Search results for "Wireless ad hoc network"

showing 10 items of 62 documents

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

Methodology and trends for an intelligent transport system in developing countries

2018

Abstract Increasingly, the technologies that are used in telecommunications contribute to improve intelligent transport systems. These technologies are systems that offer several concepts like vehicular ad hoc networks, which allow reduction of traffic accidents, traffic congestion and consequently increase road safety and the comfort of road users. Developing countries in general and those of sub-Sahara in particular do not have telecommunication infrastructures, even road infrastructures for the implementation of an intelligent transport system. Moreover, with the serious increase in vehicles in these countries, the problem of traffic regulation arise especially in the inter-urban context…

050210 logistics & transportationGeneral Computer ScienceWireless ad hoc networkComputer science05 social sciencesTransport network1. No povertyDeveloping country020206 networking & telecommunicationsContext (language use)02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Risk analysis (engineering)Traffic congestion11. Sustainability0502 economics and business0202 electrical engineering electronic engineering information engineeringIntelligent transportElectrical and Electronic EngineeringIntelligent transportation systemComputingMilieux_MISCELLANEOUSRoad user
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network

2010

This paper proposes an advanced, robust and flexible solution that applies the (revised) concept of Always Best Connected (ABC) Network, typical of multimode modern mobile devices, to Wireless Sensor Network. Hostile environments and unpredictable conditions (e.g. interferences) can negatively affect communication range, potentially increasing the number of unconnected nodes in random deployments. Multimode Wireless Sensor Network (MM-WSN) is provided with an adaptive mechanism for environmental condition evaluation and with the ability of self-configuring itself for optimal networking independence of detected conditions. Proposed solution is based on advanced smart nodes provided with mult…

Base stationKey distribution in wireless sensor networksWireless ad hoc networkRobustness (computer science)business.industryComputer scienceDistributed computingMobile wireless sensor networkWirelessNetwork performancebusinessWireless sensor networkComputer network2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

2007

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless ad hoc networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyIEEE 802.11Packet lossNetwork performancebusinessInformation SystemsComputer networkJournal of Communications and Networks
researchProduct

The role of the Access Point in Wi-Fi networks with selfish nodes

2009

In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…

Computer scienceWireless ad hoc networkBidirectional trafficDistributed computingmedia_common.quotation_subjectMechanism designThroughputDistributed coordination functionNash equilibriumWi-fi networks[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.11Settore ING-INF/04 - Automaticaselfish nodesSelfishnessmedia_commonIEEE 802.11business.industrySettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWLAN; selfish nodesWLANbusinessRandom accessComputer network
researchProduct

A continuous-space analytical approach for relay node placement in hybrid cellular and ad hoc networks

2009

A hybrid network is composed of a cellular component and an ad hoc component connected by a relay node, for the purpose of coverage extension and/or capacity improvement. In this paper, we analyze the capacity of such a hybrid network by employing a continuous-space analytical methodology based on circular geometry for uniformly distributed nodes. To achieve maximal overall capacity, the relay node needs to be placed in an optimum location between the base station and the mobile station located at the boundary of the hybrid network. Numerical results show that for obtaining the optimum overall capacity for the hybrid network, the placement of the relay node should be in a range which is nei…

Computer sciencebusiness.industryWireless ad hoc networkNode (networking)Mobile computinglaw.inventionBase stationChannel capacityRelaylawMobile stationComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryComputer network2009 6th International Symposium on Wireless Communication Systems
researchProduct

Mobile Encounter Network - the missing data link

2008

In this paper, we discuss about the applicability of a short-range wireless communication scheme called Mobile Encounter Network (MEN). Encounters between devices communicating while moving allows ad-hoc -type data transfer to be performed. A background for the emerging of such networks is given. The essential properties of the MEN data transfer are specified. Based on this, the role of MEN as a data transfer medium is discussed. The conclusion is that such networking technique may provide additional value compared to the traditional wireless communication.

Delay-tolerant networkingKey distribution in wireless sensor networksAdaptive quality of service multi-hop routingWireless ad hoc networkWireless networkComputer sciencebusiness.industryDistributed computingMobile computingWireless WANMobile ad hoc networkbusinessComputer networkProceedings of the 12th international conference on Entertainment and media in the ubiquitous era
researchProduct

An Optimized Roadside Units (RSU) Placement for Delay-Sensitive Applications in Vehicular Networks

2015

International audience; Over the last few years, a lot of applications have been developed for Vehicular Ad Hoc NETworks (VANETs) to exchange information between vehicles. However, VANET is basically a Delay Tolerant Network (DTN) characterized by intermittent connectivity, long delays and message losses especially in low density regions [1]. Thus, VANET requires the use of an infrastructure such as Roadside Units (RSUs) that permits to enhance the network connectivity. Nevertheless, due to their deployment cost, RSUs need to be optimally deployed. Hence, the main objective of this work is to provide an optimized RSUs placement for delay-sensitive applications in vehicular networks that imp…

Delay-tolerant networkingOptimization problemVehicular ad hoc networkmodelCovering location optimizationComputer sciencebusiness.industryWireless ad hoc networkDistributed computingcoveragedeployment cost[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsframeworkGenetic algorithmgenetic algorithm[ SPI ] Engineering Sciences [physics]real-time applicationsbusinessDijkstra's algorithmComputer networkdelay constraints
researchProduct