The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] HOC(320hit)

41-60hit(320hit)

  • Future Channel Utilization-Aware Routing for Cognitive Radio Ad Hoc Networks

    Celimuge WU  Juan XU  Yusheng JI  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    107-115

    Cognitive radio ad hoc networks can be used to solve the problems of limited available spectrum and inefficient spectrum usage by adaptively changing their transmission parameters. Routing protocol design has a significant impact on the network performance. However, an efficient protocol that takes account of primary user flows and the long-term channel assignment issue in route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog chooses a route by considering the effect on the primary users, available channel bandwidth and link reliability. AODV-cog also takes account of future channel utilization which is an important but underexplored issue. AODV-cog switches channels for secondary user flows when network congestion occurs. We use theoretical analysis and computer simulations to show the advantage of AODV-cog over existing alternatives.

  • Outage and Density of Transport of Four-Way Handshaking with Imperfect Feedback in a Mobile Multi-Hop Ad Hoc Network

    Thomas BOURGEOIS  Shigeru SHIMAMOTO  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2720-2728

    In this paper, we present a new mathematical framework based on point process theory for a type of four-way handshake-based medium access control schemes which have so far only been studied by simulation. The theoretical model we present takes into account time-varying channel impairments, the interference inherent to large networks, different decoding requirements for each packet and the influence of the routing protocol. Moreover, in contrast with the majority of the literature, the influence of imperfect feedback is also considered in the analysis. Throughout the paper, we derive in closed forms the average link outage probability as well as the Average Spatial Density of Transport (ASDT) in a mobile multi-hop ad hoc network. All results are confirmed by comparison to simulated data and lead to two general conclusions. In the presence of fading uncorrelated between traffic and control handshakes, we observe the following. 1) Optimal contention is achieved by designing control packets that are decodable even in the presence of strong interference. 2) The impact of imperfect feedback on performance in an interference-limited mobile ad hoc network is not negligible.

  • Power Consumption Characteristics of Autonomous Decentralized Clustering Based on Local Interaction

    Ryo HAMAMOTO  Chisa TAKANO  Kenji ISHIDA  Masaki AIDA  

     
    PAPER-Wireless Network

      Vol:
    E97-D No:12
      Page(s):
    2984-2994

    Mobile ad hoc networks (MANETs) consist of mobile terminals that directly connect with one another to communicate without a network infrastructure, such as base stations and/or access points of wireless local area networks (LANs) connected to wired backbone networks. Large-scale disasters such as tsunamis and earthquakes can cause serious damage to life, property as well as any network infrastructure. However, MANETs can function even after severe disasters have destroyed regular network infrastructure. We have proposed an autonomous decentralized structure formation technology based on local interaction, and have applied it to implement autonomous decentralized clustering on MANETs. This method is known to configure clusters that reflect the network condition, such as residual battery power and the degree of each node. However, the effect of clusters that reflect the network condition has not been evaluated. In this study, we configure clusters using our method, the back-diffusion method, and a bio-inspired method, which is a kind of autonomous decentralized clustering that cannot reflect the network condition. We also clarify the importance of clustering that reflects the network condition, with regard to power consumption and data transfer efficiency.

  • A Statistics-Based Data Fusion for Ad-Hoc Sensor Networks

    Fang WANG  Zhe WEI  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:12
      Page(s):
    2675-2679

    Misbehaving nodes intrinsic to the physical vulnerabilities of ad-hoc sensor networks pose a challenging constraint on the designing of data fusion. To address this issue, a statistics-based reputation method for reliable data fusion is proposed in this study. Different from traditional reputation methods that only compute the general reputation of a node, the proposed method modeled by negative binomial reputation consists of two separated reputation metrics: fusion reputation and sensing reputation. Fusion reputation aims to select data fusion points and sensing reputation is used to weigh the data reported by sensor nodes to the fusion point. So, this method can prevent a compromised node from covering its misbehavior in the process of sensing or fusion by behaving well in the fusion or sensing. To tackle the unexpected facts such as packet loss, a discounting factor is introduced into the proposed method. Additionally, Local Outlier Factor (LOF) based outlier detection is applied to evaluate the behavior result of sensor nodes. Simulations show that the proposed method can enhance the reliability of data fusion and is more accurate than the general reputation method when applied in reputation evaluation.

  • Bio-Inspired Time Synchronization Method for Multi-Hop Ad-Hoc Networks

    Un-Ha KIM  Yoon-Jae SHIN  Jung-Ryun LEE  

     
    PAPER-Network

      Vol:
    E97-B No:8
      Page(s):
    1647-1655

    Time synchronization is important for frequency hopping, power management, scheduling, and basic operations of multi-hop ad-hoc networks. The main problem of existing time synchronization methods is that they depend on a particular node that has the fastest time information among neighbor nodes. The Cucker-Smale flocking model describes that global emergent behavior can be obtained by locally averaging the velocity of each bird. Inspired by this flocking model, we propose a time synchronization method not depending on a particular node. In the proposed method, each node revises its time information via the local-averaging procedure in a distributed manner. A self-correcting procedure is added to the proposed method in order to preserve the effect of time adjustment executed by the local-averaging procedure. The simulation results show that the proposed time synchronization method reduces the time difference among nodes, and enhances the performance of time synchronization in the context of IEEE 802.11-based ad-hoc networks.

  • DYN-MAC: A MAC Protocol for Cognitive Radio Networks with Dynamic Control Channel Assignment

    Zaw HTIKE  Choong Seon HONG  Sungwon LEE  Ilkwon CHO  

     
    PAPER

      Vol:
    E97-B No:8
      Page(s):
    1577-1585

    Cognitive radio is one of the most promising wireless technologies and has been recognized as a new way to improve the spectral efficiency of wireless networks. In a cognitive radio network, secondary users exchange control information for network coordination such as transmitter-receiver handshakes, for sharing spectrum sensing results, for neighbor discovery, to maintain connectivity, and so on. Spectrum utilization and resource optimizations thus rely on information exchange among secondary users. Normally, secondary users exchange the control information via a predefined channel, called a common control channel (CCC). Most of the medium access control (MAC) protocols for cognitive radio networks were designed by assuming the existence of a CCC, and further assuming that it was available for every secondary user. However, the main drawback of using a static CCC is it is susceptible to primary user activities since the channel can be occupied by primary users at any time. In this paper, we propose a MAC protocol for cognitive radio networks with dynamic control channel assignment, called DYN-MAC. In DYN-MAC, a control channel is dynamically assigned based on spectrum availability. Thus, it can tolerate primary user activities. DYN-MAC also supports collision free network-wide broadcasting and addresses other major problems such as primary/secondary user hidden terminal problems.

  • Data Mining Intrusion Detection in Vehicular Ad Hoc Network

    Xiaoyun LIU  Gongjun YAN  Danda B. RAWAT  Shugang DENG  

     
    PAPER

      Vol:
    E97-D No:7
      Page(s):
    1719-1726

    The past decade has witnessed a growing interest in vehicular networking. Initially motivated by traffic safety, vehicles equipped with computing, communication and sensing capabilities will be organized into ubiquitous and pervasive networks with a significant Internet presence while on the move. Large amount of data can be generated, collected, and processed on the vehicular networks. Big data on vehicular networks include useful and sensitive information which could be exploited by malicious intruders. But intrusion detection in vehicular networks is challenging because of its unique features of vehicular networks: short range wireless communication, large amount of nodes, and high mobility of nodes. Traditional methods are hard to detect intrusion in such sophisticated environment, especially when the attack pattern is unknown, therefore, it can result unacceptable false negative error rates. As a novel attempt, the main goal of this research is to apply data mining methodology to recognize known attacks and uncover unknown attacks in vehicular networks. We are the first to attempt to adapt data mining method for intrusion detection in vehicular networks. The main contributions include: 1) specially design a decentralized vehicle networks that provide scalable communication and data availability about network status; 2) applying two data mining models to show feasibility of automated intrusion detection system in vehicular networks; 3) find the detection patterns of unknown intrusions.

  • A Unified View to Greedy Geometric Routing Algorithms in Ad Hoc Networks

    Jinhee CHUN  Akiyoshi SHIOURA  Truong MINH TIEN  Takeshi TOKUYAMA  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1220-1230

    We give a unified view to greedy geometric routing algorithms in ad hoc networks. For this, we first present a general form of greedy routing algorithm using a class of objective functions which are invariant under congruent transformations of a point set. We show that several known greedy routing algorithms such as Greedy Routing, Compass Routing, and Midpoint Routing can be regarded as special cases of the generalized greedy routing algorithm. In addition, inspired by the unified view of greedy routing, we propose three new greedy routing algorithms. We then derive a sufficient condition for our generalized greedy routing algorithm to guarantee packet delivery on every Delaunay graph. This condition makes it easier to check whether a given routing algorithm guarantees packet delivery, and it is closed under convex linear combination of objective functions. It is shown that Greedy Routing, Midpoint Routing, and the three new greedy routing algorithms proposed in this paper satisfy the sufficient condition, i.e., they guarantee packet delivery on Delaunay graphs. We also discuss merits and demerits of these methods.

  • ACK-CAST: ACK-Based Broadcast Protocol for Vehicular Ad Hoc Networks

    Ajmal KHAN  Jae-Choong NAM  You-Ze CHO  

     
    PAPER-Network

      Vol:
    E97-B No:5
      Page(s):
    960-966

    In vehicular ad hoc networks, the efficient and reliable dissemination of emergency messages in a highly mobile environment under dense or sparse network is a significant challenge. This paper proposes a new vehicular broadcast protocol, called ACK-CAST, that can operate effectively in both dense and sparse network scenarios. ACK-CAST relies on acknowledgment messages from one-hop neighbors to select the next rebroadcasting vehicle. Simulation results show that ACK-CAST outperforms the SERVUS protocol in terms of the end-to-end delay, message delivery ratio and network overhead.

  • Mobile Agent Migration Mechanism Adaptive to Service Dissemination and Collection for Mobile Ad Hoc Networks

    Tomoyuki OHTA  Shuhei ISHIZUKA  Takeshi HASHIMOTO  Yoshiaki KAKUDA  Atsushi ITO  

     
    PAPER-Network

      Vol:
    E97-B No:3
      Page(s):
    610-619

    We have already proposed a service discovery scheme using mobile agents for mobile ad hoc networks where node positions in the network and the network topology change frequently. Mobile agents autonomously migrate among nodes and then perform a given task at a node. In the service discovery scheme using mobile agents, mobile agents collect and disseminate services in the network so it is most important how the mobile agents migrate in the network. Therefore, we propose two types of mobile agent migration mechanisms in this paper. One is that mobile agents migrate to the nodes at which other mobile agents do not stay, the other is that mobile agents migrate to the nodes to which mobile agents can disseminate a lot of service information. Finally, we conducted simulation experiments to investigate the performance of the proposed migration mechanisms with respect to the service dissemination time and rate.

  • P2P Based Social Network over Mobile Ad-Hoc Networks

    He LI  KyoungSoo BOK  JaeSoo YOO  

     
    LETTER-Information Network

      Vol:
    E97-D No:3
      Page(s):
    597-600

    In this paper, we design an efficient P2P based mobile social network to facilitate contents search over mobile ad hoc networks. Social relation is established by considering both the locations and interests of mobile nodes. Mobile nodes with common interests and nearby locations are recommended as friends and are connected directly in a mobile social network. Contents search is handled by using social relationships of the mobile social network rather than those of the whole network. Since each mobile node manages only neighboring nodes that have common interests, network management overhead is reduced. Results of experiments have shown that our proposed method outperforms existing methods.

  • Stochastic Analysis of Route Request Packet Propagation in Reactive Ad Hoc Sensor Network and Its Application to Optimizing the Number of Rebroadcasting Nodes

    Mitsuru ISHII  Daisuke TAKAGO  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E97-A No:2
      Page(s):
    708-712

    We analyze the effect of the propagation of route request packets in ad hoc network routing protocols such as DSR and AODV. So far it has not been clear how the number density of route request packets depends on propagation and hop counts. By stochastic analysis, it is found that the collisions of route request packets can be avoided efficiently by adjusting the number of the relevant nodes in the early stages of propagation.

  • A New Energy-Aware Source Routing Protocol for Maximization of Network Lifetime in MANET

    Hyun-Ho CHOI  Hyun-Gyu LEE  Jung-Ryun LEE  

     
    LETTER-Information Network

      Vol:
    E97-D No:2
      Page(s):
    335-339

    In this letter, we propose an energy-aware source routing protocol for maximizing the network lifetime in mobile ad hoc networks. We define a new routing cost by considering both transmit and receive power consumption and remaining battery level in each node simultaneously and present an efficient route discovery procedure to investigate the proposed routing cost. Intensive simulation verifies that the proposed routing protocol has similar performance to the conventional routing protocols in terms of the number of transmission hops, transmission rate, and energy consumption while significantly improving the performance with respect to network lifetime.

  • Geographic Cooperative Routing for Minimum Symbol Error Rate in Wireless Multihop Networks

    Yu TIAN  Linhua MA  Bo SONG  Hong TANG  Song ZHANG  Xing HU  

     
    PAPER-Network

      Vol:
    E97-B No:2
      Page(s):
    441-449

    Much work in cooperative communication has been done from the perspective of the physical and network layers. However, the exact impact of signal error rate performance on cooperative routing discovery still remains unclear in multihop ad hoc networks. In this paper, we show the symbol error rate (SER) performance improvement obtained from cooperative commutation, and examine how to incorporate the factor of SER into the distributed routing discovery scheme called DGCR (Dynamic Geographic Cooperative Routing). For a single cooperative communication hop, we present two types of metric to specify the degree that one node is suitable for becoming the relay node. One metric is the potential of a node to relay with optimal SER performance. The other metric is the distance of a node to the straight line that passes through the last forwarding node and the destination. Based on location knowledge and contention scheme, we combine the two metrics into a composite metric to choose the relay node. The forwarding node is chosen dynamically according to the positions of the actual relay node and the destination. Simulation results show that our approach outperforms non-cooperative geographic routing significantly in terms of symbol error rate, and that DGCR's SER performance is better than traditional geographic cooperative routing with slight path length increase.

  • Cooperative Message Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

    Zaw HTIKE  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Communication Theory and Signals

      Vol:
    E96-A No:11
      Page(s):
    2099-2105

    Broadcasting is an essential function in almost all wireless networks. Because of the dynamic nature of environment, broadcasting in cognitive radio ad hoc networks is a great challenge. Cognitive radio network technology has been well studied for more than a decade as a new way to improve the spectral efficiency of wireless networks and numerous precious works have been proposed. However, very few existing works consider how to broadcast messages in cognitive radio networks that operate in multichannel environments and none of these provides a full broadcast mechanism. Therefore, in this paper, we propose a broadcasting mechanism for multichannel cognitive radio ad hoc networks. Then, we analyze the mechanism regarding the speed of message dissemination, number of transmissions, fraction of the users that receive the broadcast message and so forth.

  • Practical Solution for Broadcasting in VANETs Using Neighbor Information

    Celimuge WU  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER-Network

      Vol:
    E96-B No:11
      Page(s):
    2856-2864

    Due to vehicle movement and lossy wireless channels, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks (VANETs) is a well-known challenging problem. In this paper, we propose BR-NB (broadcast with neighbor information), a fuzzy logic based multi-hop broadcast protocol for VANETs. BR-NB achieves a low overhead by using only a subset of neighbor nodes to relay data packets. For the relay node selection, BR-NB jointly considers multiple metrics of the inter-vehicle distance, vehicle mobility and link quality by employing fuzzy logic. Since the expected coverage and vehicle mobility are inferred from the two-hop neighbor information which can be acquired from the hello message exchange, BR-NB is independent of position information. BR-NB provides a practical and portable solution for broadcast services in VANETs. We use computer simulations and real-world experiments to evaluate the performance of BR-NB.

  • Time-Delayed Collaborative Routing and MAC Protocol for Maximizing the Network Lifetime in MANETs

    Woncheol CHO  Daeyoung KIM  

     
    PAPER-Network

      Vol:
    E96-B No:9
      Page(s):
    2213-2223

    This paper proposes T-CROM (Time-delayed Collaborative ROuting and MAC) protocol, that allows collaboration between network and MAC layers in order to extend the lifetime of MANETs in a resources-limited environment. T-CROM increases the probability of preventing energy-poor nodes from joining routes by using a time delay function that is inversely proportional to the residual battery capacity of intermediate nodes, making a delay in the route request (RREQ) packets transmission. The route along which the first-arrived RREQ packet traveled has the smallest time delay, and thus the destination node identifies the route with the maximum residual battery capacity. This protocol leads to a high probability of avoiding energy-poor nodes and promotes energy-rich nodes to join routes in the route establishment phase. In addition, T-CROM controls the congestion between neighbors and reduces the energy dissipation by providing an energy-efficient backoff time by considering both the residual battery capacity of the host itself and the total number of neighbor nodes. The energy-rich node with few neighbors has a short backoff time, and the energy-poor node with many neighbors gets assigned a large backoff time. Thus, T-CROM controls the channel access priority of each node in order to prohibit the energy-poor nodes from contending with the energy-rich nodes. T-CROM fairly distributes the energy consumption of each node, and thus extends the network lifetime collaboratively. Simulation results show that T-CROM reduces the number of total collisions, extends the network lifetime, decreases the energy consumption, and increases the packet delivery ratio, compared with AOMDV with IEEE 802.11 DCF and BLAM, a battery-aware energy efficient MAC protocol.

  • Throughput Capacity of MANETs with Group-Based Scheduling and General Transmission Range

    Juntao GAO  Jiajia LIU  Xiaohong JIANG  Osamu TAKAHASHI  Norio SHIRATORI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:7
      Page(s):
    1791-1802

    The capacity of general mobile ad hoc networks (MANETs) remains largely unknown up to now, which significantly hinders the development and commercialization of such networks. Available throughput capacity studies of MANETs mainly focus on either the order sense capacity scaling laws, the exact throughput capacity under a specific algorithm, or the exact throughput capacity without a careful consideration of critical wireless interference and transmission range issues. In this paper, we explore the exact throughput capacity for a class of MANETs, where we adopt group-based scheduling to schedule simultaneous link transmissions for interference avoidance and allow the transmission range of each node to be adjusted. We first determine a general throughput capacity upper bound for the concerned MANETs, which holds for any feasible packet delivery algorithm in such networks. We then prove that the upper bound we determined is just the exact throughput capacity for this class of MANETs by showing that for any traffic input rate within the throughput capacity upper bound, there exists a corresponding two-hop relay algorithm to stabilize such networks. A closed-form upper bound for packet delay is further derived under any traffic input rate within the throughput capacity. Finally, based on the network capacity result, we examine the impacts of transmission range and node density upon network capacity.

  • DECA-bewa: Density-Aware Reliable Broadcasting Protocol in VANETs

    Kulit NA NAKORN  Kultida ROJVIBOONCHAI  

     
    PAPER-Network

      Vol:
    E96-B No:5
      Page(s):
    1112-1121

    Reliable broadcasting in vehicular ad-hoc networks is challenging due to their unique characteristics including intermittent connectivity and various vehicular scenarios. Applications and services in intelligent transportation systems need an efficient, fast and reliable broadcasting protocol especially for safety and emergency applications. In our previous work, we have proposed DECA, a new reliable broadcasting protocol which suits such characteristics. To address the issue of various vehicular scenarios, our protocol performs beaconing to gather local density information of 1-hop neighbors and uses such information to adapt its broadcasting decision dynamically. Specifically, before broadcasting a message, a node selects a neighbor with the highest density and adds the selected neighbor's identifier to the message. Upon receiving of a broadcast message, each node checks whether or not it is the selected neighbor. If so, it is responsible for rebroadcasting the message immediately. This mechanism can raise the data dissemination speed of our protocol so that it is as fast as simple flooding. To address the issue of intermittent connectivity, identifiers of broadcast messages are added into beacons. This helps nodes to check if there are any broadcast messages that have not yet been received. In this paper, we propose DECA with a new beaconing algorithm and a new waiting timeout calculation, so-called DECA-bewa. Our new protocol can reduce redundant retransmissions and overall overhead in high density areas. The protocol performance is evaluated on the network simulator (NS-2). Simulation results show that DECA-bewa outperforms existing protocols in terms of reliability, overhead and speed of data dissemination.

  • Traffic Adaptive Routing for Mobile Sensor Networks

    Ki Sup HONG  Sang Hoon LEE  Lynn CHOI  

     
    PAPER-Network

      Vol:
    E96-B No:5
      Page(s):
    1097-1111

    Existing MANET routing protocols may not be efficient for mobile sensor networks (MSNs) since they generate too much control traffic by relying on flooding or route maintenance messages. Furthermore, peer-to-peer communication patterns assumed in MANET would exacerbate the traffic around sink nodes in MSNs. In this paper we propose traffic adaptive routing (TAR) for MSNs; it can reduce the control packets by analyzing and predicting the source, volume, and the patterns of both traffic and mobility. Through its analysis and the prediction of mobility, TAR also copes with dynamic topology changes by carrying out a fast route recovery process. Our theoretical analysis shows that TAR can effectively reduce unnecessary control packet flooding by 53% on average when compared to AODV. We implement TAR on NS-2. Our experimental evaluation confirms that TAR can not only improve the network and energy performance for MSNs but also can be a practical routing solution for MANET and WSNs compared to the existing ad hoc routing protocols.

41-60hit(320hit)