Spelling suggestions: "subject:"amobile Ad-Hoc betworks"" "subject:"amobile Ad-Hoc conetworks""
41 |
Performance Analysis of New Algorithms for Routing in Mobile Ad-hoc Networks. The development and performance evaluation of some new routing algorithms for mobile ad-hoc networks based on the concepts of angle direction and node density.Elazhari, Mohamed S. January 2010 (has links)
Mobile Ad hoc Networks (MANETs) are of great interest to researchers and have become very popular in the last few years. One of the great challenges is to provide a routing protocol that is capable of offering the shortest and most reliable path in a MANET in which users are moving continuously and have no base station to be used as a reference for their position. This thesis proposes some new routing protocols based on the angles (directions) of the adjacent mobile nodes and also the node density. In choosing the next node in forming a route, the neighbour node with the closest heading angle to that of the node of interest is selected, so the connection between the source and the destination consists of a series of nodes that are moving in approximately the same direction. The rationale behind this concept is to maintain the connection between the nodes as long as possible. This is in contrast to the well known hop count method, which does not consider the connection lifetime. We propose three enhancements and modifications of the Ad-hoc on demand distance vector (AODV) protocol that can find a suitable path between source and destination using combinations and prioritization of angle direction and hop count. Firstly, we consider that if there are multiple routing paths available, the path with the minimum hop count is selected and when the hop counts are the same the path with the best angle direction is selected.
Secondly, if multiple routing paths are available the paths with the best angle direction are chosen but if the angles are the same (fall within the same specified segment), the path with minimum hop count is chosen. Thirdly, if there is more than one path available, we calculate the average of all the heading angles in every path and find the best one (lowest average) from the source to the destination. In MANETs, flooding is a popular message broadcasting technique so we also propose a new scheme for MANETS where the value of the rebroadcast packets for every host node is dynamically adjusted according to the number of its neighbouring nodes. A fixed probabilistic scheme algorithm that can dynamically adjust the rebroadcasting probability at a given node according to its ID is also proposed; Fixed probabilistic schemes are one of the solutions to reduce rebroadcasts and so alleviate the broadcast storm problem. Performance evaluation of the proposed schemes is conducted using the Global Mobile Information System (GloMoSim) network simulator and varying a number of important MANET parameters, including node speed, node density, number of nodes and number of packets, all using a Random Waypoint (RWP) mobility model. Finally, we measure and compare the performance of all the proposed approaches by evaluating them against the standard AODV routing protocol. The simulation results reveal that the proposed approaches give relatively comparable overall performance but which is better than AODV for almost all performance measures and scenarios examined.
|
42 |
Dead Reckoning Location Service For Mobile Ad Hoc NetworksKumar, Vijay January 2002 (has links)
No description available.
|
43 |
Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc NetworksSardana, Divya January 2009 (has links)
No description available.
|
44 |
Enhancing dynamic recommender selection using multiple rules for trust and reputation models in MANETsShabut, Antesar R.M., Dahal, Keshav P., Awan, Irfan U. January 2013 (has links)
No
|
45 |
Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization GoalsWang, Yating 11 May 2016 (has links)
With the proliferation of fairly powerful mobile devices and ubiquitous wireless technology, traditional mobile ad hoc networks (MANETs) now migrate into a new era of service-oriented MANETs wherein a node can provide and receive service from other nodes it encounters and interacts with. This dissertation research concerns trust management and its applications for service-oriented MANETs to answer the challenges of MANET environments, including no centralized authority, dynamically changing topology, limited bandwidth and battery power, limited observations, unreliable communication, and the presence of malicious nodes who act to break the system functionality as well as selfish nodes who act to maximize their own gain.
We propose a context-aware trust management model called CATrust for service-oriented ad hoc networks. The novelty of our design lies in the use of logit regression to dynamically estimate trustworthiness of a service provider based on its service behavior patterns in a context environment, treating channel conditions, node status, service payoff, and social disposition as 'context' information. We develop a recommendation filtering mechanism to effectively screen out false recommendations even in extremely hostile environments in which the majority recommenders are malicious. We demonstrate desirable convergence, accuracy, and resiliency properties of CATrust. We also demonstrate that CATrust outperforms contemporary peer-to-peer and Internet of Things trust models in terms of service trust prediction accuracy against collusion recommendation attacks.
We validate the design of trust-based service management based on CATrust with a node-to-service composition and binding MANET application and a node-to-task assignment MANET application with multi-objective optimization (MOO) requirements. For either application, we propose a trust-based algorithm to effectively filter out malicious nodes exhibiting various attack behaviors by penalizing them with trust loss, which ultimately leads to high user satisfaction. Our trust-based algorithm is efficient with polynomial runtime complexity while achieving a close-to-optimal solution. We demonstrate that our trust-based algorithm built on CATrust outperforms a non-trust-based counterpart using blacklisting techniques and trust-based counterparts built on contemporary peer-to-peer trust protocols. We also develop a dynamic table-lookup method to apply the best trust model parameter settings upon detection of rapid MANET environment changes to maximize MOO performance. / Ph. D.
|
46 |
Stochastic Petri Net Models of Service Availability in a PBNM System for Mobile Ad Hoc NetworksBhat, Aniket Anant 15 July 2004 (has links)
Policy based network management is a promising approach for provisioning and management of quality of service in mobile ad hoc networks. In this thesis, we focus on performance evaluation of this approach in context of the amount of service received by certain nodes called policy execution points (PEPs) or policy clients from certain specialized nodes called the policy decision points (PDPs) or policy servers. We develop analytical models for the study of the system behavior under two scenarios; a simple Markovian scenario where we assume that the random variables associated with system processes follow an exponential distribution and a more complex non-Markovian scenario where we model the system processes according to general distribution functions as observed through simulation. We illustrate that the simplified Markovian model provides a reasonable indication of the trend of the service availability seen by policy clients and highlight the need for an exact analysis of the system without relying on Poisson assumptions for system processes. In the case of the more exact non-Markovian analysis, we show that our model gives a close approximation to the values obtained via empirical methods. Stochastic Petri Nets are used as performance evaluation tools in development and analysis of these system models. / Master of Science
|
47 |
Recommendation based trust model with an effective defence scheme for MANETsShabut, Antesar R.M., Dahal, Keshav P., Bista, Sanat K., Awan, Irfan U. January 2015 (has links)
Yes / The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
|
48 |
Opportunistic communication schemes for unmanned vehicles in urban search and rescueScone, Sion January 2010 (has links)
In urban search and rescue (USAR) operations, there is a considerable amount of danger faced by rescuers. The use of mobile robots can alleviate this issue. Coordinating the search effort is made more difficult by the communication issues typically faced in these environments, such that communication is often restricted. With small numbers of robots, it is necessary to break communication links in order to explore the entire environment. The robots can be viewed as a broken ad hoc network, relying on opportunistic contact in order to share data. In order to minimise overheads when exchanging data, a novel algorithm for data exchange has been created which maintains the propagation speed of flooding while reducing overheads. Since the rescue workers outside of the structure need to know the location of any victims, the task of finding their locations is two parted: 1) to locate the victims (Search Time), and 2) to get this data outside the structure (Delay Time). Communication with the outside is assumed to be performed by a static robot designated as the Command Station. Since it is unlikely that there will be sufficient robots to provide full communications coverage of the area, robots that discover victims are faced with the difficult decision of whether they should continue searching or return with the victim data. We investigate a variety of search techniques and see how the application of biological foraging models can help to streamline the search process, while we have also implemented an opportunistic network to ensure that data are shared whenever robots come within line of sight of each other or the Command Station. We examine this trade-off between performing a search and communicating the results.
|
49 |
Rörelsebaserad kommunikation i mobila ad hoc-nätverk / Movement based communication in mobile ad hoc networksWandemo, Daniel January 2007 (has links)
<p>I många nätverk antas det att någon form av fix infrastruktur existerar och att nätverkets olika noder kan använda denna för att kommunicera med varandra. I ett ad hoc-nätverk antar man att det inte finns någon fix infrastruktur och att noderna måste använda varandra för att kunna kommunicera. Ett exempel på ett ad hoc-nätverk kan vara bärbara datorer sammankopplade med infraröda länkar under ett möte. När ad hoc-nätverket är mobilt innebär det att noderna rör sig.</p><p>I detta arbete har de tre protokollen Epidemic, GeoMean och GeoMove tillsammans med de två rörelsemodellerna Waypoint och den utökade slumpmässiga vandringen implementerats i en nyskriven simulator för denna typ av nätverk.</p><p>De två Geo-protokollen är nyutvecklade och syftar till att använda geografisk information för att underlätta kommunikationen i denna kategori av nätverk tillsammans med den nya utvidgade slumpmässiga vandringsmodellen.</p> / <p>In many networks, some kind of fix infrastructure is assumed to exist and the nodes of the network can use this infrastructure to communicate with each other. In an ad hoc network one assumes that there don't exist any kind of fix infrastructure and that the nodes must use each other to be able to communicate. One example of an ad hoc network could be laptops connected together with infrared links during a meeting. When an ad hoc network is mobile it implies that the nodes are moving.</p><p>In this work, the three protocols Epidemic, GeoMean and GeoMove together with the two mobility models Waypoint and Extended Random Walk, have been implemented in a newly written simulator for this kind of network.</p><p>The two Geo-protocols are newly developed and aim to use geographical information to aid communication in this category of networks together with the new Extended Random Walk model.</p>
|
50 |
Enhancing Privacy for Mobile Networks : Examples of Anonymity Solutions and Their AnalysisAndersson, Christer January 2005 (has links)
<p>Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.</p><p>One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.</p><p>This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation</p><p>and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc</p><p>networks, a required building block for ambient intelligence.</p>
|
Page generated in 0.0368 seconds