Ad Hoc Networks Research Papers (original) (raw)

An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just... more

An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just created in 15 min. ;)

In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also... more

In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also keenly focuses on the various security and privacy concerns that are experienced in the implementation of VANETs. Privacy and security issues found to affect VANET are based on integrity, confidentiality, availability, and reliability of data and information exchanged in VANETs. Attacks are major security concerns that are thoroughly surveyed in this work. Some of the means that attackers use in VANET include DoS attack, masquerade, eavesdropping, jamming, and others. Some of the popular means through which these attacks can be controlled include cryptographic means such as encryption. Other security measures that can be practiced to control the attacks include authentication and others that are broadly discussed in the paper. There is more to be done in the future to increase capabilities, security, and privacy of VANETs.

Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These schemes may degrade network... more

Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show significant improvement in protocol.

Increased density of wireless devices, ever growing demands for extremely high data rate, and spectrum scarcity at microwave bands make the millimeter wave (mmWave) frequencies an important player in future wireless networks. However,... more

Increased density of wireless devices, ever growing demands for extremely high data rate, and spectrum scarcity at microwave bands make the millimeter wave (mmWave) frequencies an important player in future wireless networks. However, mmWave communication systems exhibit severe attenuation, blockage, deafness, and may need microwave networks for coordination and fall-back support. To compensate for high attenuation, mmWave systems exploit highly directional operation, which in turn substantially reduces the interference footprint. The significant differences between mmWave networks and legacy communication technologies challenge the classical design approaches, especially at the medium access control (MAC) layer, which has received comparatively less attention than PHY and propagation issues in the literature so far. In this paper, the MAC layer design aspects of short range mmWave networks are discussed. In particular, we explain why current mmWave standards fail to fully exploit the potential advantages of short range mmWave technology, and argue for the necessity of new collision-aware hybrid resource allocation frameworks with on-demand control messages, the advantages
of a collision notification message, and the potential of multihop communication to provide reliable mmWave connections.

In this paper, we have analyzed the performance of multipath routing protocol with various mobility models for Mobile Ad Hoc Networks. The basic purpose of any multipath routing protocol is to overcome various problems occurs while data... more

In this paper, we have analyzed the performance of multipath routing protocol with various mobility models for Mobile Ad Hoc Networks. The basic purpose of any multipath routing protocol is to overcome various problems occurs while data delivery through a single path routing protocol. For high acceptability of routing protocol, analysis of routing protocol in ad hoc network only with random way point mobility model is not sufficient. Here, we have considered Random waypoint, Random Direction and Probabilistic Random Walk mobility Model for proper analysis of AOMDV routing protocol. Results obtained show that with increasing node density, packet delivery ratio increases but with increasing node mobility Packet delivery ratio decreases.

Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in which a user's social properties (such as the social connections and communications metadata as well as application data) are leveraged for offering... more

Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in which a user's social properties (such as the social connections and communications metadata as well as application data) are leveraged for offering enhanced services in a distributed infrastructureless environments. However , the wireless medium, due to limited bandwidth, can easily suffer from the problem of congestion when social metadata and application data are exchanged among nodes-a problem that is compounded by the fact that some nodes may act selfishly and not share its resources. While a number of congestion control schemes have been proposed for the traditional ad-hoc networks, there has been limited focus on incorporating social awareness into congestion control schemes. We revisit the existing traditional ad-hoc congestion control and data distribution protocols and motivate the need for embedding social awareness into these protocols to improve performance. We report that although some work is available in opportunistic network that uses socially-aware techniques to control the congestion issue, this area is largely unexplored and warrants more research attention. In this regards, we highlight the current research progress and identify multiple future directions of research.

In the field of Wireless Sensor Networks (WSNs), the problem of Sybil attacks has been widely considered by researchers. However, among the existing solutions, lightweight models are very limited. To accomplish this, the authors suggest a... more

In the field of Wireless Sensor Networks (WSNs),
the problem of Sybil attacks has been widely considered by
researchers. However, among the existing solutions, lightweight
models are very limited. To accomplish this, the authors suggest
a lightweight Sybil attack detection framework (LSDF) in this
paper. This framework has two components: first, evidence
collection; second, evidence validation. Every node in the network
collects the evidences by observing the activities of neighboring
nodes. These evidences are validated by running sequential
hypothesis test to decide whether neighboring node is a benign
node or Sybil node. With extensive simulations, it was revealed
that the LSDF can detect Sybil activity accurately with few
evidences.

Public safety community shows an increased interest in standardized communication and information system that could support reliable technology transparent multimedia communication during multinational emergency operations. The... more

Public safety community shows an increased interest in standardized communication and information system that could support reliable technology transparent multimedia communication during multinational emergency operations. The introduction of public safety communication system that will be able to use all available means of communications, including rapidly deployable networks, to cope with large scale disasters or/and to implement preventive measures is very important today. The article provides a survey of existing public safety communications systems; discusses their evolution, current status of research activities and presents the idea of cross standard communication system (CSS). It provides an overview of the key research problems in CSS development.

Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a... more

Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types ,battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm. .

In body biosensor networks, which may be classified as a specialized type of ad hoc networks, it is necessary to ensure the authenticity and freshness of the vital medical information. In this work, we propose security solutions to... more

In body biosensor networks, which may be classified as a specialized type of ad hoc networks, it is necessary to ensure the authenticity and freshness of the vital medical information. In this work, we propose security solutions to identify attacks on data freshness and preserve message integrity in these networks. We use the measurement of permissible round trip time threshold and computationally feasible authentication solution to address the security threats in the network. We have implemented a prototype framework in GloMoSim to assess and evaluate the robustness of our detection mechanism.