Self Organization Algorithms for Mobile Devices

Author(s):  
M.A. Sánchez-Acevedo ◽  
E. López-Mellado ◽  
F. Ramos-Corchado

Self-organization is a phenomenon in nature which has been studied in several areas, namely biology, thermodynamics, cybernetics, computing modeling, and economics. Systems exhibiting self-organization have well defined characteristics such as robustness, adaptability, and scalability, which make self-organization an attractive field of study for two kinds of applications: a) maintaining the communication among mobile devices in wireless networks, and b) coordination of swarms of mobile robots. In ad hoc networks, there is not necessarily an underlying infrastructure in which the nodes can maintain communicated with other nodes; so due to this feature, it is necessary to provide efficient self-organization algorithms for routing, managing, and reconfiguring the network. Furthermore, self-organization in nature provide clear examples about how complex behaviors can arise from only local interaction between entities, namely the ants colony, feather formation, and flock of birds. Based on the above mentioned examples, several algorithms have been proposed to accomplish robot formations using only local interactions. Due to resource constraints in mobile devices, selforganization requires simple algorithms for maintaining and adapting wireless networks. The use of resources for establishing robot formations can be reduced by improving simple rules to accomplish the formation. This article first presents a brief overview of several works developed in ad hoc networks; then, delves deeper into the key algorithms; and finally, challenges arising in this area are discussed.

Author(s):  
Tonghong Li

Mobile ad hoc networks (MANETs) are becoming popular due to the abundance of mobile devices, the speed and the convenience of deployment, and the independence of network infrastructure (Chin, 2002; Royer, 1999). It is desired that MANETs be interconnected to fixed IP networks so that the Internet services can be offered to MANET nodes. In such scenarios, commonly known as hybrid ad hoc networks, mobile nodes (MNs) are viewed as an easily deployable extension to the existing infrastructure. Gateways (GWs) are installed, which can be used by MNs to communicate with nodes in the fixed network.


2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


2015 ◽  
Vol 12 (2) ◽  
pp. 445-464 ◽  
Author(s):  
Paulo Pombinho ◽  
Maria Carmo ◽  
Ana Afonso

The evolution of mobile devices and the development of high speed wireless networks have supported a widespread use of these devices with increasingly more complex applications. This reality has fostered the research in the field of information visualization in mobile devices. However, the limited screen space, resource constraints and interaction restrictions impose difficulties to developers and users of these applications. An approach to address these problems is to adapt the visualization to the user context. However, these proposals are normally designed in an ad-hoc fashion and are difficult to generalize. In addition, existing solutions are focused only in some subset of possible characteristics of the user context or only address a very specific domain and related adaptations. The objective of this paper is to present the design of a framework for adaptive mobile visualization (AMV) applications, denominated Chameleon, and the development and evaluation of prototypes that use this conceptual-based framework.


Author(s):  
Tamaghna Acharya ◽  
Santi P. Maity

The acute scarcity of radio frequency spectrum has inspired to think of a new communication technology where the devices are expected to be able to sense and adapt to their spectral environment, thereby appearing as cognitive radios (CR) who can share opportunistically the bands assigned to primary users (PUs). At the same time, low cost, increased coverage, enhanced capacity, infrastructure-less configuration, and so forth, become the essence of future wireless networks. Although the two research fields came up independently, in due time it is observed that CR has a promising future and has excellent applications in wireless networks. To this aim, this chapter explores some scope of integration in CR and ad hoc networks (called here CRAHNETs) in some specific design perspective. First, a brief literature review on CR power allocation and energy aware routing in wireless ad hoc networks (WANETs) is done that highlights the importance for the scope of their integration. Then, power allocation in CRAHNETs with extended network lifetime is considered as an example problem. More specifically, the design problem is: given a set of paths (routes) between a pair of source (S) and destination (D) nodes in CRAHNETs, how to allocate optimal power to the source and relay nodes such that outage probability for data transmission is minimized and network lifetime is enhanced, while meeting the limits of total transmit power of CRs and interference threshold to PU simultaneously. A solution for the stated problem is proposed along with performance evaluation. A few related research problems are mentioned as future research directions.


Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operation. In this chapter, we analyze the security problems in MANET. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders. Both prevention and detection method will work together to address the security concern in MANET.


Author(s):  
Arundhati Arjaria

Mobile ad hoc networks are infrastructure-less wireless networks; all nodes can quickly share information without using any fixed infrastructure like base station or access point. Wireless ad hoc networks are characterized by frequent topology changes, unreliable wireless channel, network congestion, and resource contention. Multimedia applications usually are bandwidth hungry with stringent delay, jitter, and loss requirements. Designing ad hoc networks which support multimedia applications, hence, is considered a hard task. The hidden and exposed terminal problems are the main which consequently reduces the network capacity. Hidden and exposed nodes reduce the performance of the wireless ad hoc networks. Access delay is the major parameter that is to be taken under consideration. Due to hidden and exposed terminal problems, the network suffers from a serious unfairness problem.


Author(s):  
Muneer Bani Yassein ◽  
Mohammed Shatnawi ◽  
Nesreen l-Qasem

Mobile ad hoc networks (MANETs) is a collection of wireless mobile devices that dynamically communicates with each other as a self-configuration without the need of centralized administration or fixed infrastructure. In this paper, we interested to introduce the different broadcast methods based on the probabilistic scheme which is simple implement code with speed broadcast and to reduce a storm broadcast problem effects and to alleviate redundancy through rebroadcast by using different routing protocols such as (AODV, DSR, LAR, PAR) that we interested in MANETs.


Author(s):  
Florian Zeiger ◽  
Nikolaus Kraemer ◽  
Markus Sauer ◽  
Klaus Schilling

Computers ◽  
2019 ◽  
Vol 8 (1) ◽  
pp. 6 ◽  
Author(s):  
Abdallah Sobehy ◽  
Eric Renault ◽  
Paul Muhlethaler

Location services for ad-hoc networks are of indispensable value for a wide range of applications, such as the Internet of Things (IoT) and vehicular ad-hoc networks (VANETs). Each context requires a solution that addresses the specific needs of the application. For instance, IoT sensor nodes have resource constraints (i.e., computational capabilities), and so a localization service should be highly efficient to conserve the lifespan of these nodes. We propose an optimized energy-aware and low computational solution, requiring 3-GPS equipped nodes (anchor nodes) in the network. Moreover, the computations are lightweight and can be implemented distributively among nodes. Knowing the maximum range of communication for all nodes and distances between 1-hop neighbors, each node localizes itself and shares its location with the network in an efficient manner. We simulate our proposed algorithm in a NS-3 simulator, and compare our solution with state-of-the-art methods. Our method is capable of localizing more nodes (≈90% of nodes in a network with an average degree ≈10).


Sign in / Sign up

Export Citation Format

Share Document