1,553 results
Search Results
2. A Simulation Model for Concurrent Propagation of Multi-band RF Signal in Space Frequency Reuse Based MANETs
- Author
-
Chilukuri, Sandhya, Varun, D., Nabar, Kaustubh, Kadambi, Govind R., Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Deshpande, A.V., editor, Unal, Aynur, editor, Passi, Kalpdrum, editor, Singh, Dharm, editor, Nayak, Malaya, editor, Patel, Bharat, editor, and Pathan, Shafi, editor
- Published
- 2018
- Full Text
- View/download PDF
3. Multiple Independent Path Finding Algorithm for Concurrent Data Transmission in Dual Frequency and Dual Polarized MANETs
- Author
-
Chilukuri, Sandhya, Nabar, Kaustubh, Kadambi, Govind, Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Deshpande, A.V., editor, Unal, Aynur, editor, Passi, Kalpdrum, editor, Singh, Dharm, editor, Nayak, Malaya, editor, Patel, Bharat, editor, and Pathan, Shafi, editor
- Published
- 2018
- Full Text
- View/download PDF
4. A Prototype Implementation of Continuous Authentication for Tactical Applications
- Author
-
Brown, J. David, Pase, William, McKenzie, Chris, Salmanian, Mazda, Tang, Helen, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoffrey, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin Sherman, Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert Y., Series editor, Zhou, Yifeng, editor, and Kunz, Thomas, editor
- Published
- 2017
- Full Text
- View/download PDF
5. Studying Node Cooperation in Reputation Based Packet Forwarding Within Mobile Ad Hoc Networks
- Author
-
Berri, Sara, Varma, Vineeth, Lasaulce, Samson, Radjef, Mohammed Said, Daafouz, Jamal, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Sabir, Essaid, editor, García Armada, Ana, editor, Ghogho, Mounir, editor, and Debbah, Mérouane, editor
- Published
- 2017
- Full Text
- View/download PDF
6. Use of Time-Dependent Spatial Maps of Communication Quality for Multi-robot Path Planning
- Author
-
Di Caro, Gianni A., Feo Flushing, Eduardo, Gambardella, Luca M., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Garcia Pineda, Miguel, editor, Lloret, Jaime, editor, Papavassiliou, Symeon, editor, Ruehrup, Stefan, editor, and Westphall, Carlos Becker, editor
- Published
- 2015
- Full Text
- View/download PDF
7. A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs
- Author
-
Kumar, Vimal, Kumar, Rakesh, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Bica, Ion, editor, Naccache, David, editor, and Simion, Emil, editor
- Published
- 2015
- Full Text
- View/download PDF
8. A Lightweight Threshold-Based Improvement on DSDV
- Author
-
Abri, Rahem, Sen, Sevil, Chlamtac, Imrich, Series editor, Sherif, Mostafa Hashem, editor, Mellouk, Abdelhamid, editor, Li, Jun, editor, and Bellavista, Paolo, editor
- Published
- 2014
- Full Text
- View/download PDF
9. A Novel Mobility Model for Mobile Ad Hoc Networks
- Author
-
Li, Cheng, Zhong, Zhangdui, Wu, Hao, Xiong, Lei, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Qian, Hua, editor, and Kang, Kai, editor
- Published
- 2013
- Full Text
- View/download PDF
10. Performance Analysis of DSR for Manets in Discrete Time Markov Chain Model with N-Spatial Reuse
- Author
-
Hu, Xi, Lu, Guilin, Wang, Hanxing, and Zhu, Min, editor
- Published
- 2011
- Full Text
- View/download PDF
11. Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks
- Author
-
Woungang, Isaac, Dhurandher, Sanjay Kumar, Peddi, Rajender Dheeraj, Traore, Issa, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Garcia-Alfaro, Joaquin, editor, Cuppens, Frédéric, editor, Cuppens-Boulahia, Nora, editor, Miri, Ali, editor, and Tawbi, Nadia, editor
- Published
- 2013
- Full Text
- View/download PDF
12. Improved Topology Control Algorithms for Simple Mobile Networks
- Author
-
Che, Fei (Sophie), Lloyd, Errol L., Zhao, Liang, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Zheng, Jun, editor, Mao, Shiwen, editor, Midkiff, Scott F., editor, and Zhu, Hua, editor
- Published
- 2010
- Full Text
- View/download PDF
13. E2DSR: Preliminary Implementation Results and Performance Evaluation of an Energy Efficient Routing Protocol for Wireless Ad Hoc Networks
- Author
-
Talooki, Vahid, Marques, Hugo, Rodriguez, Jonathan, Água, Hugo, Blanco, Nelson, Campos, Luís Miguel, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Rodriguez, Jonathan, editor, Tafazolli, Rahim, editor, and Verikoukis, Christos, editor
- Published
- 2012
- Full Text
- View/download PDF
14. Hash Chains at the Basis of a Secure Reactive Routing Protocol
- Author
-
Bouabana-Tebibel, Thouraya, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Chen, Liqun, editor, Yung, Moti, editor, and Zhu, Liehuang, editor
- Published
- 2012
- Full Text
- View/download PDF
15. Enhanced Route-Split Routing Tolerant to Multiple Concurrent Link Failure for Mobile Ad Hoc Networks
- Author
-
Ohta, Tomoyuki, Mizumoto, Tusyoshi, Kakuda, Yoshiaki, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Zheng, Jun, editor, Mao, Shiwen, editor, Midkiff, Scott F., editor, and Zhu, Hua, editor
- Published
- 2010
- Full Text
- View/download PDF
16. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
- Author
-
Şen, Sevil, Clark, John A., Tapiador, Juan E., Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Zheng, Jun, editor, Mao, Shiwen, editor, Midkiff, Scott F., editor, and Zhu, Hua, editor
- Published
- 2010
- Full Text
- View/download PDF
17. Fine-Grained Metrics for Quantifying Admission Control Performance in Mobile Ad Hoc Networks
- Author
-
Guo, Jianli, Wu, Wei, Liu, Xiaoxia, Luo, Lianhe, Yan, Changjiang, Bai, Yuebin, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Ren, Pinyi, editor, Zhang, Chao, editor, Liu, Xin, editor, Liu, Pei, editor, and Ci, Song, editor
- Published
- 2012
- Full Text
- View/download PDF
18. An Implicit Cluster-Based Overlay Multicast Protocol Exploiting Tree Division for Mobile Ad Hoc Networks
- Author
-
Choi, Younghwan, Park, Soochang, Yu, Fucai, Kim, Sang-Ha, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Vazão, Teresa, editor, Freire, Mário M., editor, and Chong, Ilyoung, editor
- Published
- 2008
- Full Text
- View/download PDF
19. OLSRp: Predicting Control Information to Achieve Scalability in OLSR Ad Hoc Networks
- Author
-
Medina, Esunly, Meseguer, Roc, Molina, Carlos, Royo, Dolors, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Pentikousis, Kostas, editor, Agüero, Ramón, editor, García-Arranz, Marta, editor, and Papavassiliou, Symeon, editor
- Published
- 2011
- Full Text
- View/download PDF
20. Formalizing Excusableness of Failures in Multi-Agent Systems
- Author
-
Staab, Eugen, Engel, Thomas, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Ghose, Aditya, editor, Governatori, Guido, editor, and Sadananda, Ramakoti, editor
- Published
- 2009
- Full Text
- View/download PDF
21. Dynamic Power Efficient QoS Routing Algorithm for Multimedia Services over Mobile Ad Hoc Networks
- Author
-
Lee, Zae-Kwun, Song, Hwangjun, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Vazão, Teresa, editor, Freire, Mário M., editor, and Chong, Ilyoung, editor
- Published
- 2008
- Full Text
- View/download PDF
22. A Comprehensive paper for Multicasting Routing Protocol
- Author
-
Daniel, A.K.
- Published
- 2012
23. TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
- Author
-
Cooper, Nicholas
- Subjects
Simulations ,Multi-path Routing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer Science::Networking and Internet Architecture ,Mobility Models ,Mobile Ad hoc Networks - Abstract
The high-level contribution of this paper is a detailed simulation based analysis about theimpact of mobility models on the performance of node-disjoint and link-disjoint multipathrouting algorithms for mobile ad hoc networks (MANETs).
- Published
- 2018
- Full Text
- View/download PDF
24. Data replication techniques in the mobile ad hoc networks : A systematic and comprehensive review
- Author
-
Abdollahi Nami, A. and Rajabion, L.
- Published
- 2019
- Full Text
- View/download PDF
25. A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks
- Author
-
Beghriche, Abdesselem and Bilami, Azeddine
- Published
- 2018
- Full Text
- View/download PDF
26. Real‐time, decentralized and bio‐inspired topology control for holonomic autonomous vehicles
- Author
-
Şafak Şahin, Cem, Ümit Uyar, M., Gao, Yang, Peters, Jan, and Tsourdos, Antonios
- Published
- 2012
- Full Text
- View/download PDF
27. Prediction based location aided routing for mobile ad hoc networks
- Author
-
Chellappa Doss, R., Jennings, A., and Shenoy, N.
- Published
- 2007
- Full Text
- View/download PDF
28. Exploiting data transmission for route discoveries in mobile ad hoc networks
- Author
-
Yu, Xin
- Published
- 2024
- Full Text
- View/download PDF
29. ML-Enhanced Live Video Streaming in Offline Mobile Ad Hoc Networks: An Applied Approach.
- Author
-
Jesús-Azabal, Manuel, Soares, Vasco N. G. J., and Galán-Jiménez, Jaime
- Subjects
AD hoc computer networks ,STREAMING video & television ,ARTIFICIAL intelligence ,INTERNET access ,MULTIMEDIA communications ,QUALITY of service - Abstract
Live video streaming has become one of the main multimedia trends in networks in recent years. Providing Quality of Service (QoS) during live transmissions is challenging due to the stringent requirements for low latency and minimal interruptions. This scenario has led to a high dependence on cloud services, implying a widespread usage of Internet connections, which constrains contexts in which an Internet connection is not available. Thus, alternatives such as Mobile Ad Hoc Networks (MANETs) emerge as potential communication techniques. These networks operate autonomously with mobile devices serving as nodes, without the need for coordinating centralized components. However, these characteristics lead to challenges to live video streaming, such as dynamic node topologies or periods of disconnection. Considering these constraints, this paper investigates the application of Artificial Intelligence (AI)-based classification techniques to provide adaptive streaming in MANETs. For this, a software-driven architecture is proposed to route stream in offline MANETs, predicting the stability of individual links and compressing video frames accordingly. The proposal is implemented and assessed in a laboratory context, in which the model performance and QoS metrics are analyzed. As a result, the model is implemented in a decision forest algorithm, which provides 95.9% accuracy. Also, the obtained latency values become assumable for video streaming, manifesting a reliable response for routing and node movements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. ABIDING GEOCAST ROUTING PROTOCOL.
- Author
-
Chinnaraj, P., Kala, I., and S., Sherine.
- Abstract
Mobile Ad Hoc Network consists of group of nodes in specific region. Every node has to rely on subsequent nodes to send the packets[10]. Certain nodes deny to forward packets. Vineyard is the only tree where pruning is done for the growth. In other type of trees pruning is not done. Pruning is to cut the dead branches. To cut or lop superfluous or undesired twigs, branches or roots from like trim. During the pruning season things are made ready. Dead wood is removed; unproductive sucker growth is tossed in to the fire. Similarly in Mobile Ad hoc Networks if any node is selfish node not synchronizing with other nodes and not responding to passing the packets through it. The leader has to remove the deadly node called selfish node like pruning. The most extensible application of Geographical addressing is via a Geocast protocol[11], where nodes selectively rebroadcast packets based on regional consensus guidelines. Classy excommunication heuristics harvest extensible Geographic flooding that outplays deputy geo addressing methodologies. However, previous Geocast Routing applications, while effective, fall into two categories. Methodologies based on flooding are in extensible due to the high load they attain. Extensible approaches, on the other hand, have exertion in complex environments, lacking sufficient intelligence about the necessary directionality of packet flow[14]. The present paper defines a contemporary Vineyard Geocast Routing heuristic, which both significantly improves on reliability of prevailing extensible Geocast Routings and yet also remains extensible as design complexity increases. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Auto metric graph neural network optimized with woodpecker mating algorithm for detecting network layer attacks in mobile ad hoc networks.
- Author
-
Narayanan, Sivanesan and Archana, K. S.
- Subjects
- *
GRAPH neural networks , *INTRUSION detection systems (Computer security) , *AD hoc computer networks , *DEEP learning , *CONVOLUTIONAL neural networks , *WOODPECKERS , *ALGORITHMS - Abstract
Nowadays, Mobile Ad hoc Network (MANET) gains more attraction due to its seamless and dynamic use. The existing methods in MANET are plagued by some weaknesses, like higher computation time, undermining their real-time responsiveness. Whereas, lower accuracy in intrusion detection compromises the reliability of these systems, potentially leading to missed threats posing a challenge for effective security measures in dynamic MANET environments. To mitigate these weaknesses, an Auto Metric Graph Neural Network optimized with Woodpecker Mating Algorithm is proposed in this paper for detecting Network Layer Attack in MANET (AGNN-WMA-DNLA-MANET). Initially, the data are gathered from CIC-IDS 2019 dataset. The gathered data undergoes pre-processing to eliminate redundancy and missing values replacement using the Local Least Squares method. Afterward, the preprocessing output is fed to AGNN for classification, which classifies the attack as active, passive, or normal. Then, Woodpecker Mating Algorithm (WMA) is proposed to optimize the AGNN weight parameters to ensure the accurate classification. The proposed technique is executed in NS2 tool. The metrics, like accuracy, false positive rate (FPR) and attack detection rate (ADR), computation time, and RoC is analyzed. The proposed AGNN-WMA-DNLA-MANET approach provides 14.68%, 7.142%, and 4.65% higher accuracy for active attack, 15.19%, 2.77%, and 9.85% higher accuracy for passive attack and 38.18%, 12.02%, and 7.59% better accuracy for normal compared with existing methods, such as Dependable intrusion detection scheme under deep convolutional neural network (DCNN-MANET), deep learning-based intrusion detection scheme for MANET (AE-DNN-MANET), and Benchmarking of machine learning for anomaly based intrusion detection scheme (ML-MANET), respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. An obstacle aware efficient MANET routing with optimized Bi-LSTM and multi-objective constraints on improved heuristic algorithm.
- Author
-
Bhavadharini, R.M., Mercy Rajaselvi Beaulah, P., Om Kumar, C.U., and Krithiga, R.
- Subjects
AD hoc computer networks ,HEURISTIC algorithms ,OPTIMIZATION algorithms ,DATA packeting ,POWER transmission ,DEEP learning - Abstract
Mobile Ad Hoc Networks (MANETs) are self-organizing, self-configuring, and infrastructure-less networks for performing multi-hop communication. The source mobile node can transmit the information to any other destination node, but it has limitations with energy consumption and battery lifetime. Since it appeals to a huge environment, there is a probability of obstacle present. Thus, the network requires finding the obstacles to evade performance degradation and also enhance the routing efficiency. To achieve this, an obstacle-aware efficient routing using a heuristic-based deep learning model is proposed in this paper. Firstly, the nodes in the MANET are employed for initiating the transmission. Further, it is needed to be predicted whether the node is malicious or not. Consequently, the prediction for link connection between the nodes is achieved by the Optimized Bi-directional Long-Short Term Memory (OBi-LSTM), where the hyperparameters are tuned by the Adaptive Horse Herd Optimization (AHHO) algorithm. Secondly, once the links are secured from the obstacle, it is undergone for routing purpose. Routing is generally used to transmit data or packets from one place to another. To attain better routing, various objective constraints like delay, distance, path availability, transmission power, and several interferences are used for deriving a multi-objective function, in which the optimal path is obtained through the AHHO algorithm. Finally, the simulation results of the proposed model ensure to yield efficient multipath routing by accurately identifying the intruder present in the network. Thus, the proposed model aims to reduce the objectives like delay, distance, and power consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Avoiding Detection by Hostile Nodes in Airborne Tactical Networks.
- Author
-
Ilie, Dragos, Grahn, Håkan, Lundberg, Lars, Westerhagen, Alexander, Granbom, Bo, and Höök, Anders
- Subjects
AD hoc computer networks ,NETWORK routing protocols ,OMNIDIRECTIONAL antennas ,DIRECTIONAL antennas ,SITUATIONAL awareness ,RADIO networks - Abstract
Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as easy detection by hostile aircraft and potential information leakage. In this paper, we present a novel mobile ad hoc network (MANET) routing protocol based on directional antennas and situation awareness data that utilizes adaptive multihop routing to avoid sending information in directions where hostile nodes are present. Our protocol is implemented in the OMNEST simulator and evaluated using two realistic flight scenarios involving 8 and 24 aircraft, respectively. The results show that our protocol has significantly fewer leaked packets than comparative protocols, but at a slightly higher cost in terms of longer packet lifetime. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility.
- Author
-
Liu, Jiajia, Kato, Nei, Ma, Jianfeng, and Sakano, Toshikazu
- Abstract
In this paper, we explore the throughput–delay tradeoff in a mobile ad hoc network (MANET) operating under the practical reference point group mobility model and also a general setting of node moving speed. In particular, we consider a MANET with unit area and n nodes being divided evenly into \Theta(n^{\alpha}) groups, \alpha\in[0,1] , where the center of each group moves according to a random direction model with speed of no more than \upsilon\in[0,1] . We determine the regions of per-node throughput and average delay and their tradeoffs that can be achieved (in order sense) in such a network. For the regime of \upsilon=0, we first prove that the per-node throughput capacity is and then develop a routing scheme to achieve this capacity, resulting in an average delay of \Theta(\max\n^1/2,n^1-\alpha\) for any \alpha\in[0,1]. Regarding the regime of \upsilon>0, we prove that the per-node throughput capacity can be improved to \Theta(1) , which is achievable by adopting a new routing scheme with an average delay of \Theta(\max\n^1-\alpha,n^\alpha/2/\upsilon\) for \upsilon=o(1) and $\Theta(n)$ for $\upsilon=\Theta(1) $. The results in this paper help us to have a deep understanding on the fundamental performance scaling laws and also enable an efficient throughput–delay tradeoff to be achieved in MANETs with correlated mobility. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
35. Survey of cross-layer proposals for video streaming over Mobile Ad hoc Networks (MANETs).
- Author
-
Mantzouratos, Spyros, Gardikis, Georgios, Koumaras, Harilaos, and Kourtis, Anastasios
- Abstract
Efforts to realize video streaming over Mobile Ad hoc Networks (MANETs) meet many challenges, which are addressed by different techniques. In the highly dynamic and unpredictable environment of MANETs, cross-layer mechanisms seem to be the most suitable for optimising video streaming. This paper presents a survey of 44 studied papers on the area, comparing tools, parameters and metrics used for their evaluation. It also indicatively describes in more detail some of these proposals. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
36. Sealed-Bid Reverse Auction Pricing Mechanisms for Federated Satellite Systems.
- Author
-
Pica, Udrivolf and Golkar, Alessandro
- Subjects
SPACE vehicles ,COMMERCIAL products ,ROUTING (Computer network management) ,MOBILE satellite communication ,COMPUTER networks - Abstract
ABSTRACT This paper develops a framework to simulate and evaluate pricing policies of spacecraft trading commodities, such as data routing, in a federated satellite network. Federated satellite systems allow the reallocation of underutilized assets, enabling their use as services between owners and third parties. The paper, by means of game theory, focuses on sealed-bid reverse auction pricing schemes, benchmarks first-price and second-price auction strategies, and evaluates the associated trade-offs in terms of performance and cost, and losses in Pareto efficiency introduced by system-level operation constraints. The analysis considers an application case study for federated satellite systems operating in Low Earth Orbit for commercial purposes. Satellite federations are a novel paradigm envisioning on-orbit opportunistic sharing of resources through an ad hoc mobile satellite network. The architecture creates the basis for the realization of a commercial cloud computing environment in orbit, with spacecraft establishing communications links between each other leveraging on system design margins. The results of the case study in space provide new insights on the design of federated satellites and their operations while characterizing emergent behaviors and efficient trade-offs on the Pareto front of the cost-performance curve. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
37. Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks †.
- Author
-
Zhang, Rui, Han, Wendie, Zhang, Lei, Wang, Lulu, and Meng, Xinyu
- Subjects
AD hoc computer networks ,WIRELESS channels ,TRUST - Abstract
Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, i.e., mobile devices. Since communications in MANETs occur via wireless channels, it is of significance to secure communications among wireless and mobile nodes. Group key management, as a widely used method for securing group communications, has potentially been used in MANETs for years. Most recently, a secure receiver-unrestricted group key management scheme for MANETs has been proposed, which is used to establish a secure channel among a group of wireless nodes without a trusted dealer, which has some advantages such as eliminating the certificate management problem and receiver restriction. However, a formal security analysis of this scheme is still lacking. Therefore, in this paper, we propose the complete security proof to demonstrate that the scheme satisfies the essential security properties including authentication, message confidentiality, known-key security and dynamic secrecy. We also give a brief discussion about the efficiency of the scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Using publish/subscribe for message routing in mobile environments.
- Author
-
Amozarrain, Ugaitz and Larrea, Mikel
- Subjects
AD hoc computer networks ,LARGE scale systems ,WIRELESS sensor networks ,INTERNET of things - Abstract
Publish/subscribe is a mature communication paradigm to route and deliver events from publishers to interested subscribers. Initially conceived for large scale systems, e.g., the Internet, it has been used more recently in new scenarios, e.g., wireless sensor networks and the Internet of Things (IoT), where mobility and dynamicity are the norm. The loose-coupling and asynchronicity of publish/subscribe makes it an interesting choice for IoT scenarios, i.e., each node in an IoT network can choose a different role depending on its location, capabilities, etc. This paper presents MFT-PubSub, a fully mobile and fault tolerant content-based publish/subscribe protocol. Our proposal is a purely reactive solution for mobility in a publish/subscribe system without any kind of limits on the mobility patterns of the nodes. A wireless ad hoc network is created without the need of any previous connections or knowledge on the nodes. Handling the mobility, be it physical or logical, of both clients and brokers. We prove the validity of our solution by experimentation, and compare it with AODV, a routing protocol for mobile ad hoc networking. The simulations show an improvement on message delivery rate over previously used protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Research on Communication Stability of Inter-Cannonball Network Based on OPNET.
- Author
-
Zhuo, Zhihai, Huang, Jintao, Lu, Wanyu, and Lu, Xiangyang
- Subjects
DISCRETE event simulation ,TELECOMMUNICATION systems ,COMMUNICATIONS research ,AD hoc computer networks ,AMMUNITION - Abstract
In modern warfare, achieving strikes against military targets commonly involves utilizing methods such as fire coverage and missile precision guidance. While effective, fire coverage requires significant ammunition support, and missiles can be costly. Therefore, an intelligent strike solution can be an effective way to address these challenges. The inter-cannonball wireless communication network provides a solid foundation for inter-cannonball networking and joint strikes. The synergy improves the strike's range and precision, ensuring own safety and destroying the enemy's core with success. In this paper, the reliability of inter-cannonball group communication is studied. The vast array of activities and short striking distance of cannonballs make wireless networking between cannonballs a technological challenge. For this unique communication environment, the network of cannonballs is discussed, the self-organizing structure model of the network is proposed, the corresponding node topology is established, the protocol framework of inter-cannonball communication is presented, and the simulation parameters of the communication network are set. On this premise, discrete event simulation is performed by using the OPNET program to validate the impact of failure rate and node movement speed on the inter-cannonball network communication reliability. And the main performance indices of the inter-cannonball communication system are derived. The simulation results indicate that it can maintain basic communication stability, with wireless LAN delays of less than 100 ms, even when the node failure rate reaches 20%. The simulation verification method, on the other hand, overcomes the limitations of the real environment, optimizes the design phase, reduces research costs, and accelerates the development of intelligent cannonballs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Developing multi‐path routing protocol in MANET using hybrid SM‐CSBO based on novel multi‐objective function.
- Author
-
Jeyaraj, Deepa, Yesudhasan, Justindhas, and Aliar, Ahamed Ali Samsu
- Subjects
AD hoc computer networks ,NETWORK routing protocols ,ROUTING algorithms ,NETWORK performance ,MATHEMATICAL optimization ,DATA transmission systems - Abstract
Summary: One of the infrastructure‐free networks is mobile ad hoc networks (MANETs) that are built with limited battery life using wireless mobile devices. This restricted battery capability in MANETs creates the necessity of considering the energy‐awareness constraint in designing them. As routing protocols, the major aim of MANETs is to create the energy awareness in the network; it improves the network's lifetime through effectively utilizing the available restricted energy. Moreover, it creates some limitations like the mobility constraint, wireless link's sensitivity to environmental impacts, and restricted transmission range and residual energy of nodes that causes rapid modifications in the network topology and frequent link failure. By taking those problems, this paper plans to develop a new multipath routing protocol, where the hybrid optimization algorithm with the integration of cuckoo search optimization (CSO) and butterfly optimization algorithm (BOA) is proposed and named sensory modality‐based cuckoo search butterfly optimization (SM‐CSBO) for determining the optimal path between the source and destination. The main goal is to select the path with better link quality and more stable links to guarantee reliable data transmission. The multi‐objective function is considered with the factors regarding distance, normalized energy, packet delivery ratio, and control overhead to develop an effective routing protocol in MANET. The proposed model of SM‐CSBO algorithm has superior than 5.8%, 30.4%, 36.7%, and 39.3%, correspondingly maximized than PSO, SFO, CSO, and SFO algorithms while considering the number of nodes as 150. The simulation outcomes proved that it enhances network performance when compared with the other traditional protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET.
- Author
-
Yonggang Xiao and Yanbing Liu
- Subjects
VEHICULAR ad hoc networks ,ALGORITHMS ,INTELLIGENT transportation systems ,ENERGY consumption ,SIMULATION methods & models - Abstract
As Vehicular Ad hoc Network (VANET) features random topology and accommodates freely connected nodes, it is important that the cooperation among the nodes exists. This paper proposes a trust model called Implicit Web of Trust in VANET (IWOT-V) to reason out the trustworthiness of vehicles. Such that untrusted nodes can be identified and avoided when we make a decision regarding whom to follow or cooperate with. Furthermore, the performance of Cooperative Intelligent Transport System (C-ITS) applications improves. The idea of IWOT-V is mainly inspired by web page ranking algorithms such as PageRank. Although there does not exist explicit link structure in VANET because of random topology and dynamic connections, social trust relationship among vehicles exists and an implicit web of trust can be derived. To accomplish the derivation, two algorithms are presented, i.e., BayesTrust and VehicleRank. They are responsible for deriving the local and global trust relationships, respectively. The simulation results show that IWOT-V can accurately identify trusted and untrusted nodes if enough local trust information is collected. The performance of IWOT-V affected by five threat models is demonstrated, and the related discussions are also given. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
42. Exploiting Rateless Codes and Belief Propagation to Infer Identity of Polluters in MANET.
- Author
-
Gaeta, Rossano, Grangetto, Marco, and Loti, Riccardo
- Subjects
CODING theory ,MALWARE ,BIPARTITE graphs ,COMPUTATIONAL complexity ,COMPUTER algorithms - Abstract
In this paper, we consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node is able to successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. We consider the problem of identifying malicious nodes that launch a pollution attack by deliberately modifying the payload of coded blocks before transmitting. It follows that the original chunk can only be obtained if there are no malicious nodes among the chunk providers. In this paper we propose SIEVE, a fully distributed technique to infer the identity of malicious nodes. A node creates what we termed a check whenever a chunk is decoded; a check is a pair composed of the set of other nodes that provided coded blocks used to decode the chunk (the chunk uploaders) and a flag indicating whether the chunk is corrupted or not. SIEVE exploits rateless codes to detect chunk integrity and belief propagation to infer the identity of malicious nodes. In particular, every node autonomously constructs its own bipartite graph (a.k.a. factor graph in the literature) whose vertexes are checks and nodes, respectively. Then, it periodically runs the belief propagation algorithm on its factor graph to infer the probability of other nodes being malicious. We show by running detailed simulations using ns-3 that SIEVE is very accurate and robust under several attack scenarios and deceiving actions. We discuss how the topological properties of the factor graph impacts SIEVE performance and show that nodes speed in the MANET plays a role on the identification accuracy. Furthermore, an interesting trade-off between coding efficiency and SIEVE accuracy, completeness, and reactivity is discovered. We also show that SIEVE is efficient requiring low computational, memory, and communication resources. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
43. Airborne Communication Networks: A Survey.
- Author
-
Cao, Xianbin, Yang, Peng, Alzenad, Mohamed, Xi, Xing, Wu, Dapeng, and Yanikomeroglu, Halim
- Subjects
WIRELESS communications ,QUALITY of service - Abstract
Owing to the explosive growth of requirements of rapid emergency communication response and accurate observation services, airborne communication networks (ACNs) have received much attention from both industry and academia. ACNs are subject to heterogeneous networks that are engineered to utilize satellites, high-altitude platforms (HAPs), and low-altitude platforms (LAPs) to build communication access platforms. Compared to terrestrial wireless networks, ACNs are characterized by frequently changed network topologies and more vulnerable communication connections. Furthermore, ACNs have the demand for the seamless integration of heterogeneous networks such that the network quality-of-service (QoS) can be improved. Thus, designing mechanisms and protocols for ACNs poses many challenges. To solve these challenges, extensive research has been conducted. The objective of this special issue is to disseminate the contributions in the field of ACNs. To present this special issue with the necessary background and offer an overall view of this field, three key areas of ACNs are covered. Specifically, this paper covers LAP-based communication networks, HAP-based communication networks, and integrated ACNs. For each area, this paper addresses the particular issues and reviews major mechanisms. This paper also points out future research directions and challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
44. Security Architecture for the Distributed Environments.
- Author
-
Filipek, Jozef
- Subjects
AD hoc computer networks ,BANDWIDTHS ,FIREWALLS (Computer security) - Abstract
Mobile ad hoc networks (MANET) have been subject of an active research for the last decade. As opposed to the wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks due to the individual nodes of MANETs acting like full-fledged routers. Security of the MANETs usually focuses on some key aspect of the networks, i.e. securing routing protocol, IPS (Intrusion Prevention System), trust infrastructure or secured data transfer. Current published works focused on the security lack top-down approach which would go in depth and tried to cover as much of the network as possible. This work deals with the design of a novel approach to secure MANETs by introducing several security mechanisms at the same time to create novel Security Architecture for these networks. In this paper we introduce Architecture comprised of PKI (Public Key Infrastructure), secured routing protocol, firewall and IPS. Tying all those aspects together creates viable security system for MANETs achieving level of security we are aiming for. Part of the paper are performance measurements of the deployed solution. [ABSTRACT FROM AUTHOR]
- Published
- 2018
45. Cooperative Strategies for Challenged Networks and Applications: A Survey.
- Author
-
Silva, Bruno M. C., Rodrigues, Joel J. P. C., Kumar, Neeraj, and Han, Guangjie
- Abstract
Wireless ad hoc networks use mobile devices to deliver services supported by high-speed network connections and high-speed data transmissions in real time. These devices (network nodes) typically act as the network infrastructure to forward data to other nodes from a source to the destination. However, several constraints (e.g., processor, energy consumption, and bandwidth) affect the overall network performance. Cooperation strategies have been considered as a solution to such network limitations and constraints. Recent studies have presented cooperation mechanisms as a solution to unstable network infrastructures where mobile nodes cooperate with each other, forwarding data and performing all the networking functionalities. This paper presents a comprehensive review of the state of the art on cooperation strategies and algorithms for mobile ad hoc networks and delay-tolerant networks. These challenged networks frequently comprise situations where traditional Internet protocols fail to effectively provide desired or expected communication. This paper focuses on cooperation incentive-based approaches for network architectures that support mobile devices and are challenged by mobility constraints such as battery and storage capacity, broadcast constraints, interferences, disconnections, noises, limited bandwidths, and network delays. The surveyed approaches' merits and weaknesses are discussed, and open issues are identified. Finally, conclusions are detailed. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
46. Quota‐based routing and buffer management with heuristic strategies in opportunistic ad hoc networks.
- Author
-
Mir, Mohd Yaseen and Hu, Chih‐Lin
- Subjects
DELAY-tolerant networks ,AD hoc computer networks ,HEURISTIC ,POWER resources ,INTERSTELLAR communication - Abstract
Summary: Opportunistic ad hoc networks (OppNets) are characterized by intermittent and infrastructure‐less connectivity among mobile nodes with limited internode communication and buffer space. Without persistent end‐to‐end routing information, replication‐based routing techniques are often used to distribute duplicate messages in OppNets, which unfortunately leads to enormous costs of transmission, storage, and energy resources. Prior replication‐based routing schemes were mainly based on several premises, for example, the availability of global network knowledge, unlimited bandwidth capacity, and homogeneous contact patterns. In this paper, we propose a quota‐based routing scheme with finite buffer management, named QRBP, regardless of these weak premises. The QRBP scheme comprises two essential functions. First, only a portion of nodes with higher mobility are delegated to carry a certain quota of message replicas and disseminate those messages to nodes with lower mobility. The message traffic can be evenly diverted to relay nodes, which reduces the transmission overhead in the network. Second, nodes can manipulate message scheduling and dropping to improve the successful delivery rate according to heuristic strategies based on several measures of the quota value, remaining time‐to‐live, and contact rate with the destination. Furthermore, our study conducts extensive simulations under both synthetic and real mobility scenarios. In terms of transmission overhead ratio and successful delivery rate, the QRBP scheme performs better than Epidemic, Spray and Wait, and Temporal Closeness and Centrality‐Based (TCCB) routing schemes, as well as common buffer management policies like Drop Oldest, Drop Newest, Drop Random, and Space‐Time Drop. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Queue-Buffer Optimization Based on Aggressive Random Early Detection in Massive NB-IoT MANET for 5G Applications.
- Author
-
Jafri, Syed Talib Abbas, Ahmed, Irfan, and Ali, Sundus
- Subjects
5G networks ,END-to-end delay ,INTERNET of things ,AD hoc computer networks - Abstract
Elements in massive narrowband Internet of Things (NB-IoT) for 5G networks suffer severely from packet drops due to queue overflow. Active Queue Management (AQM) techniques help in maintaining queue length by dropping packets early, based on certain defined parameters. In this paper, we have proposed an AQM technique, called Aggressive Random Early Detection (AgRED) which, in comparison to previously used Random Early Detection (RED) and exponential RED technique, improves the overall end-to-end delay, throughput, and packet delivery ratio of the massive NB-IoT 5G network while using UDP. This improvement has been achieved due to a sigmoid function used by the AgRED technique, which aggressively and randomly drops the incoming packets preventing them from filling the queue. Because of the incorporation of the AgRED technique, the queue at different nodes will remain available throughout the operation of the network and the probability of delivering the packets will increase. We have analyzed and compared the performance of our proposed AgRED technique and have found that the performance gain for the proposed technique is higher than other techniques (RED and exponential RED) and passive queue management techniques (drop-tail and drop-head). The improvement in results is most significant in congested network deployment scenarios and provides improvements in massive Machine Type Communication, while also supporting ultra-low latency and reliable communication for 5G applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication.
- Author
-
Abdelazeem, Ibraheem, Zhang, Weibin, Zeng, Zhenping, and Abdeldime, M. S
- Subjects
VEHICULAR ad hoc networks ,EXTRACTION techniques ,AD hoc computer networks ,DATA privacy - Abstract
Security in vehicular ad hoc network (VANET) is one of the major challenging topics and the secure key interchange between two legitimate vehicles is an important issue. The multi-environment of VANET has been exploited to extract the secret key and employed security services in VANET. However, it offered more excellence randomness owed to fading, noise multi-path, and velocity difference. Some of the factors like Bit-rate, complication and memory requests are reduced by using a process known as quantization. This paper proposes a new quantization method to extract the secret key for vehicular communications that uses a lossy quantizer in combination with information reconciliation and privacy amplification. Our work focuses on the quantization phase for the secret generation procedure. The comprehensive simulations display the propose method increases the zone and number of the quantization levels to utilize the maximum number of measurements to reduce reasonably the wasted measurements. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. A Novel Technique for Gateway Selection in Hybrid MANET Using Genetic Algorithm.
- Author
-
Kushwah, R., Tapaswi, S., and Kumar, A.
- Subjects
AD hoc computer networks ,GENETIC algorithms ,END-to-end delay ,COMPARATIVE method - Abstract
Integration of Mobile Ad hoc NETworks (MANETs) with the Internet has been paid immense attention in the field of heterogeneous networks. In MANET some intermediate nodes called Internet Gateways (IGs) are responsible for sending the data traffic of source nodes towards the fixed nodes in the Internet. The key issue considered while selecting IG nodes is its optimised throughput with the reduced delay in resource constraint mobile nodes. In this paper, a genetic algorithm inspired Delay Sensitive Gateway Selection (DSGS) scheme is proposed considering the issue of network delay by minimising the total distance travelled by the source nodes to the gateway. The performance of the proposed GA-based DSGS scheme is studied using a comparative approach. The simulation results demonstrate that the proposed scheme significantly outperforms the conventional schemes and is capable of achieving higher network throughput while minimising the end-to-end delay. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Handover Management for Drones in Future Mobile Networks—A Survey.
- Author
-
Shayea, Ibraheem, Dushi, Pabiola, Banafaa, Mohammed, Rashid, Rozeha A., Ali, Sawsan, Sarijari, Mohd Adib, Daradkeh, Yousef Ibrahim, and Mohamad, Hafizal
- Subjects
ROAMING (Telecommunication) ,DEEP learning ,AD hoc computer networks ,TELECOMMUNICATION systems ,DATA transmission systems ,5G networks ,COMMERCIAL drones ,MACHINE learning - Abstract
Drones have attracted extensive attention for their environmental, civil, and military applications. Because of their low cost and flexibility in deployment, drones with communication capabilities are expected to play key important roles in Fifth Generation (5G), Sixth Generation (6G) mobile networks, and beyond. 6G and 5G are intended to be a full-coverage network capable of providing ubiquitous connections for space, air, ground, and underwater applications. Drones can provide airborne communication in a variety of cases, including as Aerial Base Stations (ABSs) for ground users, relays to link isolated nodes, and mobile users in wireless networks. However, variables such as the drone's free-space propagation behavior at high altitudes and its exposure to antenna sidelobes can contribute to radio environment alterations. These differences may render existing mobility models and techniques as inefficient for connected drone applications. Therefore, drone connections may experience significant issues due to limited power, packet loss, high network congestion, and/or high movement speeds. More issues, such as frequent handovers, may emerge due to erroneous transmissions from limited coverage areas in drone networks. Therefore, the deployments of drones in future mobile networks, including 5G and 6G networks, will face a critical technical issue related to mobility and handover processes due to the main differences in drones' characterizations. Therefore, drone networks require more efficient mobility and handover techniques to continuously maintain stable and reliable connection. More advanced mobility techniques and system reconfiguration are essential, in addition to an alternative framework to handle data transmission. This paper reviews numerous studies on handover management for connected drones in mobile communication networks. The work contributes to providing a more focused review of drone networks, mobility management for drones, and related works in the literature. The main challenges facing the implementation of connected drones are highlighted, especially those related to mobility management, in more detail. The analysis and discussion of this study indicates that, by adopting intelligent handover schemes that utilizing machine learning, deep learning, and automatic robust processes, the handover problems and related issues can be reduced significantly as compared to traditional techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.