• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 72
  • 11
  • 8
  • 8
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 144
  • 144
  • 144
  • 51
  • 46
  • 37
  • 37
  • 31
  • 30
  • 22
  • 22
  • 20
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy 04 August 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
12

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy 04 August 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
13

Comparative Performance Analysis of MANET Routing Protocols in Internet Based Mobile Ad-hoc Networks

Zabin, Mahe, Mannam, Roja Rani January 2012 (has links)
In crucial times, such as natural disasters like Earthquakes, Floods, military attack, rescue and emergency operations, etc., it is not possible to maintain an infrastructure. In these situations, wireless Mobile Ad-Hoc networks can be an alternative to wired networks. In our thesis, due to the importance of MANET (Mobile Ad-hoc Network) applications, we do research on MANET and its subtype IMANET (Internet based Mobile Ad-hoc Network). In MANETs, finding an optimum path among nodes is not a simple issue due to the random mobility of nodes and topology changes frequently. Simple routing algorithms like Shortest Path, Dijksta‟s and Link State fail to find route in such dynamic scenarios. A number of ad-hoc protocols (Proactive, Reactive, Hybrid and Position based) have been developed for MANETs. In this thesis, we have designed an IMANET in OPNET 14.5 and tested the performance of three different routing protocols namely OLSR (Optimum Link State Routing), TORA (Temporarily Ordered Routing Algorithm) and AODV (Ad-hoc On-demand Distance Vector) in different scenarios by varying the number of nodes and the size of the area. The experimental results demonstrate that among the three protocols, none of the routing protocol can ensure good quality HTTP and voice communication in all our considered scenarios.
14

On Achieving Secure Message Authentication for Vehicular Communications

Zhang, Chenxi January 2010 (has links)
Vehicular Ad-hoc Networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences, optimize traffic flow control systems, etc. Addressing security and privacy issues as the prerequisite of VANETs' development must be emphasized. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VANETs to achieve authentication, integrity, and validity. However, when the number of signatures received by a vehicle becomes large, a scalability problem emerges immediately, where a vehicle could be difficult to sequentially verify each received signature within 100-300 ms interval in accordance with the current Dedicated Short Range Communications (DSRC) protocol. In addition, there are still some unsolved attacks in VANETs such as Denial of Service (Dos) attacks, which are not well addressed and waiting for us to solve. In this thesis, we propose the following solutions to address the above mentioned security related issues. First of all, to address the scalability issues, we introduce a novel roadside unit (RSU) aided message authentication scheme, named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle. Secondly, we further consider the situation that RSUs may not cover all the busy streets of a city or a highway in some situations, for example, at the beginning of a VANETs' deployment period, or due to the physical damage of some RSUs, or simply for economic considerations. Under these circumstances, we further propose an efficient identity-based batch signature verification scheme for vehicular communications. The proposed scheme can make vehicles verify a batch of signatures once instead of one after another, and thus it efficiently increases vehicles' message verification speed. In addition, our scheme achieves conditional privacy: a distinct pseudo identity is generated along with each message, and a trust authority can trace a vehicle's real identity from its pseudo identity. In order to find invalid signatures in a batch of signatures, we adopt group testing technique which can find invalid signatures efficiently. Lastly, we identify a DoS attack, called signature jamming attack (SJA), which could easily happen and possibly cause a profound vicious impact on the normal operations of a VANET, yet has not been well addressed in the literature. The SJA can be simply launched at an attacker by flooding a significant number of messages with invalid signatures that jam the surrounding vehicles and prevent them from timely verifying regular and legitimate messages. To countermeasure the SJA, we introduces a hash-based puzzle scheme, which serves as a light-weight filter for excluding likely false signatures before they go through relatively lengthy signature verification process. To further minimize the vicious effect of SJA, we introduce a hash recommendation mechanism, which enables vehicles to share their information so as to more efficiently thwart the SJA. For each research solution, detailed analysis in terms of computational time, and transmission overhead, privacy preservation are performed to validate the efficiency and effectiveness of the proposed schemes.
15

MIMO-Assisted Congestion-Adaptive Routing for Multi-Hop Mobile Ad Hoc Networks

Liu, Jia-wei 14 July 2011 (has links)
A packet will be dropped when it arrives at a congested node in a routing path. The authors of [22] proposed the CRP protocol that can alleviate the congestion problem by splitting the traffic to the bypass nodes. In this thesis, we propose a new routing protocol, called MIMO-assisted congestion-adaptive routing protocol (MCRP for short), for multi-hop mobile ad hoc networks (MANETs for short). In MCRP, nodes periodically record the information of their rate-link/range-link neighbors. MCRP alleviates the congestion problem by dynamically adjusting the MIMO antenna mode and splitting the traffic to the downstream range-link neighbors. In addition, MCRP can quickly reestablish the routing path when it is broken due to node failure or mobility. Simulation results show that MCRP outperforms the existing protocols in terms of packet delivery ratio and end-to-end throughput.
16

Adaptive Routing Algorithm with QoS support in Heterogeneous Wireless Network

Shih, Tsung-Jung 17 August 2004 (has links)
With the progress of wireless radio technology and telecommunication, various wireless specifications and protocols form the unhandy heterogeneous network. The routing problems in heterogeneous network become popular researches nowadays. In this thesis, we integrate cellular (3G) network and Mobile Ad-Hoc Network (MANET) into a hybrid network. This hybrid network is called heterogeneous wireless network(HWN) with multi-cells architecture to overcome the weakness of cellular network and Ad-Hoc network. Based on HWN, we propose a routing algorithm with quality of service (QoS) supported for requirements in the original homogeneous cellular network and Ad-Hoc network. Simulation results show that HWN with the proposed algorithm has lower request block rate and shorter transmission time.
17

Adaptive Route Selection Scheme of Multiple Paths for Mobile Ad Hoc Network

Ke, Chu-wei 29 July 2008 (has links)
Mobile ad hoc network is an architecture which do not exist any infrastructure or centralized administration. There are many routing protocols have been proposed so far, such as AODV, DSR and CGSR. These protocols were classified as reactive in which routes are established only when required. Due to the movement of mobile nodes, network topology changes frequently, and the routing path could be broken easily. This phenomenon will cause higher routing overhead and delivery latency. In conventional routing protocols, the source-destination pair only establishes a single path for data transmission. These routing scheme, however, suffer from the drawback of node movement. When route broken, the source node must reconstruct another new path. This paper presents an adaptive routing protocol named Adaptive Route Selection Scheme of Multiple Paths for Mobile Ad Hoc Network (ARSMA). The aim of the work is to improve the delivery ratio. In the route request phase, source nodes will discovery two routes to the destination node, one for primary path, and the other for the backup path. During the discovery procedure, each node will estimate the link expire time through the movement speed and direction of the precursor node. When a link breakage is about to occur, source node will try to switch the transmission to the backup route.The simulation result shows that ARSMA is able to achieve a remarkable improvement in delivery ratio and end-to-end dealy.
18

Enhancing the Channel Utilization in Mobile Ad Hoc Networks

Huang, Yi-Siang 11 September 2008 (has links)
Mobile ad hoc networks are without centralized infrastructure, and suitable for the region that difficultly builds the basic network framework, for example, desert and ocean. The bandwidth in mobile ad hoc networks is likely to remain a scarce resource. A call request of a connection in a wireless network is blocked if there exits no bandwidth route. This blocking does not mean that the total system bandwidth capacity is less than the request, but that there is no path in which each link has enough residual unused bandwidth to satisfy the requirement. Like the routing in a datagram network, if packets of a virtual circuit can stream across multiple paths, we can select multiple bandwidth routes such that the total bandwidth can meet the requirement of a source-destination pair. Therefore, even though there is no feasible single path for a bandwidth-constrained connection, we may still have a chance to accept this one if we can find multiple bandwidth routes to meet the bandwidth constraint. In this dissertation, we propose a bandwidth-constrained routing algorithm to aggregate the bandwidth of multiple wireless links by splitting a data flow across multiple paths at the network layer. That is, it allows the packet flow of a source-destination pair to be delivered over multiple bandwidth routes with enough overall resources to satisfy a certain bandwidth requirement. Our algorithm considers not only the QoS requirement, but also the cost optimality of the routing paths to improve the overall network performance. Extensive simulations show that high call admission ratio and resource utilization are achieved with modest routing overheads. This algorithm can also tolerate the node moving, joining, and leaving. We also propose an algorithm, named efficient utilization polling (EUP), to support asynchronous data traffic at MAC layer by using the characteristics of Bluetooth technology. The algorithm uses a single bit in the payload header to carry the knowledge of queues in slaves for dynamically adapting the polling intervals for achieving the goals of high channel utilization and power conserving. In addition, we propose a differentiation mechanism, named shift-polling window (SPW). Based on EUP, the SPW differentiates the throughput from various classes, and still keeps the link utilization high and almost the same as that of the best-effort services. Extensive simulations are experimented on the behavior of the EUP and SPW by tuning the related parameters, such as polling interval, buffer size, and queue threshold level, etc., in order to verify the expectation of these methods.
19

QoS provisioning in mobile ad hoc network by improving buffer management

Lin, Yo-Ho 04 August 2009 (has links)
none
20

An evaluation of reputation spreading in mobile ad-hoc networks

Håkansson, Martin January 2004 (has links)
<p>The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivial, since such networks have no fixed infrastructure and therefor centralised security is not applicable. MANETs are also more sensitive to attacks due to their wireless communication channels and their spontaneous nature.</p><p>All kind of cooperation requires a sense of trust. The opinion about trust in other entities can be used as a mean to dynamically allow for secure cooperation in MANETs, as soft security. And also to counter some of the inherited security problems of MANETs.</p><p>To use opinions as a security paradigm in MANETs the opinions about other nodes has to be spread as reputation about a node. This reputation spreading can be done through spreading of opinions or the spreading of evidences about a nodes behaviour.</p><p>In this work evidence and reputation spreading are compared to each other. This comparison shows that they are quite similar from a security point of view but that they differ in scalability.</p>

Page generated in 0.0473 seconds