• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 5
  • 5
  • 5
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks

Chen, Chen January 2009 (has links)
In this paper, we propose a trust-based message propagation and evaluation framework to support the effective evaluation of information sent by peers and the immediate control of false information in a VANET. More specifically, our trust-based message propagation collects peers’ trust opinions about a message sent by a peer (message sender) during the propagation of the message. We improve on an existing cluster-based data routing mechanism by employing a secure and efficient identity-based aggregation scheme for the aggregation and propagation of the sender’s message and the trust opinions. These trust opinions weighted by the trustworthiness of the peers modeled using a combination of role-based and experience-based trust metrics are used by cluster leaders to compute a ma jority opinion about the sender’s message, in order to proactively detect false information. Malicious messages are dropped and controlled to a local minimum without further affecting other peers. Our trust-based message evaluation allows each peer to evaluate the trustworthiness of the message by also taking into account other peers’ trust opinions about the message and the peer-to-peer trust of these peers. The result of the evaluation derives an effective action decision for the peer. We evaluate our framework in simulations of real life traffic scenarios by employing real maps with vehicle entities following traffic rules and road limits. Some entities involved in the simulations are possibly malicious and may send false information to mislead others or spread spam messages to jam the network. Experimental results demonstrate that our framework significantly improves network scalability by reducing the utilization of wireless bandwidth caused by a large number of malicious messages. Our system is also demonstrated to be effective in mitigating against malicious messages and protecting peers from being affected. Thus, our framework is particularly valuable in the deployment of VANETs by achieving a high level of scalability and effectiveness.
2

A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks

Chen, Chen January 2009 (has links)
In this paper, we propose a trust-based message propagation and evaluation framework to support the effective evaluation of information sent by peers and the immediate control of false information in a VANET. More specifically, our trust-based message propagation collects peers’ trust opinions about a message sent by a peer (message sender) during the propagation of the message. We improve on an existing cluster-based data routing mechanism by employing a secure and efficient identity-based aggregation scheme for the aggregation and propagation of the sender’s message and the trust opinions. These trust opinions weighted by the trustworthiness of the peers modeled using a combination of role-based and experience-based trust metrics are used by cluster leaders to compute a ma jority opinion about the sender’s message, in order to proactively detect false information. Malicious messages are dropped and controlled to a local minimum without further affecting other peers. Our trust-based message evaluation allows each peer to evaluate the trustworthiness of the message by also taking into account other peers’ trust opinions about the message and the peer-to-peer trust of these peers. The result of the evaluation derives an effective action decision for the peer. We evaluate our framework in simulations of real life traffic scenarios by employing real maps with vehicle entities following traffic rules and road limits. Some entities involved in the simulations are possibly malicious and may send false information to mislead others or spread spam messages to jam the network. Experimental results demonstrate that our framework significantly improves network scalability by reducing the utilization of wireless bandwidth caused by a large number of malicious messages. Our system is also demonstrated to be effective in mitigating against malicious messages and protecting peers from being affected. Thus, our framework is particularly valuable in the deployment of VANETs by achieving a high level of scalability and effectiveness.
3

Multihop clustering algorithm for load balancing in wireless sensor networks

Israr, Nauman, Awan, Irfan U. January 2007 (has links)
The paper presents a new cluster based routing algorithm that exploits the redundancy properties of the sensor networks in order to address the traditional problem of load balancing and energy efficiency in the WSNs.The algorithm makes use of the nodes in a sensor network of which area coverage is covered by the neighbours of the nodes and mark them as temporary cluster heads. The algorithm then forms two layers of multi hop communication. The bottom layer which involves intra cluster communication and the top layer which involves inter cluster communication involving the temporary cluster heads. Performance studies indicate that the proposed algorithm solves effectively the problem of load balancing and is also more efficient in terms of energy consumption from Leach and the enhanced version of Leach.
4

Le routage dans les réseaux de capteurs multimédia / Routing in Wireless Multimedia Sensor Networks

Zeghilet, Houda 08 December 2013 (has links)
Aujourd'hui, la prolifération de matériel peu coûteux tels que les caméras et les microphones capables de capturer du contenu multimédia de façon ubiquitaire a conduit à l'émergence des réseaux de capteurs sans fil multimédia/vidéo (RCSFM /RCSFV). En conséquence, un grand éventail d'applications peuvent être projetées dans de nombreux domaines de la vie de tous les jours. Par rapport aux réseaux de capteurs traditionnels (RCSF), les RCSFVs présentent des défis uniques principalement en raison de la grande quantité de données à capturer et à transmettre au-dessus d'un réseau contraint en ressources. Dans ce travail, nous avons d'abord proposé un protocole de routage hiérarchique appelé ELPC (Energy Level Passive Clustering) dont l'objectif principal est d'améliorer la durée de vie du réseau en présence de flux vidéo. Ceci est obtenu grâce à l'équilibrage des charges au moment de la construction de la topologie où le rôle de tête de groupe est alterné entre les noeuds candidats en fonction de leur niveau d'énergie. La deuxième contribution consiste en un protocole de routage multichemin qui prend les interférences inter-chemin en considération. Au lieu de supprimer complètement les interférences, notre protocole de routage multichemin tente de les minimiser en se basant sur l'ajout d'informations supplémentaires sur les noeuds voisins dans les messages de construction de la topologie. De plus, nous proposons un schéma de files d'attente à priorités multiples où l'influence des types de données. Les résultats des simulations montrent que l'utilisation de chemins moins interférents combinée à un régime de multipriorité permet une meilleure qualité vidéo / Nowadays, the proliferation of inexpensive hardware such as CMOS cameras and microphones that are able to ubiquitously capture multimedia content has led to the emergence of wireless multimedia/video sensor networks (WMSN/WVSN). As a consequence, a wide spectrum of applications can be projected in many areas and everyday life. Compared to traditional WSNs, WVSNs introduce unique challenges due mainly to the big amount of data to be captured and transmitted over a constrained network. In this work, we first propose a cluster-based (hierarchical) routing protocol called ELPC (Energy Level Passive Clustering) where the main objective is to enhance the network lifetime while handling video applications. This is achieved thanks to a load balancing feature where the role of clusterheads is alternated among candidate nodes depending on their energy level. The second contribution consists in a multipath routing protocol with interference awareness. Instead of completely suppressing interferences, our multipath routing protocol tries to minimize them through a simple algorithm without extra overhead. Multiple paths are built at once while minimizing their inter-path interferences thanks to some additional information on neighboring nodes piggybacked on the route request messages. In addition to interference awareness, we propose a multiqueue multipriority scheme where the influence of data type in a video is considered. Simulation results show that using less interfering paths combined to a multiqueue multipriority scheme allows for better video quality
5

Minimum congestion routing for a 17 GHz wireless ad hoc network

Kotze, Daniel Johannes Van Wyk 03 1900 (has links)
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2011. / ENGLISH ABSTRACT: An investigation is made to find a suitable routing protocol for a millimeter wave ad hoc wireless network. It is discovered that a hierarchical routing protocol is ideal for a high node density. Due to the high bandwidth that is possibly available, with millimeter wave transmission, packets are used to keep links between nodes active and to control data packet congestion. Cluster leaders are elected and use token packets to provide nodes with more queued messages with more transmission chances, assisting the network in congestion control. Hello messages are sent frequently to keep routing information at nodes fresh and to detect broken links quickly. If a broken link is found a new route is readily available, within a second. A simulation is created to test the protocol. Changes are made to the original proactive cluster routing protocol to reduce the route length and lessen routing overhead. A theoretical model is developed to estimate the mean waiting time for a packet. Although insight is gained by modelling the latency with queueing theory it is suggested, due to the protocol’s complexity, to use other mathematical modelling techniques such as a Markov state model or a Petri net. / AFRIKAANSE OPSOMMING: Ondersoek word ingestel na ’n geskikte roete protokol vir ’n millimeter golflengte ad hoc radio pakkie netwerk. Daar word gevind dat ’n hi¨erargiese kluster roete protokol ideaal is vir ’n ho¨e digtheid van nodusse. As gevolg van die ho¨e bandwydte, wat moontlik beskikbaar is met millimeter golflengte transmissie, word pakkies gebruik om kommunikasie skakels tussen nodes in stand te hou en data pakkie verkeersopeenhoping te beheer. Kluster leiers word verkies en gebruik teken-pakkies om nodes met ’n groter data pakkie las meer transmissie kanse te gee. Sodoende word die verkeersopeenhoping van data pakkies verminder. Hallo pakkies word gereeld gestuur om die roete inligting vars te hou en gebroke kommunikasie skakels vinnig op te spoor. As ’n gebroke skakel gevind word, word ’n alternatiewe roete vinnig opgestel, binne ’n sekonde. ’n Simulasie word opgestel om die protokol te toets. Veranderinge aan die oorspronklike proaktiewe kluster protokol word aangebring om roete lengte te verklein en oorhoofse roete inligting kommunikasie te verminder. ’n Teoretiese model gebasseer op tou-staan teorie word ontwikkel om die wagtyd van ’n pakkie te bepaal. Alhoewel, insig verkry is deur die protokol te analiseer deur middel van tou-staan teorie, word daar voorgestel, as gevolg van die protokol se kompleksiteit, om eerder ander wiskundige modelleeringstegnieke te gebruik soos ’n Markov toestands model of ’n Petri net.

Page generated in 0.0906 seconds