Survey on Node Mobility Model for Opportunistic Network

2011 ◽  
Vol 52-54 ◽  
pp. 1253-1257 ◽  
Author(s):  
Ming Xia Yang ◽  
Shuang Xia Han ◽  
Cai Yun Yang ◽  
Lu Zhang ◽  
Dong Fen Ye

Opportunistic networks is one of the newest hot research spots in wireless networks after mobile ad hoc net-works(MANET) and wireless sensor networks(WSN). Mobility model describes mobility manners of nodes. It has been widely used in research on wireless network. This paper firstly introduced, classifies, and compares the current familiar mobility models. Secondly, it classifies, and compares the current familiar mobility models. Next, it was discussed that current research focus on new mobility models, analysis of nodes mobility features, trace strategy, and evaluation of mobility model. Finally, this paper involved what calls for further study.

2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


2017 ◽  
Vol 13 (06) ◽  
pp. 113 ◽  
Author(s):  
Saher Manaseer ◽  
Afnan Alawneh

<p class="0keywords"><span lang="EN-GB">Over the last decade, many researchers have focused on Mobile Ad Hoc Networks as the main communication method in disaster recovery situations. In these researches, there has been marginal focus on the mobility patterns of nodes in disaster recovery scenarios. In this paper, a deeper analysis has been performed on some of the main mobility models used in testing new protocols and a new mobility model is proposed to incorporate some neglected factors concerned with disaster recovery situations.</span></p>


Sign in / Sign up

Export Citation Format

Share Document