• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 72
  • 11
  • 8
  • 8
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 144
  • 144
  • 144
  • 51
  • 46
  • 37
  • 37
  • 31
  • 30
  • 22
  • 22
  • 20
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Adaptation in Reputation Management Systems for Ad hoc Networks

Refaei, Mohamed Tamer 09 May 2007 (has links)
An ad hoc network adopts a decentralized unstructured networking model that depends on node cooperation for key network functionalities such as routing and medium access. The significance of node cooperation in ad hoc networks makes network survival particularly sensitive to insider node behavior. The presence of selfish or malicious nodes in an ad hoc network could greatly degrade the network performance and might even result in a total communication breakdown. Consequently, it is important for both security and performance reasons to discourage, expose, and react to such damaging misbehavior. Reputation management systems have been proposed to mitigate against such misbehavior in ad hoc networks. The functions of a reputation management system are to evaluate nodes' quality of behavior based on their cooperation (evaluation), distinguish between well-behaved and misbehaving nodes (detection), and appropriately react to misbehaving nodes (reaction). A significant number of reputation management systems have been proposed for ad hoc networks to date. However, there has been no attempt to consolidate all current research into a formal framework for reputation management systems. The lack of a formal framework is a potential weakness of the research field. For example, a formal comparison of proposed reputation management systems has remained difficult, mainly due to the lack of a formal framework upon which the comparison could be based. There is also a lack of formal metrics that could be used for quantitative evaluation and comparison of reputation management systems. Another major shortcoming in this research field is the assumption that the functions of reputation management (evaluation, detection, and reaction) are carried out homogeneously across time and space at different nodes. The dynamic nature of ad hoc networks causes node behavior to vary spatially and temporally due to changes in the local and network-wide conditions. Reputation management functions do not adapt to such changes, which may impact the system accuracy and promptness. We herein recognize an adaptive reputation management system as one where nodes carry out the reputation management functions heterogeneously across time and space according to the instantaneous perception of each of its surrounding network conditions. In this work, we address the above concerns. We develop a formal framework for reputation management systems upon which design, evaluation, and comparison of reputation management systems can be based. We define and discuss the different components of the framework and the interactions among them. We also define formal metrics for evaluation of reputation management systems. The metrics assess both, the effectiveness (security issues) of a reputation management system in detecting misbehavior and limiting its negative impact on the network, and its efficiency (performance issues) in terms of false positives and overhead exerted by the reputation management system on the network. We also develop ARMS, an autonomous reputation management system, based on the formal framework. The theoretical foundation of ARMS is based on the theory of Sequential Probability Ratio Test introduced by Wald. In ARMS, nodes independently and without cooperation manage their reputation management system functions. We then use ARMS to investigate adaptation in reputation management systems. We discuss some of the characteristics of an adaptive reputation management system such as sensitivity, adaptability, accuracy, and promptness. We consider how the choice of evaluation metric, typically employed by the evaluation function for assessment of node behavior, may impact the sensitivity and accuracy of node behavior evaluation. We evaluate the sensitivity and accuracy of node behavior evaluation using a number of metrics from the network and medium access layer. We then introduce a time-slotted approach to enhance the sensitivity of the evaluation function and show how the duration of an evaluation slot can adapt according to the network activity to enhance the system accuracy and promptness. We also show how the detection function can adapt to the network conditions by using the node's own behavior as a benchmark to set its detection parameters. To the best of our knowledge, this is the first work to explore the adaptation of the reputation management functions in ad hoc networks. / Ph. D.
32

An Extensible Information Dissemination Scheme over the Optimized Link State Routing Protocol for Mobile Ad Hoc Networks

Mehrjoo, Kaveh 10 October 2007 (has links)
A mobile ad hoc network (MANET) is formed by a collection of self-organizing nodes. Such networks are being deployed in a variety of environments, for example to provide mission-critical services in times of crises. Nodes participating in a MANET tend to have limited energy and computing resources and depend on various network-based resources to operate as a cohesive system. The same features such as dynamic and adaptive network topologies that make MANETs powerful also make the discovery and operation of network services a challenge. This thesis presents the design and implementation of an extensible information dissemination scheme that is integrated with the Optimized Link State Routing (OLSR) protocol to address the challenges of service discovery in mobile ad hoc networks. The thesis presents a detailed design of the information dissemination scheme based on the Naval Research Laboratory's (NRL) ProtoLib network protocol programming framework. In the proposed scheme, a solution that separates the routing process from the NRL OLSR routing protocol was designed, thus making OLSR a topology discovery protocol. This can further facilitate the implementation of various routing algorithms based on other metrics, such as the signal-to-noise ratio (SNR) of wireless links or the nodes' level of cooperation, when forwarding messages in the network. Additionally, a reusable event-driven programming interface to the NRL OLSR routing protocol was designed and implemented in this research. Events are triggered based on changes in the network topology. This programming interface can be used by other management and monitoring clients on the network for receiving real-time updates about link and topology changes as seen by OLSR. A priority message delivery scheme was developed that provides different quality of service (QoS) levels for information dissemination in mobile ad hoc networks. To ensure a fair use of the transport media and support various message sizes, a message fragmentation solution was implemented. The proposed information dissemination solution was then deployed in a real wireless ad-hoc environment for further validation and testing. Using experiments with six nodes and various test scenarios, this research verified the functionality and characterized the performance of the proposed system. It was observed that the link-state nature of information dissemination solution helped it to adapt to topology changes. It was also realized that service discovery latency after information convergence in the network was independent of the number of nodes between the service providers and clients. The experiments also confirmed that the immediate message delivery scheme provides superior quality of service to registered users in presence of radio interference and other delays caused by Multipoint Relay Nodes (MPR) message forwarding in OLSR. / Master of Science
33

Implementation and Experimental Evaluation of Wireless Ad hoc Routing Protocols

Lundgren, Henrik January 2005 (has links)
A wireless ad hoc network consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. New routing protocols that can adapt to the frequent topology changes induced by node mobility and varying link qualities are needed. During the last decade dozens of different ad hoc routing protocols have been proposed, optimized and partially compared, mainly through simulation studies. This thesis takes an experimental approach to the evaluation of ad hoc routing protocols. We argue that real world experiments are needed in order to complement simulation studies, and to gain practical experience and insights that can provide feedback to routing protocol design and existing simulation models. For example, we discovered a performance discrepancy for the AODV protocol between real world experiments and corresponding simulation studies. This so called ``communication gray zone'' problem was explored and countermeasures were implemented. As a result we could eliminate this performance problem to a large extent. We have implemented a software-based testbed called APE to carry out efficient and systematic experimental evaluation of ad hoc routing protocols. Experiments with up to 37 participating ad hoc nodes have demonstrated APE's ability to scale efficiently and assess repeatability between test runs. APE is part of our methodology for test repeatability in a real world ad hoc routing protocol testbed. It addresses the repeatability issue induced by stochastic factors like the radio environment and node mobility. Using APE, we have performed a systematic experimental evaluation of three ad hoc routing protocols (AODV, OLSR and LUNAR). Our results show that TCP does not work satisfactorily even in very small networks with limited mobility.
34

Multi-Criteria Direction Antenna Multi-Path Location Aware Routing Protocol for Mobile Ad Hoc Networks

Gajurel, Sanjaya January 2008 (has links)
No description available.
35

AD HOC NETWORKING OVERVIEW AND APPLICATION TO A BATTLEFIELD SENSORS SYSTEM

Kaba, James, Hashfield, Paul 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Ad hoc networking protocols enable the formation of self-organizing networks with automatic selfhealing operation in dynamic environments. There are a number of existing or planned ad hoc implementations and a body of research on protocols and performance. Ad Hoc technologies promise significant impact in future communications architectures. This paper presents a general overview of ad hoc networking and presents specific examples, including a recent implementation of a prototype ad hoc networked sensor system. The protocols used have unique characteristics derived by tailoring particular protocols to the specific application requirements. The potential relevance of ad hoc networking to possible telemetry applications is discussed.
36

Systems Approach to Cross-Layer Optimization of a Complex Wireless Environment

Gwanvoma, Stephen B. 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / This paper presents a method for the optimization of mixed networks that incorporates a mixed layer optimization of performance features. The expanded integrated Network Enhanced Telemetry (iNET) system envisioned telemetering for large and complex networks which will require core telemetry networks with ad hoc extensions for coverage. Organizing such a network has been successfully accomplished in simulations using a K-mean clustering algorithm. This paper shows how the features of these network elements will be captured and disseminated in a real system. This management of network elements across multiple layers is characterized as cross-layer optimization. This paper will also show how such cross layer features can be combined for a globally optimum solution. It shows by example how the iNET system comprising multiple ground stations, gateways, frequency, nodes, and three performance measures can be optimized to achieve overall optimal system performance.
37

A Software Framework for Prioritized Spectrum Access in Heterogeneous Cognitive Radio Networks

Yao, Yong January 2014 (has links)
Today, the radio spectrum is rarely fully utilized. This problem is valid in more domains, e.g., time, frequency and geographical location. To provide an efficient utilization of the radio spectrum, the Cognitive Radio Networks (CRNs) have been advanced. The key idea is to open up the licensed spectrum to unlicensed users, thus allowing them to use the so-called spectrum opportunities as long as they do not harmfully interfere with licensed users. An important focus is laid on the limitation of previously reported research efforts, which is due to the limited consideration of the problem of competition among unlicensed users for spectrum access in heterogeneous CRNs. A software framework is introduced, which is called PRioritized Opportunistic spectrum Access System (PROAS). In PROAS, the heterogeneity aspects of CRNs are specifically expressed in terms of cross-layer design and various wireless technologies. By considering factors like ease of implementation and efficiency of control, PROAS provides priority scheduling based solutions to alleviate the competition problem of unlicensed users in heterogenous CRNs. The advanced solutions include theoretical models, numerical analysis and experimental simulations for performance evaluation. By using PROAS, three particular CRN models are studied, which are based on ad-hoc, mesh-network and cellular-network technologies. The reported results show that PROAS has the ability to bridge the gap between research results and the practical implementation of CRNs.
38

Implementation of a Manycast Protocol in a Partitionable Mobile Ad hoc Network

Nykvist, Gustav January 2009 (has links)
<p>Wireless communication has grown very popular, and communication is the key</p><p>to success in many situations. However, most of the common technologies today</p><p>rely on infrastructure and in disaster situations infrastructure might be lost or</p><p>get severely overloaded. This master thesis concerns intermittently connected</p><p>mobile ad hoc networks. A network in which the devices may move freely in any</p><p>direction and still be able to communicate. To be able to demonstrate a network</p><p>protocol called random-walk gossip-based manycast (RWG) my assignment has been</p><p>to implement this protocol using off-the-shelf hardware and software.</p><p>RWG is a multi-hop and partition-tolerant mobile ad hoc manycast network</p><p>protocol. Multi-hop refers to information being able to hop between more than</p><p>two nodes in a network and partition-tolerant means that the protocol works even</p><p>though a network is partitioned. Manycast means that the information should</p><p>be successfully delivered to K of all the potential nodes in the area. The RWG</p><p>protocol makes use of four different packet types, request to forward (REQF), ac-</p><p>knowledgement (ACK), ok to forward (OKTF) and be silent (BS). The actual data</p><p>being sent is carried by REQFs, and is referred to as messages. When a message</p><p>is sent it takes what could be described as a random walk among the nodes in the</p><p>network, hence the name.</p><p>The implementation of the RWG protocol resides in user-space and depends on</p><p>the IEEE 802.11b standard and the raw socket that is specified in the BSD socket</p><p>API. It is written in C and was developed on a machine running Ubuntu. It runs</p><p>on systems that use Linux 2.6 kernels and it supports cross-compiling for ARM</p><p>based devices such as the Nokia N810 internet tablet and the Android dev phone</p><p>1. To be able to demonstrate the protocol I developed my own client application.</p><p>Moreover, an already existing application for Android, Portable Open Search and</p><p>Identification Tool (POSIT), was successfully extended to run on top of the RWG</p><p>implementation. The extension was developed by people in the POSIT project</p><p>and tested in a physical experiment covering five devices.</p><p>The report covers the RWG protocol, the system choice, the implementation</p><p>and the testing of the implementation.</p>
39

Test Environment Design for Wireless Vehicle Communications

Peter Lerchbaumer, Alejandro Ochoa January 2007 (has links)
<p>The research in wireless communications and in-vehicle computing systems has opened up new fields of applications for transportation systems. Vehicular ad hoc networks (VANETs) emerge as a contribution to the solution of providing safer and more efficient roads and to increase passenger safety. This thesis treats different issues that influence the performance of wireless vehicle communication systems and it proposes a general design procedure for the construction of a test environment for VANETs.</p><p>A comprehensive survey of the different parameters that affect the system performance in the field of wireless vehicle communications is provided. These parameters are then analysed and quantified to serve as guidelines when identifying and designing the different components of the test environment. One such component is a simulator that enables VANET performance evaluation and allows identification of bottlenecks in the network functionality. In addition, suggestions for a hardware platform and an operating system for the development of a suitable on-board test-bed for performance measurements are presented.</p><p>The design procedure of such a test environment is intended to be used by researchers and engineers working in the field of wireless communications and ad hoc networking with special regard to the automotive sector.</p>
40

Group Membership and Communication in Highly Mobile Ad Hoc Networks

Berlin 09 November 2001 (has links) (PDF)
No description available.

Page generated in 0.4263 seconds