Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks

2009

International audience; A multichannel MAC improves throughput in wireless mesh networks by multiplexing transmissions over orthogonal channels. In this paper, we propose an efficient way for constructing the wireless mesh structure associated with Molecular MAC, a multichannel MAC layer designed for efficient packet forwarding. Molecular MAC outperforms other classical approaches, but requires a specific structure for efficient operation. First, we propose a centralized protocol that provides an upper bound for constructing such a molecular structure through a MILP (Mixed Integer Linear Programming) formulation that maximizes network capacity. Then, we present two distributed self-stabiliz…

Routing protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networkingThroughput0102 computer and information sciences02 engineering and technology01 natural sciencesMultiplexinglaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureComputer Science::Information TheorySpanning treeWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunications010201 computation theory & mathematicsbusinessCommunication channelComputer network
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Performance of H.264 compressed video streams over 802.11b based MANETs

2004

We address the problem of video streams transmission in 802.11b based mobile ad-hoc networks (MANETs). Through the study of the delivery of a live encoded video stream, we expose the characteristics of different routing protocols and the infeasibility to provide QoS. The analysis shows the impact of a MANET on H.264 real-time video flows in terms of packet loss, end-to-end delay, jitter and distortion, and the behavior of H.264 error resilience tools in order to determine their effectiveness on such network scenarios. The results show that video traffic has demands that are hard to be met by a standard MANET, and that improvements are required in terms of routing protocols and QoS provision…

Routing protocolComputer sciencebusiness.industryWireless ad hoc networkPacket lossQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMacroblockMobile computingTraffic shapingbusinessResilience (network)Computer network
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

ECAR: an Energy/Channel Aware Routing Protocol For Cooperative Wireless Sensor Networks

2011

International audience; The proliferation of low power networks like Wireless Sensor Networks (WSN) rose up new challenges. Power conservation and channel quality become the most important parameters. Obviously, hop count based routing protocols are no more adapted to such networks having power limitations and channel problems. Several alternatives were suggested to cope with these constraints. In MAC layer for example, cooperative protocols were designed to enhance the channel use: the neighbor nodes help the source to retransmit its packets. However, if the path proposed by the routing protocol contains poor channels, the cooperative communications will not save all the packets. Therefore…

Routing protocolDynamic Source RoutingComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technology01 natural sciencesHop (networking)Routing Information Protocol[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad hoc On-Demand Distance Vector Routing0202 electrical engineering electronic engineering information engineeringDestination-Sequenced Distance Vector routingwireless sensor networksComputingMilieux_MISCELLANEOUSenergy efficiency0105 earth and related environmental sciencesZone Routing ProtocolStatic routing010505 oceanographyNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocol020206 networking & telecommunicationsDistance-vector routing protocolLink-state routing protocolOptimized Link State Routing ProtocolInterior gateway protocolbusinesscooperative relayingWireless sensor networkbiobjective routing protocolEfficient energy useComputer network
researchProduct

NICE-MRP: a Near-Optimal Radio-Interference Aware Multi-path Routing Protocol for MANETs

2013

International audience; Nowadays, with the miniaturization of communication devices, dense and highly mobile ad-hoc networks are very common. Besides, more and more devices have several radio interfaces. In such an environment, multi-path routing should be considered. Yet, only few multi-path ad-hoc routing protocols take into account the radio-interferences which might arise between two geographically close routes. Moreover, they generally only forbid the addition of interfering paths rather than looking for a different, more optimized, solution. This paper presents NICE-MRP, a novel multi-path routing protocol for mobile ad-hoc networks giving efficient solutions with respect to physical …

Routing protocolDynamic Source RoutingComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless Routing Protocol050801 communication & media studies02 engineering and technologyRouting Information Protocol[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications[INFO.INFO-MC] Computer Science [cs]/Mobile Computing0202 electrical engineering electronic engineering information engineeringZone Routing ProtocolStatic routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationLink-state routing protocolInterior gateway protocol[INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationbusinessComputer network
researchProduct

Distributed routing and channel allocation in multi-channel multi-hop ad hoc networks

2013

In this paper, we propose a novel routing protocol which is integrated with channel assignment for multi-channel multi-hop wireless ad hoc networks. In such a network, each node is equipped with three transceivers. One is always tuned on a control channel which is responsible for control and broadcast messages, and the other two perform as transmitter and receiver respectively for traffic flows on different data channels. The routing protocol works in an on-demand manner, and the proposed routing discovery process selects a path that potentially traverses nodes with lighter traffic load and lower number of carried flows. With a given number of non-overlapping channels, the optimal solution …

Routing protocolDynamic Source RoutingComputer scienceWireless ad hoc networkDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolHop (networking)Routing Information ProtocolControl channelDestination-Sequenced Distance Vector routingZone Routing ProtocolStatic routingChannel allocation schemesAdaptive quality of service multi-hop routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolAd hoc wireless distribution serviceDistance-vector routing protocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingInterior gateway protocolHazy Sighted Link State Routing ProtocolbusinessComputer network2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

RBCR: a Relay-Based Cooperative Routing Protocol for Cooperative Wireless Sensor Network

2011

International audience; In wireless sensor networks several constraints decrease communications performances. The main objective of this paper is to present a multi-objective routing algorithm RBCR that computes routing path based on the energy consumption and channel qualities. Additionally, the channel qualities are evaluated based on the presence of relay nodes. Compared to AODV and AODV associated to a cooperative MAC protocol, RBCR provides better performances.

Routing protocolDynamic Source RoutingComputer scienceWireless ad hoc networkDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]0211 other engineering and technologiesWireless Routing Protocol02 engineering and technologylaw.invention[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]RelaylawAd hoc On-Demand Distance Vector Routing0202 electrical engineering electronic engineering information engineeringComputingMilieux_MISCELLANEOUS021103 operations researchmulti-objective routing protocolbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsRouting (electronic design automation)cooperative relayingbusinessWireless sensor networkComputer network
researchProduct

A combined relay-selection and routing protocol for cooperative wireless sensor networks

2012

International audience; In wireless sensor networks several constraints decrease communications performances. In fact, channel randomness and energy restrictions make classical routing protocols inefficient. Therefore, the design of new routing protocols that cope with these constraints become mandatory. The main objective of this paper is to present a multi-objective routing algorithm RBCR that computes routing path based on the energy consumption and channel qualities. Additionally, the channel qualities are evaluated based on the presence of relay nodes. Compared to AODV and AODV associated to a cooperative MAC protocol, RBCR provides better performances in term of delivery ratio, power …

Routing protocolDynamic Source RoutingComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Distributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technologylaw.inventionRouting Information Protocol[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad hoc On-Demand Distance Vector RoutingRelaylaw0202 electrical engineering electronic engineering information engineeringDestination-Sequenced Distance Vector routingHierarchical routingZone Routing ProtocolStatic routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPolicy-based routingPath vector protocol020206 networking & telecommunicationsEnergy consumptionAd hoc wireless distribution serviceKey distribution in wireless sensor networksDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingInterior gateway protocol020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessWireless sensor networkEfficient energy useComputer network2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

A Network Protocol to Enhance Robustness in Tree-Based WSNs Using Data Aggregation

2007

This paper proposes a data gathering strategy for wireless sensor networks and an implementation based on the IEEE 802.15.4 standard. The algorithm combines the benefits of single-path and multi-path routing strategies in a hybrid solution which makes use of alternative paths when necessary. We adopt a caching and retransmission technique, which exploits some peculiar features of data aggregation, with the use of implicit acknowledgments of reception. The paper also discusses simulation results that show how the mentioned techniques, combined with exploitation of the features of the IEEE 802.15.4 standard have been used to obtain an efficient protocol that takes energy consumption into acco…

Routing protocolDynamic Source RoutingInter-Access Point ProtocolComputer scienceDistributed computingRetransmissionEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolMobile wireless sensor networkIEEE 802.11sZone Routing Protocolbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolEnergy consumptionAd hoc wireless distribution serviceWireless sensor networksKey distribution in wireless sensor networksOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingHazy Sighted Link State Routing ProtocolCommunications protocolbusinessWireless sensor networkComputer networkNeuRFon2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
researchProduct