To see the other types of publications on this topic, follow the link: Ad hoc networks (Computer networks).

Journal articles on the topic 'Ad hoc networks (Computer networks)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ad hoc networks (Computer networks).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Khanpara, Pimal, and Sharada Valiveti. "An Efficient Bio-inspired Routing Scheme for Tactical Ad hoc Networks." Scalable Computing: Practice and Experience 24, no. 1 (2023): 45–54. http://dx.doi.org/10.12694/scpe.v24i1.2052.

Full text
Abstract:
Ad hoc networks are temporary networks, created mainly for applications that are infrastructure-less. Such networks and network nodes demand special characteristics like mobile nodes having dynamic topology, wireless medium, heterogeneous deployment environment, and reactive or proactive routing depending on the nature of the network which includes network parameters such as node placement, mobility model, number of participants in the network, patterns of mobility, etc. Due to these characteristics and the mobility of network nodes, the process of routing is quite challenging in the ad hoc environment, especially when the node mobility is high. Bio-inspired routing can be an effective solution to meet all the design requirements and deal with the issues of tactical ad hoc networks. Different types of nature-inspired routing mechanisms are possible to use for tactical networks. This paper proposes the design of a novel Ant Colony Optimization-based routing strategy for ad hoc networks. Ant-based algorithms are dynamic and have adaptive behavior. Hence, they are competent for routing in ad hoc networks. Our proposed routing scheme is evaluated based on the network’s performance by varying different parameters. The performance of our proposed ACO-based routing approach is also compared to some existing ad hoc routing mechanisms. Different metrics in different deployment scenarios that can affect the efficiency of our proposed protocol are taken into consideration to evaluate the performance.
APA, Harvard, Vancouver, ISO, and other styles
3

Rizvi, Syed R., Stephan Olariu, Cristina M. Pinotti, Shaharuddin Salleh, Mona E. Rizvi, and Zainab Zaidi. "Vehicular Ad Hoc Networks." International Journal of Vehicular Technology 2011 (May 25, 2011): 1–2. http://dx.doi.org/10.1155/2011/256542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Zhiqing, Ziyu Wang, Xin Yuan, Huici Wu, and Zhiyong Feng. "Information density–based energy-limited capacity of ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (2018): 155014771877324. http://dx.doi.org/10.1177/1550147718773242.

Full text
Abstract:
In this article, the inhomogeneous energy consumption is characterized by the concept of information density, which is defined as the number of bits per unit time passing through a specific region. With information density, it is possible to derive the energy consumption of each region and determine the energy configuration scheme to maximize the network lifetime. The information density of pure ad hoc network and hybrid ad hoc network is derived. It is discovered that the information density of pure ad hoc network is inhomogeneous and the information density of hybrid ad hoc network is homogeneous, except for the regions near the edge of the entire area. With information density, the energy-limited capacity of pure and hybrid ad hoc networks is derived. The information density introduced in this article provides more insights into the information transfer of ad hoc networks, which may be applied in the energy configuration of ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Bruno, R., M. Conti, and E. Gregori. "Mesh networks: commodity multihop ad hoc networks." IEEE Communications Magazine 43, no. 3 (2005): 123–31. http://dx.doi.org/10.1109/mcom.2005.1404606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

AHMED, AHMED A., YI SHANG, HONGCHI SHI, and BEI HUA. "MDS-BASED METHODS FOR AD HOC NETWORK LOCALIZATION." Journal of Interconnection Networks 07, no. 01 (2006): 5–19. http://dx.doi.org/10.1142/s0219265906001545.

Full text
Abstract:
Recently, multidimensional scaling (MDS) techniques have been successfully applied in the MDS-MAP method to the node localization problem of ad hoc networks, such as wireless sensor networks. MDS-MAP uses MDS to compute a local, relative map at each node from the distance or proximity information of its neighboring nodes. Based on the local maps and the locations of a set of anchor nodes with known locations, the absolute positions of unknown nodes in the network can be computed. In this paper, we investigate the effects of several variants of MDS on the accuracy of localization in wireless sensor networks. We compare metric scaling and non-metric scaling methods, each with several different optimization criteria. Simulation results show that different optimization models of metric scaling achieve comparable localization accuracy for dense networks and non-metric scaling achieves more accurate results than metric scaling for sparse networks at the expense of higher computational cost.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jingyao, and Pingyi Fan. "On network coding in wireless ad-hoc networks." International Journal of Ad Hoc and Ubiquitous Computing 2, no. 3 (2007): 140. http://dx.doi.org/10.1504/ijahuc.2007.012415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thajeal, Salam. "Intrusion Detection in Wireless Ad-Hoc Networks." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 1 (October 25, 2021): 133–68. http://dx.doi.org/10.55562/jrucs.v24i1.471.

Full text
Abstract:
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we examine the vulnerabilities of a wireless ad-hoc network, and describe the new intelligent intrusion detection and response mechanisms (using neural network) that we are developing for wireless ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
9

DANOY, GREGOIRE, ENRIQUE ALBA, and PASCAL BOUVRY. "OPTIMAL INTERCONNECTION OF AD HOC INJECTION NETWORKS." Journal of Interconnection Networks 09, no. 03 (2008): 277–97. http://dx.doi.org/10.1142/s0219265908002278.

Full text
Abstract:
Multi-hop ad hoc networks allow establishing local groups of communicating devices in a self-organizing way. However, when considering realistic mobility patterns, such networks most often get divided in a set of disjoint partitions. This presence of partitions is an obstacle to communication within these networks. Ad hoc networks are generally composed of devices capable of communicating in a geographical neighborhood for free (e.g. using Wi-Fi or Bluetooth). In most cases a communication infrastructure is available. It can be a set of access point as well as a GSM/UMTS network. The use of such an infrastructure is billed, but it permits to interconnect distant nodes, through what we call “bypass links”. The objective of our work is to optimize the placement of these long-range links. To this end we rely on small-world network properties, which consist in a high clustering coefficient and a low characteristic path length. In this article we investigate the use of three genetic algorithms (generational, steady-state, and cooperative coevolutionary) to optimize three instances of this topology control problem and present initial evidence of their capacity to solve it.
APA, Harvard, Vancouver, ISO, and other styles
10

Feng, Guinian, Pingyi Fan, and Soung Chang Liew. "Interference minimum network topologies for ad hoc networks." Wireless Communications and Mobile Computing 12, no. 6 (2010): 529–44. http://dx.doi.org/10.1002/wcm.993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Satyanarayana, D., and S. V. Rao. "Constrained Delaunay Triangulation for Ad Hoc Networks." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–10. http://dx.doi.org/10.1155/2008/160453.

Full text
Abstract:
Geometric spanners can be used for efficient routing in wireless ad hoc networks. Computation of existing spanners for ad hoc networks primarily focused on geometric properties without considering network requirements. In this paper, we propose a new spanner called constrained Delaunay triangulation (CDT) which considers both geometric properties and network requirements. The CDT is formed by introducing a small set of constraint edges into local Delaunay triangulation (LDel) to reduce the number of hops between nodes in the network graph. We have simulated the CDT using network simulator (ns-2.28) and compared with Gabriel graph (GG), relative neighborhood graph (RNG), local Delaunay triangulation (LDel), and planarized local Delaunay triangulation (PLDel). The simulation results show that the minimum number of hops from source to destination is less than other spanners. We also observed the decrease in delay, jitter, and improvement in throughput.
APA, Harvard, Vancouver, ISO, and other styles
12

Hussen, Hassen Redwan, Sung-Chan Choi, Jong-Hong Park, and Jaeho Kim. "Predictive geographic multicast routing protocol in flying ad hoc networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771984387. http://dx.doi.org/10.1177/1550147719843879.

Full text
Abstract:
In the past decades, the unmanned aerial systems have been utilized only for military operations. However, recently, the potential uses and applicability of unmanned aerial vehicles (commonly known as drones) in civilian application domains are becoming a fast-growing phenomenon. A flying ad hoc network is a wireless ad hoc network specifically designed for the communication of unmanned aerial vehicles. Multicast routing is one of the vital aspects in wireless ad hoc networks. Using multicast transmission approaches, flying ad hoc network applications may need to send the same message to a specific group of flying nodes. The multicast communication approaches can benefit flying ad hoc network applications in conserving the scarce resources of flying nodes. Research works have been proposed to tackle the challenges in multicast routing with multi-hop communication in ad hoc network environments. Nevertheless, the conventional multicast routing mechanisms incur excessive control message overhead when a large number of nodes experience frequent topological changes. A scalable geographic multicast routing mechanism, which specially require localized operation and reduced control packet overhead, is necessary. Multicast routing in flying ad hoc networks is extremely challenging because of the dynamic topology changes and network disconnection resulted from frequent mobility of nodes. In this article, we present and implement a scalable and predictive geographic multicast routing mechanism in flying ad hoc networks. In uniform and random deployment scenarios, the MATLAB-based evaluation result has revealed that when the communication range increases, the probability of finding one-hop predicted forwarders to reach multicast destinations also increases. The implementation of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is done using Optimizing Network Engineering Tools Modeler 16.0. We have added the scalable and predictive geographic multicast routing mechanism in flying ad hoc network as a new routing scheme in the Mobile Ad hoc Network routing protocol groups of the Optimizing Network Engineering Tools Modeler. Then, the performance of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is compared with two of the existing Mobile Ad hoc Network routing protocols (Geographic Routing Protocol and Dynamic Source Routing). Eventually, we present two instance scenarios regarding the integration of scalable and predictive geographic multicast routing mechanism in flying ad hoc network scheme in the Internet of Things platform.
APA, Harvard, Vancouver, ISO, and other styles
13

Kanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (2021): 364. http://dx.doi.org/10.3390/electronics10040364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Biagioni, Edoardo, Silvia Giordano, and Ciprian Dobre. "Ad Hoc and Sensor Networks." IEEE Communications Magazine 55, no. 1 (2017): 166–67. http://dx.doi.org/10.1109/mcom.2017.7823356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Biagioni, Edoardo, Silvia Giordano, and Ciprian Dobre. "Ad Hoc and Sensor Networks." IEEE Communications Magazine 56, no. 7 (2018): 124. http://dx.doi.org/10.1109/mcom.2018.8419191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Giordano, S., and C. Rosenberg. "Ad hoc and sensor networks." IEEE Communications Magazine 43, no. 3 (2005): 100. http://dx.doi.org/10.1109/mcom.2005.1404602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Giordano, S., and C. Rosenberg. "Ad hoc and sensor networks." IEEE Communications Magazine 43, no. 7 (2005): 108. http://dx.doi.org/10.1109/mcom.2005.1470834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Andrews, Jeffrey, Steven Weber, and Martin Haenggi. "Ad Hoc Networks: To Spread or Not to Spread? [Ad Hoc and Sensor Networks]." IEEE Communications Magazine 45, no. 12 (2007): 84–91. http://dx.doi.org/10.1109/mcom.2007.4395371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Pragya Kabra, Et al. "Techniques for Diversified Optimization of Routing Algorithms in Mobile Ad-Hoc Wireless Connections." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (2023): 569–74. http://dx.doi.org/10.17762/ijritcc.v11i8.10057.

Full text
Abstract:
MANETs, for example, are a type of network that lacks a well-established infrastructure. Creating ad-hoc networks is difficult because of a lack of infrastructure. Choosing a routing protocol in an ad-hoc network may be difficult due to the network's volatility. To obtain the optimum performance, Zone Routing Protocol (ZRP) is a hybrid routing protocol that combines the best aspects of proactive (Optimized Link State Routing) and reactive (Ad hoc On-Demand Distance Vector) routing approaches. MANET performance can be improved using a Genetic Algorithm and Ant Colony Optimization.
APA, Harvard, Vancouver, ISO, and other styles
20

Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (2024): 29. http://dx.doi.org/10.3390/fi16010029.

Full text
Abstract:
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance. In this work, we review ad hoc network cross-layer methods, propose a new useful classification of cross-layer methods, and show future research directions in the development of ad hoc network cross-layer methods. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
APA, Harvard, Vancouver, ISO, and other styles
21

Sharma, Ishu, and K. R. Ramkumar. "A survey on ACO based multipath routing algorithms for ad hoc networks." International Journal of Pervasive Computing and Communications 13, no. 4 (2017): 370–85. http://dx.doi.org/10.1108/ijpcc-d-17-00015.

Full text
Abstract:
Purpose The purpose of this paper is to review the existing routing algorithms for wireless ad hoc networks to evaluate the methods according to the current requirements. Wireless ad hoc network can provide communication in emergency situations. Active nodes in ad hoc network work as sender, receiver and router at the same time. Nodes are equipped with limited bandwidth and energy. Optimal routing method can help in “smart use” of available resources. Evolvement of routing method based on need is a continuous process. Numerous applications of ad hoc network motivates researcher for further development to fulfill the need of society. Design/methodology/approach In this paper, routing algorithms for ad hoc network based on ant colony optimization, multipath routing and with multiple input multiple output (MIMO) antenna support have been discussed. Findings Comparative analysis has been drawn among existing algorithms of different categories. Transmitting message packets parallel through multiple paths in the network can save overall resource usage in the network. Originality/value The authors have discussed the future area of development for optimal routing in ad hoc networks. Considering signal noise ratio and congestion status while selecting path can provide better energy use in the network. Rather than leaving less prioritized route paths, multiple paths can be used for sending data packets parallel.
APA, Harvard, Vancouver, ISO, and other styles
22

DaSilva, L. A., S. F. Midkiff, J. S. Park, et al. "Network mobility and protocol interoperability in ad hoc networks." IEEE Communications Magazine 42, no. 11 (2004): 88–96. http://dx.doi.org/10.1109/mcom.2004.1362551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Hussein Ali Attallah. "Virtual Local Area Network Performance Improvement Using Ad Hoc Routing Protocols in a Wireless Network." Computers 12, no. 2 (2023): 28. http://dx.doi.org/10.3390/computers12020028.

Full text
Abstract:
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
APA, Harvard, Vancouver, ISO, and other styles
24

León, Carlos, Julio Barbancho, Pawel Kulakowski, Adel Soudani, Pedro Marrón, and Chia-Yen Shih. "Wireless Ad Hoc Sensor Networks." International Journal of Distributed Sensor Networks 9, no. 9 (2013): 202940. http://dx.doi.org/10.1155/2013/202940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Misra, S., H. H. Chen, M. Guizani, and B. K. Bhargava. "Editorial: Wireless Ad Hoc Networks." IET Communications 3, no. 5 (2009): 685. http://dx.doi.org/10.1049/iet-com.2009.9032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (2021): 1446. http://dx.doi.org/10.3390/electronics10121446.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]
APA, Harvard, Vancouver, ISO, and other styles
27

Lavanya, N., and M. Balakrishna. "A New Technique for File Sharing Mechanism Ad hoc Networks." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 3 (2018): 1. http://dx.doi.org/10.23956/ijarcsse.v8i3.585.

Full text
Abstract:
Network coding is a data transmission technique which allows intermediate nodes in a network to re-code data in transit. In contrast to traditional network communication where a node repeats incoming data to its outgoing channel without modifying the payload, a node implementing network coding not only repeats but also alters data. Network coding has been demonstrated to increase network throughput compared to the traditional forwarding transmission. It has potentially broad applications in many areas, including traditional computer networks, wireless ad-hoc networks, and peer to peer systems. This paper process a new technique for file sharing in P2P.
APA, Harvard, Vancouver, ISO, and other styles
28

Forde, T. K., L. E. Doyle, and D. O'Mahony. "Ad hoc innovation: distributed decision making in ad hoc networks." IEEE Communications Magazine 44, no. 4 (2006): 131–37. http://dx.doi.org/10.1109/mcom.2006.1632660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Han, Hui, Hong De Zhang, and Yang Wang. "A Routing Protocol for Emergency Communication Based on Load Balancing." Applied Mechanics and Materials 719-720 (January 2015): 744–49. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.744.

Full text
Abstract:
Ad-hoc communications is a mobile communication networks and computer networks combine with no infrastructure support, and network survivability and flexibility is strong, especially suitable for emergency communication. As the existing mobile ad hoc network routing protocols lack of network load balancing capabilities, this paper proposed a routing protocol based on load balancing LBBR (Load Balancing Based Routing). Simulation results shows that, LBBR can improve the success rate of packet transmission, reducing the average end to end delay, thus effectively improving network performance.
APA, Harvard, Vancouver, ISO, and other styles
30

MOHAMMADI, HOSSEIN, EHSAN NEDAAEE OSKOEE, MOHSEN AFSHARCHI, NASSER YAZDANI, and MUHAMMAD SAHIMI. "A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS." International Journal of Modern Physics C 20, no. 12 (2009): 1871–902. http://dx.doi.org/10.1142/s0129183109014795.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are random, self-configurable and rapidly-deployable networks. The main goal of developing the MANETs is not only obtaining better service, but also having networks that can serve in situations in which no other means of communications can operate. Examples include networks that are used in battlefields, in search-and-rescue operations, and networks of sensors. We propose a percolation model for studying the properties of the MANETs. The model is based on a random network of sites, distributed in space, which represent the mobile nodes. Two nodes are linked if they are within each other's transmission ranges. A node may be lost or become inactive if, for example, it runs out of energy (provided by its batteries). A link can be lost if, for example, one of its two end nodes moves outside of the other's transmission range. Extensive Monte Carlo simulations are carried out to study the properties of the model. The network's topology is characterized by a critical transmission range, which is the analogue of the percolation threshold. It is shown that not only can the model take into account several important features of the real MANETs and explain them in physical terms, but also leads to the development of efficient protocols for self-configuration, adaptability, and disaster survival, which are of utmost importance to the practical applications.
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Xiaojie, and Ulrich Speidel. "RAODV Routing Protocol for Congestion Detection and Relief in Ad Hoc Wireless Networks." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 4 (2021): 21–34. http://dx.doi.org/10.4018/ijitn.2021100103.

Full text
Abstract:
Ad hoc wireless networks depend on mutual collaboration among nodes. Congestion in ad hoc wireless networks thus presents more of a challenge than for other network types. This article proposes RAODV (relieving AODV), a modification of the AODV routing protocol, to handle congestion via third party neighbour nodes in dense and static ad hoc networks. RAODV nodes use a T-entropy threshold-based congestion detection algorithm to determine the congestion status of their neighbours. If RAODV determines that congestion is occurring, it then tries to relieve congestion via a local repair modification algorithm that replaces the congested node by a suitable monitoring/third party neighbour node. This article also shows evidence that RAODV results in better network performance than AODV in simulations with random network topologies.
APA, Harvard, Vancouver, ISO, and other styles
32

Sikora, Andrzej, and Ewa Niewiadomska-Szynkiewicz. "Parallel and Distributed Simulation of Ad Hoc Networks." Journal of Telecommunications and Information Technology, no. 3 (June 26, 2023): 76–84. http://dx.doi.org/10.26636/jtit.2009.3.943.

Full text
Abstract:
Modeling and simulation are traditional methods used to evaluate wireless network design. This paper addresses issues associated with the application of parallel discrete event simulation to mobile ad hoc networks design and analysis. The basic characteristics and major issues pertaining to ad hoc networks modeling and simulation are introduced. The focus is on wireless transmission and mobility models. Particular attention is paid to the MobASim system, a Javabased software environment for parallel and distributed simulation of mobile ad hoc networks. We describe the design, performance and possible applications of presented simulation software.
APA, Harvard, Vancouver, ISO, and other styles
33

Manoj Kumar Mishra, Binod Kumar Pattanayak, Alok Kumar Jagadev, and Manoj Ranjan Nayak. "Self-Centric Protected Ad-Hoc Networks." International Journal of Advancements in Computing Technology 1, no. 2 (2009): 110–21. http://dx.doi.org/10.4156/ijact.vol1.issue2.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, HanXing, GuiLin Lu, WeiJia Jia, and Wei Zhao. "Connectivity in finite ad-hoc networks." Science in China Series F: Information Sciences 51, no. 4 (2008): 417–24. http://dx.doi.org/10.1007/s11432-008-0011-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Trofimova, Yelena, and Pavel Tvrdík. "Enhancing Reactive Ad Hoc Routing Protocols with Trust." Future Internet 14, no. 1 (2022): 28. http://dx.doi.org/10.3390/fi14010028.

Full text
Abstract:
In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.
APA, Harvard, Vancouver, ISO, and other styles
36

Raya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of Computer Security 15, no. 1 (2007): 39–68. http://dx.doi.org/10.3233/jcs-2007-15103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Bayatti, Ali H., Hussein Zedan, Antoniuo Cau, and François Siewe. "Security Management for Mobile Ad Hoc Network of Networks (MANoN)." International Journal of Mobile Computing and Multimedia Communications 2, no. 1 (2010): 1–19. http://dx.doi.org/10.4018/jmcmc.2010103001.

Full text
Abstract:
Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.
APA, Harvard, Vancouver, ISO, and other styles
38

Lim, H., and C. Kim. "Flooding in wireless ad hoc networks." Computer Communications 24, no. 3-4 (2001): 353–63. http://dx.doi.org/10.1016/s0140-3664(00)00233-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Asokan, N., and P. Ginzboorg. "Key agreement in ad hoc networks." Computer Communications 23, no. 17 (2000): 1627–37. http://dx.doi.org/10.1016/s0140-3664(00)00249-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hassanein, Hossam, and Ioanis Nikolaidis. "Mobile and ad-hoc local networks." Computer Networks 41, no. 3 (2003): 285–87. http://dx.doi.org/10.1016/s1389-1286(02)00421-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kulkarni, Sandeep S., Mohamed G. Gouda, and Anish Arora. "Secret instantiation in ad-hoc networks." Computer Communications 29, no. 2 (2006): 200–215. http://dx.doi.org/10.1016/j.comcom.2005.05.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rathod, Vijay U., and Shyamrao V. Gumaste. "Role of Deep Learning in Mobile Ad-hoc Networks." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 2s (2022): 237–46. http://dx.doi.org/10.17762/ijritcc.v10i2s.5938.

Full text
Abstract:
The portable capability of MANETs has specially delighted in an unexpected expansion. A massive need for dynamic ad-hoc basis networking continues to be created by advancements in hardware design, high-speed growth in the wireless network communications infrastructure, and increased user requirements for node mobility and regional delivery processes. There are several challenging issues in mobile ad-hoc networks, such as machine learning method cannot analyze features like node mobility, channel variation, channel interference because of the absence of deep neural layers. Due to decentralized nature of mobile ad hoc networks, its necessitate to concentrate over some extremely serious issues like stability, scalability, routing based problems such as network congestion, optimal path selection, etc. and security.
APA, Harvard, Vancouver, ISO, and other styles
43

LI, He, KyoungSoo BOK, and JaeSoo YOO. "P2P Based Social Network over Mobile Ad-Hoc Networks." IEICE Transactions on Information and Systems E97.D, no. 3 (2014): 597–600. http://dx.doi.org/10.1587/transinf.e97.d.597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ergenç, Doğanalp, and Ertan Onur. "Plane-separated routing in ad-hoc networks." Wireless Networks 28, no. 1 (2022): 331–53. http://dx.doi.org/10.1007/s11276-021-02824-7.

Full text
Abstract:
AbstractControl and user (data) plane separation (CUPS) is a concept applied in various networking areas to scale network resources independently, increase the quality of service, and facilitate the autonomy of networks. In this study, we leverage this concept to design a plane-separated routing algorithm, CUPS-based hierarchical routing algorithm (CHRA), as an energy-efficient and low-latency end-to-end communication scheme for clustered ad-hoc networks. In CHRA, while cluster heads constitute the control plane to conduct network discovery and routing, ordinary nodes residing in the user plane forward packets according to the routing decisions taken by the control plane. Exploiting the CUPS, we avoid exhausting cluster heads by offloading packet-forwarding to ordinary nodes and improve the quality of service by utilizing alternative paths other than the backbone of cluster heads. Our simulation results show that CHRA offers a better quality of service in terms of end-to-end latency and data-to-all ratio, and promotes fairness in energy-consumption in both stationary and mobile scenarios.
APA, Harvard, Vancouver, ISO, and other styles
45

Dai, Yin Fei, and Ying Yong Zou. "Discussing on Vehicular Ad Hoc Networks Simulation." Applied Mechanics and Materials 742 (March 2015): 665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.742.665.

Full text
Abstract:
The paper discussing on the VANET simulating involve in computer, traffic engineering, statistics, psychology, etc., presenting a multidisciplinary tendency. Started from the researching significance and contents of the VANET simulation, this paper introduced the development history and research status of VANET simulation, classified the VANET simulators, introduced and compared typical VANET simulators.
APA, Harvard, Vancouver, ISO, and other styles
46

Sultan, Mohamad T., Hesham El Sayed, and Manzoor Ahmed Khan. "An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS)." International journal of Computer Networks & Communications 15, no. 01 (2023): 01–15. http://dx.doi.org/10.5121/ijcnc.2023.15101.

Full text
Abstract:
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
47

Xing, Guoliang, and Vojislav B. Mišić. "Wireless Ad Hoc and Sensor Networks." International Journal of Parallel, Emergent and Distributed Systems 25, no. 6 (2010): 437–38. http://dx.doi.org/10.1080/17445760903548333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Daniluk, Krzysztof, and Ewa Niewiadomska-Szynkiewicz. "A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2012): 64–72. http://dx.doi.org/10.26636/jtit.2012.3.1280.

Full text
Abstract:
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) – a special type of ad hoc networks. We focus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure networks, first, the security requirements of wireless sensor networks are presented and the relationships between network security and network lifetime limited by often insufficient resources of network nodes are explained. Second, a short literature survey of energy aware security solutions for use in WSNs is presented.
APA, Harvard, Vancouver, ISO, and other styles
49

Goff, Tom, Nael Abu-Ghazaleh, Dhananjay Phatak, and Ridvan Kahvecioglu. "Preemptive routing in ad hoc networks." Journal of Parallel and Distributed Computing 63, no. 2 (2003): 123–40. http://dx.doi.org/10.1016/s0743-7315(02)00059-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tong, C., J. W. Niu, G. Z. Qu, X. Long, and X. P. Gao. "Complex networks properties analysis for mobile ad hoc networks." IET Communications 6, no. 4 (2012): 370. http://dx.doi.org/10.1049/iet-com.2010.0651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!