Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "ad-hoc network" wg kryterium: Temat


Wyświetlanie 1-24 z 24
Tytuł:
Security Requirements and Mechanisms in Vehicular Ad-Hoc Networks (VANET)
Autorzy:
Rajkumar, M. Newlin
Nithya, M.
Krithika, M.
Powiązania:
https://bibliotekanauki.pl/articles/1193569.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
ARAN
ARIADNE
Ad-hoc Networks
NDM
SEAD
VANET
Vehicular Ad-hoc Network
mobile Ad-hoc network
Opis:
In recent years, Vehicles are becomes the more intellectual system which is operated with the help of radio communications. Thus the vehicles are formed the network for communications based on the mobile Ad- hoc network (MANET) which is called as Vehicular Ad-hoc Network (VANET). However security in Vehicular Ad-hoc Networks (VANET) should become great challenges, due to communication development, because of dynamically changing protocols, high mobility of vehicles and also high partitioned network. In this paper we address the security requirements of vehicles and needed mechanisms to avoid the threats and attacks in VANET.
Źródło:
World Scientific News; 2016, 41; 200-207
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Study on the optimization and performance of TDMA allocation algorithm in ships’ ad hoc networks
Autorzy:
Han, X.
Li, Y.
Liu, G.
Powiązania:
https://bibliotekanauki.pl/articles/259367.pdf
Data publikacji:
2018
Wydawca:
Politechnika Gdańska. Wydział Inżynierii Mechanicznej i Okrętownictwa
Tematy:
timeslot allocation algorithm
ships
ad hoc network
Opis:
This paper analyzes the requirements of the information transmission network of ship integrated condition monitoring system, and proposes a design scheme of ship condition monitoring system based on wireless ad hoc network. The wireless ad hoc network protocol was designed, its networking process was analyzed in detail, and the network transmission performance of the monitoring system was tested. The results proved the feasibility of the system. The above solution can be used for the transmission of ship state information that satisfies the requirements of wireless transmission, and has important theoretical and practical significance. The slot allocation algorithm has been receiving extensive attention as an important part of the TDMA system research. This paper analyzes the summarization and summarization of TDMA time slot assignment algorithms from several aspects such as slot synchronization, existing slot allocation algorithm, and slot assignment model, laying an important foundation for researchers to do further research. In the TDMA system, time is divided into non-overlapping time frames, and the time frames are divided into non-overlapping time slots. Each node in the network performs corresponding operations in each time slot.
Źródło:
Polish Maritime Research; 2018, S 2; 170-175
1233-2585
Pojawia się w:
Polish Maritime Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Autonomous Navigation Control of UAV Using Wireless Smart Meter Devices
Autorzy:
Ueda, Kiyoshi
Miyoshi, Takumi
Powiązania:
https://bibliotekanauki.pl/articles/308294.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad-hoc network
routing
smart meter network
UAV delivery
Opis:
In preparation for the upcoming home delivery services that rely on Unmanned Aerial Vehicles (UAVs), we developed a new multi-hop radio network that is laid over a smart meter network transferring electric energy information only. In this network, a UAV follows, for navigation purposes, the topology of a virtual network overlaid on the physical smart meter network. We established a service management control method which does not rely on image analysis or map information processing, i.e. processes that consume precious power resources of the UAV. Instead, navigation is based on the routing technology. The current distance between the UAV and a node of the smart meter network is measured by means of the radio transmission loss value, therefore determining the position of the UAV. A two-layer network model has been proposed. One layer consists of a network of nodes in a residential area with scattered buildings – a location that is safer to navigate – while the other is an access network of nodes in a densely populated area. Then, we proposed methods to determine the direction of movement towards the next hop node on the data-link layer and the end node on the network layer, which is the target destination. We implemented a software-based test system and verified the effectiveness of the proposed methods.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 64-72
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On-demand Bandwidth and Stability Based Unicast Routing in Mobile Adhoc Networks
Autorzy:
Basarkod, P. I.
Manvi, S. S.
Powiązania:
https://bibliotekanauki.pl/articles/963935.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Mobile Ad hoc Network
QoS
stability
routing
mobility
Opis:
Characteristics of mobile ad hoc networks (MANETs) such as lack of central coordination, dynamic topology and limited resources pose a challenging problem in quality of service (QoS) routing. Providing an efficient, robust and low overhead QoS unicast route from source to destination is a critical issue. Bandwidth and route stability are the major important QoS parameters for applications where long duration connections are required with stringent bandwidth requirements for multimedia applications. This paper proposes an On-demand Bandwidth and Stability based Unicast Routing scheme (OBSUR) in MANET by adding additional QoS features to existing Dynamic Source Routing (DSR) protocol. The objective of the OBSUR is to provide QoS satisfied, reliable and robust route for communicating nodes. The scheme works in following steps. (1) Each node in the network periodically (small regular intervals) estimates bandwidth availability, node and link stability, buffer availability, and stability factor between nodes. (2) Construction of neighbor stability and QoS database at every node which is used in route establishment process. (3) The unicast path is constructed by using route request and route reply packets with the help of route information cache, and (4) route maintenance in case of node mobility and route failures. Simulation results show that there is an improvement in terms of traffic admission ratio, control overhead, packet delivery ratio, end to end delay and throughput as compared to Route Stability Based QoS Routing (RSQR) in MANETs.
Źródło:
International Journal of Electronics and Telecommunications; 2014, 60, 1; 27-39
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Framework for Detection of Selfishness in Multihop Mobile Ad Hoc Networks
Autorzy:
Konorski, J.
Orlikowski, R.
Powiązania:
https://bibliotekanauki.pl/articles/308968.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
reputation system
selfish behavior
wireless ad hoc network
Opis:
The paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behavior. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer theory-based selfishness detection framework (DST-SDF) with some mathematical background and simulation analysis.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 2; 34-40
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Neuroplasticity and Microglia Functions Applied in Dense Wireless Networks
Autorzy:
Kułacz, Łukasz
Kliks, Adrian
Powiązania:
https://bibliotekanauki.pl/articles/308840.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad-hoc network
brain inspired communication
glial cells
neurons
Opis:
This paper presents developments in the area of brain-inspired wireless communications relied upon in dense wireless networks. Classic approaches to network design are complemented, firstly, by the neuroplasticity feature enabling to add the learning ability to the network. Secondly, the microglia ability enabling to repair a network with damaged neurons is considered. When combined, these two functionalities guarantee a certain level of fault-tolerance and self-repair of the network. This work is inspired primarily by observations of extremely energy efficient functions of the brain, and of the role that microglia cells play in the active immune defense system. The concept is verified by computer simulations, where messages are transferred through a dense wireless network based on the assumption of minimized energy consumption. Simulation encompasses three different network topologies which show the impact that the location of microglia nodes and their quantity exerts on network performance. Based on the results achieved, some algorithm improvements and potential future work directions have been identified.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 39-46
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On-demand QoS and Stability Based Multicast Routing in Mobile Ad Hoc Networks
Autorzy:
Basarkod, P. I.
Manvi, S. S.
Powiązania:
https://bibliotekanauki.pl/articles/308940.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
mobile ad hoc network
mobility
multicast routing
QoS
stability
Opis:
Finding a connection path that remains stable for suciently longer period is critical in mobile ad hoc networks due to frequent link breaks. In this paper, an on-demand Quality of Service (QoS) and stability based multicast routing (OQSMR) scheme is proposed, which is an extension of ad hoc on-demand multicast routing protocol (ODMRP) to provide QoS support for real time applications. The scheme works as follows. Each node in the network periodically estimates the parameters, i.e., node and link stability factor, bandwidth availability, and delays. Next step is creation of neighbor stability and QoS database at every node by using estimated parameters. The last sequence is multicast path construction by using, route request and route reply packets, and QoS and stability information, i.e., link/node stability factor, bandwidth and delays in route information cache of nodes, and performing route maintenance in case of node mobility and route failures. The simulation results indicate that proposed OQSMR demonstrates reduction in packet overhead, improvement in Packet Delivery Ratio (PDR), and reduction in end-to-end delays as compared to ODMRP, and Enhanced ODMRP (E-ODMRP).
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 98-112
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Quality of service support, security and OSPF interconnection in a MANET using OLSR
Autorzy:
Adjih, C.
Minet, P.
Muhlethaler, P.
Baccelli, E.
Plesse, T.
Powiązania:
https://bibliotekanauki.pl/articles/308208.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
mobile ad hoc network
OLSR
quality of service
security
OSPF
interconnection
Opis:
The MANET networks are of prime interest for military networks. One of the proeminent routing protocols for MANET is OLSR, and indeed, OLSR has been used in many evaluations and experiments of MANETs. As OLSR is on its way to standardization, there are still a number of extensions that are useful and sometimes necessary for practical use of OLSR networks: such extensions are quality of service support, security, and OSPF interconnection. In this paper, we present the architecture, design, specifications and implementations that we made to integrate these features in a military test-bed. This test-bed is a real MANET comprising 18 nodes. These nodes communicate by radio and use the IEEE 802.11b MAC protocol. The OLSR routing protocol updates the routing table used by the IP protocol to forward packets.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 70-76
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Adaptive Load Balancing Ad Hoc Routing Scheme Inspired by True Slime Mold
Autorzy:
Katada, Hiroshi
Yamazaki, Taku
Miyoshi, Takumi
Powiązania:
https://bibliotekanauki.pl/articles/309453.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
adaptive ad hoc routing
ad hoc network
engineering neo biomimetic
physarum solver
true slime mold
Opis:
Engineering neo-biomimetics, i.e. imitation models based on body structures and behavior of living organisms, relied upon to solve complex problems, have been studied in various fields. In distributed networks, such as ad-hoc networks and wireless sensor networks, the behavior of a variety of true slime molds which are capable of constructing multipath flow networks based on the amount of body, has been studied. Ad hoc networks only consist of mobile terminals (nodes) that can relay packets along an established route. However, link relations and the available bandwidth of the nodes change dynamically due to the mobility of nodes. In addition, the speed of communication between nodes also varies due to node positions and their communication-related quality. Thus, practical use of ad-hoc networks still remains an issue, because it is difficult to establish stable routes under such environments. This study aims to propose an adaptive load balancing routing technique that adaptively diversifies the transmission paths based on the available bandwidth, residual battery life, and the data transmission volume, by applying a mathematical model of slime mold routing, known as the physarum solver. We confirm the effectiveness of its adaptive behavior in dynamic environments using computer simulations.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 14-22
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Scalable Multicast Routing Protocol for Mobile Ad-Hoc Networks
Autorzy:
Qabajeh, Liana Khamis
Powiązania:
https://bibliotekanauki.pl/articles/2142308.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad-hoc network
MAODV
ODMRP
position-based multicast routing protocol
simulated performance evaluation
Opis:
The multicasting technique supports a variety of applications that require data to be instantaneously transmitted to a set of destination nodes. In environments with continuously moving nodes, such as mobile ad-hoc networks, the search for efficient routes from sources to the projected destinations is a common issue. Proposed Windmill protocol provides a scalable multicast solution for mobile ad-hoc networks. Windmill aims to improve routing protocol’s performance by introducing a hierarchal distributed routing algorithm and dividing the area into zones. Additionally, it attempts to demonstrate better scalability, performance and robustness when faced with frequent topology changes, by utilizing restricted directional flooding. A detailed and extensive simulated performance evaluation has been conducted to assess Windmill and compare it with multicast ad-hoc on-demand distance vector (MAODV) and on-demand multicast routing protocols (ODMRP). Simulation results show that the three protocols achieved high packet delivery rates in most scenarios. Results also show that Windmill is capable of achieving scalability by maintaining the minimum packet routing load, even upon increasing the nodes’ speed, the number of sources, the number of group members and the size of the simulated network. The results also indicate that it offers superior performance and is well suited for ad-hoc wireless networks with mobile hosts. The trade-off of using Windmill consists in slightly longer paths – a characteristic that makes it a good choice for applications that require simultaneous data transmission to a large set of nodes.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 58--74
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A static test-bed for the evaluation and optimization of multihop wireless network protocols
Autorzy:
Bongartz, H. H.-J.
Bachran, T.
Powiązania:
https://bibliotekanauki.pl/articles/308216.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
MANET
mobile ad hoc network
multihop wireless network
multicast
wireless test-bed
simulation
explicit multicast
Opis:
We investigate the performance of multicast transmissions in a simple stationary wireless multihop ad hoc network test-bed. We compare several methods for MANET multicast using implementations for the protocols MOLSR, SMOLSR and SMF with an approach that uses explicit multicast and link-layer retries for reliable multicast. Results from the test-bed are compared with simulation results. We find that implementing a combination of explicit multicast with a retry mechanism gives the most promising results in test-bed and simulation compared with other approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 62-69
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Authenticated Routing Protocol for Wireless Ad Hoc Network Based on Small World Model
Autorzy:
Wang, Daxing
Xu, Leying
Powiązania:
https://bibliotekanauki.pl/articles/1844509.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small world model
wireless ad hoc network
routing protocol
authentication theory
AODV routing protocol
Opis:
Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 3; 425-430
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An identity-based broadcast encryption scheme for mobile ad hoc networks
Autorzy:
Ng, C. Y.
Mu, Y.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/309104.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
dynamic mobile ad hoc network
identity-based
non-interactive
secure communication protocol
group key management
Opis:
Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity-based ad hoc protocol for mobile devices to construct a group key for a setup of a secure communication network in an efficient way and support dynamic changing of network topology. Unlike group key management protocols proposed previously in the literature, mobile devices can use our protocol to construct the group key by observing the others' identity, like the MAC address, which distinguishes the device from the others. In contrast to other interactive protocols, we only need one broadcast to setup the group key and member removal is also highly efficient. Finally, we discuss the security issues and provide security proofs for our protocol.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 1; 24-29
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heavy Gas Cloud Boundary Estimation and Tracking using Mobile Sensors
Autorzy:
Krzysztoń, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309177.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deployment strategies
heavy gas cloud boundary tracking
MANET
mobile ad hoc network
mobility models
sensor networks
Opis:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cloud, create temporary network topology and finally, cover the cloud boundary, and track the moving cloud. The utility and efficiency of the proposed strategies has been justified through simulation experiments.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 38-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Distributed certificate authority in cluster-based manet using multi secret sharing scheme
Autorzy:
Azza, M
Hacene, S B
Powiązania:
https://bibliotekanauki.pl/articles/101930.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
secret sharing scheme
clustering
mobile ad hoc network
overdetermined system
linear equations
Galois fields
certificate authority
Opis:
Providing secure communications in mobile ad hoc networks (MANET) is an important and difficult problem, due to a lack of a key management infrastructure. The authentication is an important security service in (MANETs). To provide a node authentication service we use a fully distributed certificate authorities (FDCA) based on the threshold cryptography. In this paper we propose an efficient and verifiable multi secret sharing scheme in cluster-based MANET with a low computation system. Our scheme is based on the overdetermined linear system equation in Galois fields GF(2r). We have analyzed our scheme based on security and performance criteria, and compared with existing approaches. The efficiency of our proposed schemes was verified and evaluated by simulation. Simulation results show that this approach is scalable.
Źródło:
Advances in Science and Technology. Research Journal; 2015, 9, 28; 1-9
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis and choice of routing protocols in wireless Ad Hoc networks based on the use the neural network
Analiza i wybór protokołów routingu w sieciach bezprzewodowych Ad-Hoc w oparciu o sieci neuronowe
Autorzy:
Оksiiuk, Oleksandr
Krotov, Vadym
Powiązania:
https://bibliotekanauki.pl/articles/408327.pdf
Data publikacji:
2019
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
routing protocol
wireless Ad Hoc network
throughput of network
neural network
network of special appointment
protokół routingu
bezprzewodowa sieć Ad-Hoc
sieć neuronowa
sieć dedykowana
sieć specjalnego przeznaczenia
Opis:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
Obecnie intensywnie rozwija się kierunek naukowy w zakresie budowy sieci telekomunikacyjnych o zmiennej topologii z wykorzystaniem urządzeń bezprzewodowych. Jednak istniejące urządzenia i protokoły koncentrują się wyłącznie na komórkowe lub bezprzewodowe lokalne sieci (WLAN), niezależnie od potencjału sieci Ad-Hoc. Sieci Ad-Hoc są to sieci bezprzewodowe, które mogą pracować bez infrastruktury i bez scentralizowanego zarządzania siecią. W takich sieciach węzły mogą dynamicznie poruszać się po sieci. Mobilność oraz dynamiczna topologia to kluczowe cechy sieci AdHoc. W ostatnich latach opracowano wiele protokołów dla sieci Ad-Hoc zaprojektowanych dla różnych scenariuszy organizacji routingu. Opisano funkcje routingu w sieciach bezprzewodowych Ad-Hoc i przedstawiono przegląd odpowiednich protokołów routingu. W artykule zaproponowano metodę wyboru protokołu sieci bezprzewodowej z wykorzystaniem matematycznego aparatu sieci neuronowych.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2019, 9, 1; 53-56
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved MCBDS for defending against gray hole and black hole attacks in MANETs
Autorzy:
Haghighi, A.
Mizanian, K.
Mirjalily, G.
Powiązania:
https://bibliotekanauki.pl/articles/102490.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
mobile ad hoc network
cooperative bait detection scheme (CBDS)
modified CBDS (MCBDS)
black hole
gray hole
MANET
Opis:
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduced false-positive rate more than before and on average it dropped to zero. The proposed method employs Network Simulator-2 (NS-2) to validate the effectiveness under different scenarios. Simulation results show that improved MCBDS has same performance as CBDS in terms of throughput and end-to-end delay and as much as the presence of malicious nodes increased, improved MCBDS performs better than CBDS.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 30; 1-8
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Świadomość sytuacyjna węzła mobilnej sieci doraźnej
Situational awareness of mobile ad-hoc network nodes for radio reconnaissance systems
Autorzy:
Głowacka, J.
Amanowicz, M.
Powiązania:
https://bibliotekanauki.pl/articles/210093.pdf
Data publikacji:
2013
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
telekomunikacja
świadomość sytuacyjna
zaufanie
metody wnioskowania
wojskowe sieci doraźne
rozpoznanie elektroniczne
telecommunications
situation awareness
trust
inference methods
military ad-hoc network
radio reconnaissance
Opis:
W artykule została przedstawiona potrzeba budowania świadomości węzłów w zakresie bezpieczeństwa oraz identyfikacja możliwych rozwiązań dotyczących tej tematyki. Następnie przedstawiono koncepcję mechanizmu budowania świadomości sytuacyjnej węzła oraz jego użycie w mobilnej sieci doraźnej wykorzystywanej w rozpoznaniu elektronicznym.
The article depicts the needs for building the situational awareness of military MANET nodes and identifying of some possible solutions. The authors present novel approach for situational awareness assessment and trust-based mechanisms that increase the efficiency and security of communications in military radio reconnaissance system.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2013, 62, 3; 95-109
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Blockchain System for Secure and Efficient UAV-to-Vehicle Communication in Smart Cities
Autorzy:
Evangeline, Suganthi
Lenin, Ashmiya
Kumaravelu, Vinoth Babu
Powiązania:
https://bibliotekanauki.pl/articles/2202980.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
blockchain technology
elliptic curve digital signature algorithm (ECDSA-192)
intelligent transportation system (ITS)
smart contract
unmanned aerial vehicle (UAV)
securehash algorithm (SHA)
vehicular ad hoc network (VANET)
Opis:
In a smart city environment, Intelligent Transportation System (ITS) enables the vehicle to generate and communicate messages for safety applications. There exists a challenge where the integrity of the message needs to be verified before passing it on to other vehicles. There should be a provision to motivate the honest vehicles who are reporting the true event messages. To achieve this, traffic regulations and event detections can be linked with blockchain technology. Any vehicle violating traffic rules will be issued with a penalty by executing the smart contract. In case any accident occurs, the vehicle nearby to the spot can immediately send the event message to Unmanned Aerial Vehicle (UAV). It will check for its credibility and proceed with rewards. The authenticity of the vehicle inside the smart city area is verified by registering itself with UAVs deployed near the city entrance. This is enabled to reduce the participation of unauthorized vehicles inside the city zone. The Secure Hash Algorithm (SHA256) and Elliptic Curve Digital Signature Algorithm (ECDSA-192) are used for communication. The result of computation time for certificate generation and vehicles involvement rate is presented.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 133--138
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel and Distributed Simulation of Ad Hoc Networks
Autorzy:
Sikora, A.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309034.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
distributed simulation
mobile network
software systems
Opis:
Modeling and simulation are traditional methods used to evaluate wireless network design. This paper addresses issues associated with the application of parallel discrete event simulation to mobile ad hoc networks design and analysis. The basic characteristics and major issues pertaining to ad hoc networks modeling and simulation are introduced. The focus is on wireless transmission and mobility models. Particular attention is paid to the MobASim system, a Javabased software environment for parallel and distributed simulation of mobile ad hoc networks. We describe the design, performance and possible applications of presented simulation software.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 76-84
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Localization in wireless sensor networks: classification and evaluation of techniques
Autorzy:
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/331429.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
sieć sensorowa
sieć bezprzewodowa
sieć ad hoc
system lokalizacji
symulacja sieci
wireless sensor network
ad hoc networks
localization
location systems
network simulation
Opis:
Recent advances in technology have enabled the development of low cost, low power and multi functional wireless sensing devices. These devices are networked through setting up a Wireless Sensor Network (WSN). Sensors that form a WSN are expected to be remotely deployed in large numbers and to self-organize to perform distributed sensing and acting tasks. WSNs are growing rapidly in both size and complexity, and it is becoming increasingly difficult to develop and investigate such large and complex systems. In this paper we provide a brief introduction to WSN applications, i.e., properties, limitations and basic issues related to WSN design and development. We focus on an important aspect of the design: accurate localization of devices that form the network. The paper presents an overview of localization strategies and attempts to classify different techniques. A set of properties by which localization systems are evaluated are examined. We then describe a number of existing localization systems, and discuss the results of performance evaluation of some of them through simulation and experiments using a testbed implementation.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2012, 22, 2; 281-297
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative Study of Wireless Sensor Networks Energy-Efficient Topologies and Power Save Protocols
Autorzy:
Niewiadomska-Szynkiewicz, E.
Kwaśniewski, P.
Windyga, I.
Powiązania:
https://bibliotekanauki.pl/articles/309032.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
energy conservation protocols
topology control
wireless sensor network
Opis:
Ad hoc networks are the ultimate technology in wireless communication that allow network nodes to communicate without the need for a fixed infrastructure. The paper addresses issues associated with control of data transmission in wireless sensor networks (WSN) - a popular type of ad hoc networks with stationary nodes. Since the WSN nodes are typically battery equipped, the primary design goal is to optimize the amount of energy used for transmission. The energy conservation techniques and algorithms for computing the optimal transmitting ranges in order to generate a network with desired properties while reducing sensors energy consumption are discussed and compared through simulations. We describe a new clustering based approach that utilizes the periodical coordination to reduce the overall energy usage by the network.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 68-75
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multiobjective Approach to Localization in Wireless Sensor Networks
Autorzy:
Marks, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309060.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
localization
simulated annealing
stochastic optimization
wireless sensor network
Opis:
Wireless sensor network localization is a complex problem that can be solved using different types of methods and algorithms. Nowadays, it is a popular research topic. What becomes obvious is that there are several criteria which are essential when we consider wireless sensor networks. Our objective is to determine accurate estimates of nodes location under the constraints for hardware cost, energy consumption and computation capabilities. In this paper the application of stochastic optimization for performing localization of nodes is discussed. We describe two phase scheme that uses a combination of the trilateration method, along with the simulated annealing optimization algorithm. We investigate two variants of our technique, i.e., centralized and distributed. The attention is paid to the convergence of our algorithm for different network topologies and trade-off between its efficiency and localization accuracy.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 59-67
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization of structure of neural models using distributed computing environment
Optymalizacja struktury modeli neuronowych z zastosowaniem rozproszonego środowiska obliczeniowego
Autorzy:
Tomanek, A.
Przystałka, P.
Adamczyk, M.
Powiązania:
https://bibliotekanauki.pl/articles/327638.pdf
Data publikacji:
2006
Wydawca:
Polska Akademia Nauk. Polskie Towarzystwo Diagnostyki Technicznej PAN
Tematy:
rozproszone obliczenia
klastery typu ad-hoc
sztuczna sieć neuronowa
modelowanie heurystyczne
optymalizacja struktury sieci neuronowej
distributed computing
ad-hoc computing clusters
artificial neural network
heuristic modelling
optimizing neural network architecture
Opis:
The main aim of this paper was to identify the optimal structures of considered neural models using the distributed computing environment. In this paper distributed optimizing of feed-forward neural network architectures for given problems is presented. The computing environment is composed of a few important packages and modules and has been created by the authors in order to aid developing some soft computing methods [4], where a lot of calculations are needed. At the beginning the authors decided to adapt a simple systematic-search algorithm that searches through every possible combination of network structures. Since this class of algorithms requires large amount of computation the distributed computing system was employed.
Głównym celem przeprowadzonych badań było zidentyfikowania optymalnej struktury rozpatrywanych modeli neuronowych z zastosowaniem środowiska do obliczeń rozproszonych. W artykule zaprezentowano zastosowanie systemu do rozproszonej optymalizacji struktury sztucznej sieci neuronowej typu perceptron wielowarstwowy dla zadanego problemu. Prezentowane środowisko obliczeniowe jest złożone z kilku pakietów oraz modułów i zostało utworzone przez autorów w celu wspomagania rozwoju metodologii modelowania heurystycznego [4], gdzie niezbędnych jest wiele obliczeń. W początkowym stadium rozwoju oprogramowania autorzy zastosowali prosty algorytm przeszukiwania systematycznego każdej możliwej kombinacji struktury sieci. Ponieważ tego typu algorytmy z reguły wymagają dużych mocy obliczeniowych, postanowiono wykorzystać system omawiany w niniejszym artykule.
Źródło:
Diagnostyka; 2006, 4(40); 15-18
1641-6414
2449-5220
Pojawia się w:
Diagnostyka
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-24 z 24

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies