A Replica Allocation Method Adapting to Topology Changes in Ad Hoc Networks

Author(s):  
Hideki Hayashi ◽  
Takahiro Hara ◽  
Shojiro Nishio
Author(s):  
Kishor N Tayade ◽  
M U Kharat ◽  
S V Gumaste

Vehicular Ad Hoc Networks (VANETs) are gaining much attention from both industry and academia communities as an emerging technology. VANET is composed of self-regulating nodes where the vibrant node mobility changes the network topology frequently. The important aim of VANET is to upgrade road safety conditions to minimize extent of road mishaps. The nodes are very mobile in vehicular ad hoc network so routing becomes complex job. As the VANET nodes move very fast the topology changes accordingly. So node mobility prediction in VANET is a very important issue. Further, prediction of mobility helps to estimate the stable path between the nodes which leads to better routing. Estimating secure paths among the routing of nodes perform in a better way, thereby reducing the overhead and minimizing interruptions in connections. This paper explores VANET's basic architecture and discusses a number of current mobility prediction techniques, and concludes with performance analysis of existing routing protocols and proposed mobility prediction methods.


2006 ◽  
Vol 07 (01) ◽  
pp. 75-89 ◽  
Author(s):  
TAKAHIRO HARA

To improve data accessibility in ad hoc networks, we have proposed a few methods of replicating data items on mobile hosts by considering the data access frequencies from mobile hosts to each data item and the network topology. In this paper, we address techniques to manage locations of data items or replicas and efficiently forward access requests to the locations. In order to manage locations of data items efficiently, a key issues is predicting the locations of data items that dynamically change. To predict the locations of data items, we use the information on replica allocation at every relocation time and the logs of past data accesses.


Author(s):  
Mohamed Elboukhari ◽  
Mostafa Azizi ◽  
Abdelmalek Azizi

Mobile ad hoc networks (MANETs) have received tremendous attention in recent years because of their self-organization and self-maintenance capabilities. MANETs are networks that do not have an underlying fixed infrastructure. However, these networks tend to be vulnerable to a number of attacks. They don’t obey a centralized network management functionality; furthermore, the network topology changes dynamically. Therefore, security has become a primary concern in MANETs. The major problem in providing security services in such networks is how to manage cryptography keys, making key management a central component in MANETs. This chapter gives an overview of security in this kind of network and presents a number of MANETs key management protocols according to recent literature.


Sign in / Sign up

Export Citation Format

Share Document