Professional Documents
Culture Documents
MANNET:
ABSTRACT
oj
ec
t.c
o
sp
r
(MANETs) can be classified into three groups: flooding-based, advertisementbased, and social contact-based. The first two groups of methods can easily have
de
nt
high overhead and low scalability. They are mainly developed for connected
MANETs, in which end-to-end connectivity among nodes is ensured. The third
group of methods adapts to the opportunistic nature of disconnected MANETs but
rs
tu
fails to consider the social interests (i.e., contents) of mobile nodes, which can be
exploited to improve the file searching efficiency. In this paper, we propose a P2P
ea
contentbased file sharing system, namely SPOON, for disconnected MANETs. The
system uses an interest extraction algorithm to derive a nodes interests from its
al
y
files for content-based file searching. For efficient file searching, SPOON groups
common-interest nodes that frequently meet with each other as communities. It
fin
takes advantage of node mobility by designating stable nodes, which have the most
frequent contact with community members, as community coordinators for
intracommunity searching, and highly mobile nodes that visit other communities
frequently as community ambassadors for intercommunity searching. An interestoriented file searching scheme is proposed for high file searching efficiency.
real trace and then conducted event-driven experiment with two real traces and
NS2 simulation with simulated disconnected and connected MANET scenarios.
oj
ec
t.c
o
The test results show that our system significantly lowers transmission cost and
improves file searching success rate compared to current methods.
sp
r
ABSTRACT
de
nt
rs
tu
hybrid random walk, (3) one-dimensional i.i.d. mobility, and (4) one-dimensional
hybrid random walk. Two mobility time-scales are investigated in this paper: (i)
fast mobility where node mobility is at the same time-scale as data transmissions
ea
and (ii) slow mobility where node mobility is assumed to occur at a much slower
al
y
fin
ABSTRACT
oj
ec
t.c
o
sp
r
specified area, and multiple groups move uniformly across the network. We also
leverage limited packet redundancy to speed up the packet transmission, i.e., each
de
nt
source node is allowed to distribute at most f copies of each packet in its delivery
process. Specifically, we first propose an effective multi-hop schedulingrouting
scheme under the correlated mobility model, and then develop the closed-form
rs
tu
expressions of both per node throughput capacity and expected end-to-end delay.
We further explore the trade-off between throughput capacity and packet delay by
fin
al
y
ea
using packet redundancy f. The simulation studies validate our theoretical results.
ABSTRACT
oj
ec
t.c
o
sp
r
to the intrinsic distributed nature of the existing peer-to-peer paradigm. This paper
proposes a new protocol,capable of ensuring a Quality of Service (QoS) level for
de
nt
VoIP calls over a MANET and to manage a higher number of calls in the system.
Novel metric and utility functions are proposed to perform the best path selection
from source to destination nodes, respecting the QoS parameters for VoIP quality.
rs
tu
ea
Performance evaluation shows that the proposed approach led to better network
fin
al
y
ABSTRACT
oj
ec
t.c
o
attracted more and more attention in recent years. The efficiency of file querying
suffers from the distinctive properties of such networks including node mobility
and limited communication range and resource. An intuitive method to alleviate
this problem is to create file replicas in the network. However, despite the efforts
on file replication, no research has focused on the global optimal replica creation
sp
r
de
nt
rs
tu
an important role in determining file availability. Actually, a node that has a higher
meeting frequency with others provides higher availability to its files. This
ea
becomes even more evident in sparsely distributed MANETs, where nodes meet
disruptively. In this paper, we introduce a new concept of resource for file
al
y
fin
delay and derive a resource allocation rule to minimize the average querying delay.
We further propose a distributed file replication protocol to realize the proposed
rule. Extensive trace-driven experiments with synthesized traces and real traces
show that our protocol can achieve shorter average querying delay at a lower cost
than current replication protocols.
6. AASR:
Authenticated
Anonymous
Secure
Routing
for
oj
ec
t.c
o
ABSTRACT
sp
r
protocols have been proposed, the requirement is not fully satisfied. The existing
protocols are vulnerable to the attacks of fake routing packets or denial-of-service
(DoS) broadcasting, even the node identities are protected by pseudonyms. In this
de
nt
rs
tu
defend the potential active attacks without unveiling the node identities.The keyencrypted onion routing with a route secret verification message, is designed to
ea
fin
al
y
ABSTRACT
oj
ec
t.c
o
sp
r
components: trust from direct observation and trust from indirect observation. With
direct observation from an observer node, the trust value is derived using Bayesian
de
nt
inference, which is a type of uncertain reasoning when the full probability model
can be defined. On the other hand, with indirect observation, also called
secondhand information that is obtained from neighbor nodes of the observer node,
rs
tu
the trust value is derived using the Dempster-Shafer theory, which is another type
of uncertain reasoning when the proposition of interest can be derived by an
ea
indirect method. Combining these two components in the trust model, we can
obtain more accurate trust values of the observed nodes in MANETs. We then
al
y
evaluate our scheme under the scenario of MANET routing. Extensive simulation
results show the effectiveness of the proposed scheme. Specifically, throughput
fin
and packet delivery ratio can be improved significantly with slightly increased
average end to- end delay and overhead of messages.
VANNET:
oj
ec
t.c
o
ABSTRACT
sp
r
carry and forward messages from a source vehicle to a nearby RSU and, if needed,
route these messages through the RSU network and, finally send them from an
RSU to the destination vehicle. Our system is mostly critical for users who are far
de
nt
apart and want to communicate using their vehicles onboard units. Many recent
paradigms, like social networks, will greatly benefit from a system like ours to
enable users on the road to exchange different types of data.We evaluate the
rs
tu
performance of our system using the ns2 simulation platform and compare our
scheme to existing solutions. The results prove the feasibility and efficiency of our
fin
al
y
ea
scheme.
ABSTRACT
oj
ec
t.c
o
particularly Long Term Evolution, are gaining lots of momentum, so are LTEconnected vehicles. Whilst one may envision an LTE-connected vehicle as a nicely
designed vehicle with sophisticated equipment, a conventional vehicle with a
sp
r
de
nt
rs
tu
connected vehicles (UEs) to select the most adequate radio access, out of the
available ones (e.g., WiFi and LTE), that maximizes QoE throughout the mobility
ea
path. The policies are communicated to the users following 3GPP standards and
are enforced by the UEs. They take into account the service type, the mobility
al
y
feature, and the traffic dynamics over the backhauls of the different available
accesses. Two different models were proposed to model the network selection
fin
process. The first one is based on Multiple Attribute Decision Making (MADM)
techniques, while the second one is based on Markov Decision Process (MDP).
Moreover, the network selection process is modeled using a Time Continuous
Markov Chain and the performance of the proposed framework (VECOS) is
extensively evaluated through NS2-based simulations considering the case of two
wireless access technologies, namely WiFi and cellular networks. The obtained
results illustrate that in comparison to conventional vertical handoff mechanisms
wherebyWiFi is always selected whenever it becomes available, the proposed
framework ensures better QoS and achieves better QoE throughout the time of the
received service and the mobility path of the user, and that is even in case of errors
oj
ec
t.c
o
LOCALIZATION:
sp
r
ABSTRACT:
With
the
de
nt
Networks
increasing
number
of
location-dependent
applications,
rs
tu
positioning and tracking a mobile device becomes more and more important to
enable pervasive and context-aware service. While extensive research has been
performed in physical localization and logical localization for satellite, GSM and
ea
al
y
fin
oj
ec
t.c
o
sp
r
compared to GPS.
de
nt
ABSTRACT
rs
tu
ea
filtering method for indoor positioning and tracking applications using a wireless
sensor network. The method combines position, speed, and heading measurements
al
y
with the aim of achieving more accurate position estimates both in the short and
the long term. Using as a base, the well-known extended Kalman filter, we have
fin
oj
ec
t.c
o
sensors in the short term and extend it over a long period of time.
summary, our methods benefit from the reduced observation error of the inertial
WIRELESS NETWORKS:
sp
r
Wireless Networks
de
nt
ABSTRACT
rs
tu
(QoS) requirements for wireless applications. At the same time, a wireless hybrid
network that integrates a mobile wireless ad hoc network (MANET) and a wireless
infrastructure network has been proven to be a better alternative for the next
ea
al
y
routing for MANETs, hybrids networks inherit invalid reservation and race
condition problems in MANETs. How to guarantee the QoS in hybrid networks
remains an open problem. In this paper, we propose a QoS-Oriented Distributed
fin
routing protocol (QOD) to enhance the QoS support capability of hybrid networks.
Taking advantage of fewer transmission hops and anycast transmission features of
the hybrid networks, QOD transforms the packet routing problem to a resource
scheduling problem. QOD incorporates five algorithms: 1) a QoS-guaranteed
neighbor selection algorithm to meet the transmission delay requirement, 2) a
oj
ec
t.c
o
redundant data to further improve the transmission QoS. Analytical and simulation
results based on the random way-point model and the real human mobility model
show that QOD can provide high QoS performance in terms of overhead,
transmission delay, mobility-resilience, and scalability.
de
nt
sp
r
ABSTRACT
rs
tu
ea
al
y
fin
n or n=
log n ln n times better than the optimal capacity of the snapshot data collection
scenario in order in the sense of the worst case, where N is the number of
snapshots in a continuous data collection task. The simulation results also validate
that the proposed algorithms significantly improve network capacity compared
oj
ec
t.c
o
sp
r
ABSTRACT
de
nt
and applications, since it does not require any routing table and route discovery
overhead to send a packet to the destination. However, the ZigBee tree routing has
the fundamental limitation that a packet follows the tree topology; thus, it cannot
rs
tu
provide the optimal routing path. In this paper, we propose the shortcut tree routing
(STR) protocol that provides the near optimal routing path as well as maintains the
ea
advantages of the ZigBee tree routing such as no route discovery overhead and low
memory consumption. The main idea of the shortcut tree routing is to calculate
al
y
remaining hops from an arbitrary source to the destination using the hierarchical
addressing scheme in ZigBee, and each source or intermediate node forwards a
fin
packet to the neighbor node with the smallest remaining hops in its neighbor table.
The shortcut tree routing is fully distributed and compatible with ZigBee standard
in that it only utilizes addressing scheme and neighbor table without any changes
of the specification. The mathematical analysis proves that the 1-hop neighbor
information improves overall network performances by providing an efficient
routing path and distributing the traffic load concentrated on the tree links. In the
performance evaluation, we show that the shortcut tree routing achieves the
comparable performance to AODV with limited overhead of neighbor table
maintenance as well as overwhelms the ZigBee tree routing in all the network
oj
ec
t.c
o
sp
r
ABSTRACT
de
nt
rs
tu
important to design a routing protocol for WSNs so that sensing data can be
transmitted to the receiver effectively. An energy-balanced routing method based
ea
al
y
fin
compared with LEACH and EEUC, experimental results show that FAF-EBRM
outperforms LEACH and EEUC, which balances the energy consumption,
prolongs the function lifetime and guarantees high QoS of WSN.
ABSTRACT
oj
ec
t.c
o
sp
r
power threshold covariance matrix tuning method and the distance statistics
de
nt
covariance matrix tuning method, both based on the statistical characteristics of the
distance estimations. In addition, we take into account the inertial measurements
obtained from a nine-degrees of freedom inertial measurement unit. The system
rs
tu
has been validated in real scenarios and results show that it provides long-term
accuracy, that is, the accuracy remains below 1 m during a 20-min test. In
ea
summary, our methods benefit from the reduced observation error of the inertial
fin
al
y
sensors in the short term and extend it over a long period of time.