scholarly journals SWAT: small world-based attacker traceback in ad-hoc networks

Author(s):  
Y. Kim ◽  
A. Helmy
2008 ◽  
Vol 09 (03) ◽  
pp. 277-297 ◽  
Author(s):  
GREGOIRE DANOY ◽  
ENRIQUE ALBA ◽  
PASCAL BOUVRY

Multi-hop ad hoc networks allow establishing local groups of communicating devices in a self-organizing way. However, when considering realistic mobility patterns, such networks most often get divided in a set of disjoint partitions. This presence of partitions is an obstacle to communication within these networks. Ad hoc networks are generally composed of devices capable of communicating in a geographical neighborhood for free (e.g. using Wi-Fi or Bluetooth). In most cases a communication infrastructure is available. It can be a set of access point as well as a GSM/UMTS network. The use of such an infrastructure is billed, but it permits to interconnect distant nodes, through what we call “bypass links”. The objective of our work is to optimize the placement of these long-range links. To this end we rely on small-world network properties, which consist in a high clustering coefficient and a low characteristic path length. In this article we investigate the use of three genetic algorithms (generational, steady-state, and cooperative coevolutionary) to optimize three instances of this topology control problem and present initial evidence of their capacity to solve it.


2018 ◽  
Vol 382 (7) ◽  
pp. 467-476 ◽  
Author(s):  
Mian Tan ◽  
Ling Fang ◽  
Yue Wu ◽  
Bo Zhang ◽  
Bowen Chang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document