To see the other types of publications on this topic, follow the link: FLOODING CONTROL PROTOCOL.

Journal articles on the topic 'FLOODING CONTROL PROTOCOL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'FLOODING CONTROL PROTOCOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol
APA, Harvard, Vancouver, ISO, and other styles
2

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads,
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Full text
Abstract:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results,
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Full text
Abstract:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between n
APA, Harvard, Vancouver, ISO, and other styles
5

Prabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Full text
Abstract:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless se
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Full text
Abstract:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper
APA, Harvard, Vancouver, ISO, and other styles
7

Shams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Full text
Abstract:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmen
APA, Harvard, Vancouver, ISO, and other styles
8

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prov
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, et al. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Full text
Abstract:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of eac
APA, Harvard, Vancouver, ISO, and other styles
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (2022): 6150. http://dx.doi.org/10.3390/app12126150.

Full text
Abstract:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DD
APA, Harvard, Vancouver, ISO, and other styles
11

Tung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (2020): 1239. http://dx.doi.org/10.3390/electronics9081239.

Full text
Abstract:
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks
APA, Harvard, Vancouver, ISO, and other styles
12

Pai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, et al. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness." Wireless Communications and Mobile Computing 2022 (April 4, 2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.

Full text
Abstract:
During data transmission, a decentralised Mobile Ad Hoc Network (MANET) might result in high Energy Consumption (EC) and a short Network Lifetime (NLife). To address these difficulties, an on-demand Power and Load-Aware multipath node-disjoint source routing is presented based on the Enhanced Opportunistic Routing (PLAEOR) protocol. This unique protocol aims at using power, load, and latency to manage routing costs depending on control packet flooding from the destination node. However, the exchange of control packets from the target to all nodes may impact network efficiency. As a result, the
APA, Harvard, Vancouver, ISO, and other styles
13

Tun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.

Full text
Abstract:
The usage of Denial of Service (DoS) and Distributed Denial of Service (DDoS) packets by the assailant may change and dependent on various sorts of administrations and protocols. A flooding DDoS attack depends on an immense volume of assault traffic which is named as a Flooding based DDoS packet. Flooding-based DDoS packet endeavors to block the injured individual's system transfer speed with genuine-looking however undesirable IP information. Because of which Legitimate IP packets can’t arrive at the unfortunate casualty in view of the absence of data transfer capacity asset. Internet Control
APA, Harvard, Vancouver, ISO, and other styles
14

Onyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, et al. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks." Sustainability 14, no. 19 (2022): 11950. http://dx.doi.org/10.3390/su141911950.

Full text
Abstract:
Owing to the latest advancements in networking devices and functionalities, there is a need to build future intelligent networks that provide intellectualization, activation, and customization. Software-defined networks (SDN) are one of the latest and most trusted technologies that provide a method of network management that provides network virtualization. Although traditional networks still have a strong presence in the industry, software-defined networks have begun to replace them at faster rates. When network technologies emerge at a steady rate, SDN will be implemented at higher rates in
APA, Harvard, Vancouver, ISO, and other styles
15

Nam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park, and Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks." Electronics 11, no. 20 (2022): 3350. http://dx.doi.org/10.3390/electronics11203350.

Full text
Abstract:
To deliver real-time data within a desired time deadline, a spatiotemporal approach has been proposed in wireless sensor networks. In the approach, real-time data can be delivered with a delivery speed calculated by both the distance from a source to a static sink and the desired time deadline. In the case of a mobile sink, because the distance from a source to the sink would be dynamically changed due to its movement, real-time data cannot be delivered due to the inability to calculate a delivery speed. Thus, we propose a novel real-time routing protocol, called EAR2 (expected area-based real
APA, Harvard, Vancouver, ISO, and other styles
16

Singh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad, and Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks." Processes 11, no. 5 (2023): 1419. http://dx.doi.org/10.3390/pr11051419.

Full text
Abstract:
MANET (Mobile Ad hoc Networks) functionality is determined by routing protocols’ ability to adjust to atypical changes in information and communication technologies, topological systems, and connection status. Due to interference, node migration, the growth of several pathways, security, and propagation loss, MANET network configurations are dynamic. The proactive routing protocol enhances the message flow utilized in the neighborhood discovery process by using the multipoint relays (MPR) approach. In order to increase the protocol’s effectiveness and efficiency while maintaining the OLSR prot
APA, Harvard, Vancouver, ISO, and other styles
17

Jing, Chun Guo, and Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++." Applied Mechanics and Materials 401-403 (September 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.

Full text
Abstract:
In street lighting system, the light pole controllers were used to monitoring and control each street light. The controller nodes were installed at each lighting pole and make up a network with RTUs. In this paper, a randomly forwarding routing strategy was proposed based on the controller network features. The controller nodes were divided many clusters according to the substation power scope. In one cluster, the controller nodes topology is mainly star structure. When a controller node received a packet, it randomly delays a period of time and decides forwarding packet instead of immediately
APA, Harvard, Vancouver, ISO, and other styles
18

Baba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.

Full text
Abstract:
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication and mobility to all devices forming the network. MANET suffers security lapses due to the absence of central control infrastructure to monitor and control the devices that joins the network. These security lapses in MANET discourage it and makes it vulnerable to attacks such as denial of service attacks. Amongst various attacks prevalent on MANET environment, packet flooding is a com
APA, Harvard, Vancouver, ISO, and other styles
19

Nguyen, Dang-Quan, and Pascale Minet. "Quality of Service Routing in a MANET with OLSR." JUCS - Journal of Universal Computer Science 13, no. (1) (2007): 56–86. https://doi.org/10.3217/jucs-013-01-0056.

Full text
Abstract:
Ad hoc wireless networks have enormous commercial and military potential becauseof their self-organizing capacity and mobility support. However, some specificities of these networks such as radio interferences and limited resources make more complex the quality of service(QoS) support. Indeed, on the one hand, the bandwidth offered to users is strongly affected by radio interferences. On the other hand, flooding information in such a network must be optimizedin order to save resources. Therefore, we propose in this paper, a solution taking into account radio interferences in mobile ad hoc netw
APA, Harvard, Vancouver, ISO, and other styles
20

Sejaphala, Lanka, Vusimuzi Malele, and Francis Lugayizi. "A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things." Latin-American Journal of Computing 12, no. 1 (2025): 35–49. https://doi.org/10.5281/zenodo.14449371.

Full text
Abstract:
The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years, different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-
APA, Harvard, Vancouver, ISO, and other styles
21

Prabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn, and Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (September 22, 2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.

Full text
Abstract:
Mobile Opportunistic Networks (OppNets) are infrastructure-less networks consisting of wireless mobile nodes and have been a focus of research for years. OppNets can be scaled up to support rapid growth of wireless devices and technologies, especially smartphones and tablets. Mobile Ad Hoc Networks (MANETs), one of OppNets technologies, have a high potential to be used for facilitating an extension for the Internet and a backup communication platform in disaster situation. However, a connection disruption due to node mobility and unreliable wireless links is possible to trigger a flooding oper
APA, Harvard, Vancouver, ISO, and other styles
22

Guo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu, and Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information." Journal of Marine Science and Engineering 11, no. 8 (2023): 1620. http://dx.doi.org/10.3390/jmse11081620.

Full text
Abstract:
Underwater wireless sensor networks (UWSNs) are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, variable topology, limited battery, low processing power and so on. These new features pose many challenges to the design of self-organizing routing protocol for UWSNs. This paper focuses on the application of Ad Hoc On-demand Distance Vector (AODV) routing protocol in UWSNs. In order to solve the problems of packet collision and excessive energy consumption associated with the flooding-based routing discovery method and the periodic he
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Hao Fan, and Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm." Applied Mechanics and Materials 347-350 (August 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.

Full text
Abstract:
ZigBee routing protocol study and optimization for the problem of the effects of flooding AODVjr algorithm RREQ packet.By introducing new coordinate parameters and other methods to control the RREQ packet forwarding. Network robustness problem and prolong the life of the network, by changing the algorithm in the case of low energy strategy.And simulation comparison to verify the effectiveness of the optimization algorithm.
APA, Harvard, Vancouver, ISO, and other styles
24

Hsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (2021): 1980. http://dx.doi.org/10.3390/s21061980.

Full text
Abstract:
In this paper, we aim to detect distributed denial of service (DDoS) attacks, and receive a notification of destination service, changing immediately, without the additional efforts of other modules. We designed a kernel-based mechanism to build a new Transmission Control Protocol/Internet Protocol (TCP/IP) connection smartly by the host while the users or clients not knowing the location of the next host. Moreover, we built a lightweight flooding attack detection mechanism in the user mode of an operating system. Given that reinstalling a modified operating system on each client is not realis
APA, Harvard, Vancouver, ISO, and other styles
25

Rouissat, Mehdi, Mohammed Belkheir, Ibrahim S. Alsukayti, and Allel Mokaddem. "A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks." Applied Sciences 13, no. 18 (2023): 10366. http://dx.doi.org/10.3390/app131810366.

Full text
Abstract:
Internet of Things (IoT) networks are being widely deployed for a broad range of critical applications. Without effective security support, such a trend would open the doors to notable security challenges. Due to their inherent constrained characteristics, IoT networks are highly vulnerable to the adverse impacts of a wide scope of IoT attacks. Among these, flooding attacks would cause great damage given the limited computational and energy capacity of IoT devices. However, IETF-standardized IoT routing protocols, such as the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL), have n
APA, Harvard, Vancouver, ISO, and other styles
26

Shin, Byoungheon, and Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (November 14, 2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.

Full text
Abstract:
Multi-constrained routing is a key driver to support quality-of-service (QoS) for real-time multimedia applications in wireless mesh networks (WMNs). Due to the difficulty of applying strict admission control into a public WMN, it is inevitable to accommodate multiple application flows with different QoS requirements exceeding the capacity of a certain link shared by multiple flows. However, existing multi-constrained routing protocols under such an environment find the QoS degradation based on end-to-end path quality probing and trigger flooding-based route discovery from a scratch for resolv
APA, Harvard, Vancouver, ISO, and other styles
27

Akinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (2022): 2536. http://dx.doi.org/10.3390/math10142536.

Full text
Abstract:
To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is presented to characterize their alterations or variations, given various emulated SDN scenarios. It is standard practice to use simulation environments to investigate the performance characteristics of SDNs, quantitatively and qualitatively; hence, the use of emulated scenarios to typify the investigated SDN in this paper. The key parameters studied analy
APA, Harvard, Vancouver, ISO, and other styles
28

Mueller, Andrew, Anthony Thomas, Jeffrey Brown, et al. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina." PLOS ONE 18, no. 3 (2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.

Full text
Abstract:
Geographic information systems (GIS) can be used to map mosquito larval and adult habitats and human populations at risk for mosquito exposure and possible arbovirus transmission. Along with traditional methods of surveillance-based targeted mosquito control, GIS can help simplify and target efforts during routine surveillance and post-disaster (e.g., hurricane-related flooding) to protect emergency workers and public health. A practical method for prioritizing areas for emergency mosquito control has been developed and is described here. North Carolina (NC) One Map was used to identify state-
APA, Harvard, Vancouver, ISO, and other styles
29

Ahmed, Waleed Khalid, Mohd Nazri bin Mohd Warip, Mohamed ElshaikhElobaid Said Ahmed, and Phaklen Ehkan. "Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET." International journal of Computer Networks & Communications 16, no. 1 (2024): 125–40. http://dx.doi.org/10.5121/ijcnc.2024.16108.

Full text
Abstract:
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algor
APA, Harvard, Vancouver, ISO, and other styles
30

Kim, Daehee, Sejun Song, and Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks." Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.

Full text
Abstract:
We propose an energy-efficient adaptive geosource multicast routing (EAGER) for WSNs. It addresses the energy and scalability issues of previous location based stateless multicast protocols in WSNs. EAGER is a novel stateless multicast protocol that optimizes location-based and source-based multicast approaches in various ways. First, it uses the receiver's geographic location information to save the cost of building a multicast tree. The information can be obtained during the receiver's membership establishment stage without flooding. Second, it reduces packet overhead, and in turn, energy us
APA, Harvard, Vancouver, ISO, and other styles
31

Yamazaki, Satoshi, Yu Abiko, and Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing." Wireless Communications and Mobile Computing 2020 (August 20, 2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.

Full text
Abstract:
In many wireless networks, such as ad hoc, sensor, and delay-tolerant networks, the destination node is determined from the source node by the flooding process. Flooding efficiency is important for nodes, because they are driven by limited batteries. In this paper, we propose a simple flooding scheme to transmit a route request (RREQ) message based on the remaining power of its own node without using control packets and complex calculations. We applied the proposed scheme to ad hoc on-demand distance vector (AODV) routing protocol as an example and carried out computer simulations (ns3). The r
APA, Harvard, Vancouver, ISO, and other styles
32

Park, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.

Full text
Abstract:
In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneous
APA, Harvard, Vancouver, ISO, and other styles
33

Khan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, et al. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things." Sensors 20, no. 1 (2020): 283. http://dx.doi.org/10.3390/s20010283.

Full text
Abstract:
Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance e
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Jaebeom, Byung-Seok Park, and Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid." Applied Sciences 9, no. 19 (2019): 3978. http://dx.doi.org/10.3390/app9193978.

Full text
Abstract:
In view of Smart-Grid architecture, wireless Last-Mile Network (LMN) devices as smart meters and intelligent home control machines are normally installed in harsh and lossy communication environment. In order to improve communication reliability of LMN, we proposed Wireless Topology Aware Content Centric Networking (TOP-CCN) protocol. TOP-CCN reduces channel access overhead of traditional Content Centric Networking and supports efficient multicast message transmission by using Multiple Point Relay (MPR), and Publisher MPR (PMPR). In addition, TOP-CCN LMN provides simple multi-hop forwarding sc
APA, Harvard, Vancouver, ISO, and other styles
35

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as
APA, Harvard, Vancouver, ISO, and other styles
36

Rani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny, and Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0." Sensors 21, no. 19 (2021): 6474. http://dx.doi.org/10.3390/s21196474.

Full text
Abstract:
The advancements in Industry 4.0 have opened up new ways for the structural deployment of Smart Grids (SGs) to face the endlessly rising challenges of the 21st century. SGs for Industry 4.0 can be better managed by optimized routing techniques. In Mobile Ad hoc Networks (MANETs), the topology is not fixed and can be encountered by interference, mobility of nodes, propagation of multi-paths, and path loss. To extenuate these concerns for SGs, in this paper, we have presented a new version of the standard Optimized Link State Routing (OLSR) protocol for SGs to improve the management of control i
APA, Harvard, Vancouver, ISO, and other styles
37

Khalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh, and Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks." Journal of High Speed Networks 27, no. 1 (2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.

Full text
Abstract:
Unlike communication networks which are traditionally assumed to be connected, Opportunistic networks (OppNets) are a type of wireless ad hoc networks with no guarantee of end-to-end path for data routing, which is due to node mobility, volatile links, and frequent disconnections. As such, data transmission among the nodes relies on their cooperation and this is realized in a store-and-carry fashion. To this end, several opportunistic routing techniques have been proposed in the literature, some of which using geocasting, a technique that consists of scheduling the message to a specific region
APA, Harvard, Vancouver, ISO, and other styles
38

Javaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.

Full text
Abstract:
To keep information recent between two nodes, two types of link sensing feed-back mechanisms are used: link layer (LL) and network layer (NL). In this paper, we model and evaluate these link sensing mechanisms in three widely used reactive routing protocols: ad hoc on-demand distance vector (AODV), dynamic source routing (DSR), and dynamic MANET on-demand (DYMO). Total cost paid by a routing protocol is the sum of cost paid in the form of energy consumed (in terms of packet reception/transmission) and time spent (in terms of processing route information). Routing operations are divided into tw
APA, Harvard, Vancouver, ISO, and other styles
39

Javaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.

Full text
Abstract:
To keep information recent between two nodes, two types of link sensing feed-back mechanisms are used: link layer (LL) and network layer (NL). In this paper, we model and evaluate these link sensing mechanisms in three widely used reactive routing protocols: ad hoc on-demand distance vector (AODV), dynamic source routing (DSR), and dynamic MANET on-demand (DYMO). Total cost paid by a routing protocol is the sum of cost paid in the form of energy consumed (in terms of packet reception/transmission) and time spent (in terms of processing route information). Routing operations are divided into tw
APA, Harvard, Vancouver, ISO, and other styles
40

Rahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.

Full text
Abstract:
Wireless networks have become essential to our daily lives, providing connectivity for a wide range of devices. However, with the increasing use of wireless networks, security has become a major concern. Media Access Control (MAC) address flooding, Dynamic Host Configuration Protocol (DHCP) spoofing, and rogue Secure Shell (SSH) are some of the most common security threats in wireless networks. These attacks can cause loss of confidentiality, integrity, and availability of network resources. In this study, vulnerabilities and challenges related to MAC address flooding, DHCP spoofing, and rogue
APA, Harvard, Vancouver, ISO, and other styles
41

Bhojannawar, Satish S., Shrinivas R. Managalwede, and Carlos F. Cruzado. "Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network." International Journal of Computer Network and Information Security 16, no. 6 (2024): 20–31. https://doi.org/10.5815/ijcnis.2024.06.02.

Full text
Abstract:
Wireless mesh networks (WMNs) extend and improve broadband Internet connectivity for the end-users roaming around the edges of the wired network. Amid the explosive escalation of users sharing multimedia content over the Internet, the WMNs need to support the effective implementation of various multimedia applications. The multimedia applications require assured quality of service (QoS) to fulfill the user requirements. The QoS routing in WMNs needs to guarantee the QoS requirements of multimedia applications. Admission control (AC) is the primary traffic control mechanism used to provide QoS
APA, Harvard, Vancouver, ISO, and other styles
42

Rouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.

Full text
Abstract:
Abstract Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total ene
APA, Harvard, Vancouver, ISO, and other styles
43

Hassan, Md Zahid, Md Mamun Hossain, and S. M. Jahangir Alam. "The Recent Variants of OLSR Routing Protocol in MANET: A Review." International Journal of Advanced Networking and Applications 16, no. 01 (2024): 6275–80. http://dx.doi.org/10.35444/ijana.2024.16106.

Full text
Abstract:
The dynamic topology of a mobile ad hoc network (MANET) distinguishes it as a decentralized kind of wireless network. When it comes to performance, a routing protocol is crucial. It is employed to ascertain and to find route that is both accurate and effective between two source and destination nodes to ensure that messages are delivered on time. We have examined the OLSR (Optimized Link State Routing) protocol in this research. Multi-point relays (MPRs), which are chosen nodes that forward broadcast messages throughout the flooding process, are the main idea employed in the protocol. MPRs are
APA, Harvard, Vancouver, ISO, and other styles
44

Kim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (2023): 3543. http://dx.doi.org/10.3390/electronics12173543.

Full text
Abstract:
The CAN (Controller Area Network) protocol is widely adopted for in-vehicle networks due to its cost efficiency and reliable transmission. However, despite its popularity, the protocol lacks built-in security mechanisms, making it vulnerable to attacks such as flooding, fuzzing, and DoS. These attacks can exploit vulnerabilities and disrupt the expected behavior of the in-vehicle network. One of the main reasons for these security concerns is that the protocol relies on broadcast frames for communication between ECUs (Electronic Control Units) within the network. To tackle this issue, we prese
APA, Harvard, Vancouver, ISO, and other styles
45

Bahashwan, Abdullah Ahmed, Mohammed Anbar, Selvakumar Manickam, et al. "HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN." PLOS ONE 19, no. 2 (2024): e0297548. http://dx.doi.org/10.1371/journal.pone.0297548.

Full text
Abstract:
Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of Service (DDoS) attacks against an SDN controller, with current detection methods lacking evaluation on unrealistic SDN datasets and standard DDoS attacks (i.e., high-rate DDoS attack). Therefore, a realistic dataset called HLD-DDoSDN is introduced, encompassing prevalent DDoS attacks specifically aimed at an SDN controller, such as User Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (U
APA, Harvard, Vancouver, ISO, and other styles
46

Latah, Majd, and Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks." International Journal of Advances in Intelligent Informatics 4, no. 1 (2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.

Full text
Abstract:
Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel intelligent approach that takes advantage of the SDN approach to detect Denial of Service (DoS) flooding attacks based on calculation of packet rate as the first step and followed by Support Vector Machine (SVM) classification as the second step. Flow concept is an essential idea in OpenFlow protocol, which represents a common interface between an SDN switch and an SDN control
APA, Harvard, Vancouver, ISO, and other styles
47

Samal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks." International journal of Computer Networks & Communications 15, no. 2 (2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.

Full text
Abstract:
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar Pallai, Gyanendra, Meenakshi Sankaran, and Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET." International journal of Computer Networks & Communications 13, no. 2 (2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.

Full text
Abstract:
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two mor
APA, Harvard, Vancouver, ISO, and other styles
49

Firman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack detection by using epsilon g
APA, Harvard, Vancouver, ISO, and other styles
50

Zafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.

Full text
Abstract:
The rudimentary notion of using MANET is that the exchange of information in between the portable nodes count on the swift arrangement of a momentary network. Also, each node in a MANET can travel spontaneously in any direction and can change its links to the other nodes repeatedly. In hybrid protocols, initially, the routing is established with the help of some proactively prospected routes and later on serves the request with the help of reactive flooding. In MANET, the security and the routing are the two most crucial and challenging aspects that open up a vast area for improvement. Securit
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!