Probabilistic Routing Schemes for Ad Hoc Opportunistic Networks

2013 ◽  
pp. 209-222 ◽  
Author(s):  
Vangelis Angelakis ◽  
Elias Tragos ◽  
George Perantinos ◽  
Di Yuan
Author(s):  
Ayman Khalil ◽  
Nassif Abou Haidar ◽  
Georges Bassil ◽  
Rabih Chbeir

2019 ◽  
Vol 149 ◽  
pp. 144-153 ◽  
Author(s):  
Xueyang Qin ◽  
Xiaoming Wang ◽  
Liang Wang ◽  
Yaguang Lin ◽  
Xinyan Wang

Author(s):  
Gongjun Yan ◽  
Stephan Olariu ◽  
Shaharuddin Salleh

The key attribute that distinguishes Vehicular Ad hoc Networks (VANET) from Mobile Ad hoc Networks (MANET) is scale. While MANET networks involve up to one hundred nodes and are short lived, being deployed in support of special-purpose operations, VANET networks involve millions of vehicles on thousands of kilometers of highways and city streets. Being mission-driven, MANET mobility is inherently limited by the application at hand. In most MANET applications, mobility occurs at low speed. By contrast, VANET networks involve vehicles that move at high speed, often well beyond what is reasonable or legally stipulated. Given the scale of its mobility and number of actors involved, the topology of VANET is changing constantly and, as a result, both individual links and routing paths are inherently unstable. Motivated by this latter truism, the authors propose a probability model for link duration based on realistic vehicular dynamics and radio propagation assumptions. The paper illustrates how the proposed model can be incorporated in a routing protocol, which results in paths that are easier to construct and maintain. Extensive simulation results confirm that this probabilistic routing protocol results in more easily maintainable paths.


2016 ◽  
Vol 10 (2) ◽  
pp. 26-40 ◽  
Author(s):  
Kajal S. Patel ◽  
Jagdish S. Shah

Wireless networks are vulnerable to many security attacks as they use wireless media and a node has to depend on unknown intermediate nodes for data transmission. Cryptographic algorithms used for wired network cannot work efficiently in wireless network, as in wireless network nodes are mobile and battery operated. Nodes may also have limited resources available. So, to detect malicious activities on node and improve stability of route while routing in mobile ad hoc network, trust-based routing is used. Communication parameters used in calculating trust value in most of existing trust based protocol (wireless network) are number of successful session or packet forwarded between two nodes, number of packet dropped or delayed, response time, battery life, mobility of node etc. This paper provides analysis of existing trust based routing by surveying current “sate of the art” work in this area. This paper also proposed a new parameter (number of route error message sent by a node) of a wireless node which can affect the network performance and can be used to calculate trust value.


2013 ◽  
Vol 12 (4) ◽  
pp. 1573-1583 ◽  
Author(s):  
Fan Wu ◽  
Tingting Chen ◽  
Sheng Zhong ◽  
Chunming Qiao ◽  
Guihai Chen

Sign in / Sign up

Export Citation Format

Share Document