems that vary with time in an unpredictable fashion
(e.g. due to changes in the wireless medium or the users' QoS requirements).
Contrary to the static/stationary channel regime, there is no optimal power
allocation profile to target (either static or in the mean), so the system's
users must adapt to changes in the environment "on the fly", without being able
to predict the system's evolution ahead of time. In this dynamic context, we
formulate the users' power/throughput trade-off as an online optimization
problem and we provide a matrix exponential learning algorithm that leads to no
regret - i.e. the proposed transmit policy is asymptotically optimal in
hindsight, irrespective of how the system evolves over time. Furthermore, we
also examine the robustness of the proposed algorithm under imperfect channel
state information (CSI) and we show that it retains its regret minimization
properties under very mild conditions on the measurement noise statistics. As a
result, users are able to track the evolution of their individually optimum
transmit profiles remarkably well, even under rapidly changing network
conditions and high uncertainty. Our theoretical analysis is validated by
extensive numerical simulations corresponding to a realistic network deployment
and providing further insights in the practical implementation aspects of the
proposed algorithm.Comment: 25 pages, 4 figure
A Pragmatic Evaluation of Distance Vector Proactive Routing in MANETs via Open Space Real-World Experiments
Mobile Ad hoc Networks constitute a promising and fast developing technology that could significantly enhance user freedom. The flexibility provided by such networks is accompanied by unreliability due to notably dynamic conditions that render routing quite problematic. For that reason, the research community has proposed multiple protocols claimed to address this issue, however, only few have been tested via real experiments, while even fewer have reached maturity to become readily available to end users. The main purpose of this paper is to pragmatically evaluate a promising, complete, and finalized MANET protocol via real-world experimentation in open space environment. The considered protocol, with the acronym B.A.T.M.A.N, which is based on distance vector proactive routing, was tested in different networking scenarios that revealed its ability to satisfactorily handle traffic under different conditions
- …
