Review Article: Network-coding based event diffusion for wireless networks using semi-broadcasting
Publish/subscribe is a well known and powerful distributed programming paradigm with many potential applications. Publish/subscribe content dissemination techniques based on opportunistic networking and network coding-based epidemic routing are key ...
Shortest route mobility assisted packet delivery with soft maximum delay guarantees in mobile ad hoc networks
In delay tolerant Mobile Ad hoc Networks (MANETs) node mobility can be exploited in order to reduce the source-destination path lengths in the expense of higher packet delivery delays. This paper addresses the problem of minimizing the average source-...
A negotiation-based networking methodology to enable cooperation across heterogeneous co-located networks
In a future internet of things, an increasing number of every-day objects becomes interconnected with each other. Current network solutions are not designed to connect a large number of co-located devices with different characteristics and network ...
ARDEN: Anonymous networking in delay tolerant networks
Delay Tolerant Networks (DTNs) provide a communications infrastructure for environments lacking continuous connectivity. Such networks rely on the mobility of nodes and the resulting opportunistic connections to carry messages from source to ...
Bus switched networks: An ad hoc mobile platform enabling urban-wide communications
In this paper we propose to leverage the public transportation system of any given city to obtain a scalable and efficient urban backbone by deploying an opportunistic network on buses. The paper proves that Bus Switched Networks (BSNs) are feasible for ...
Practical and secure localization and key distribution for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this article, we introduce Secure ...
Energy-efficient routing for correlated data in wireless sensor networks
In this paper, we investigate the reduction in the total energy consumption of wireless sensor networks using multi-hop data aggregation by constructing energy-efficient data aggregation trees. We propose an adaptive and distributed routing algorithm ...
ICARUS: hybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS
Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding. However, individual nodes may not always be willing to cooperate. In order thus to stimulate cooperation in ad hoc networks, several incentive mechanisms have been ...
Network coding and competitive approach for gradient based routing in wireless sensor networks
Energy efficiency is a key design criterion for routing protocols in wireless sensor networks since sensor nodes are strongly constrained in terms of energy supply. Gradient-Based Routing (GBR) is a well known energy efficient routing protocol that is ...
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ...
Extended sliding frame R-Aloha: Medium access control (MAC) protocol for mobile networks
Proliferation of mobile communication devices necessitates a reliable and efficient medium access control (MAC) protocol. In this paper, A MAC protocol, called extended sliding frame reservation Aloha (ESFRA), based on sliding frame R-Aloha (SFRA) is ...
Error control for multimedia communications in wireless sensor networks: A comparative performance analysis
The emerging multimedia applications of Wireless Sensor Network (WSNs) impose new challenges in design of algorithms and communication protocols for such networks. In the view of these challenges, error control is an important mechanism that enables us ...
An energy efficient channel assignment and routing algorithm for multi-radio wireless mesh networks
Endowing mesh routers with multiple radios is a recent solution to improve the performance of wireless mesh networks. Solving the problem how to assign channels to radios has attracted a lot of attention in the recent years, partly because of the ...
Estimating the channel capacity of multi-hop IEEE 802.11 wireless networks
In IEEE 802.11 wireless networks, the residual capacity of the wireless links should be accurately estimated to realize advanced network services such as flow admission control or load balancing. In this paper, we propose an algorithm that estimates the ...
Distributed resource allocation in cognitive radio networks with a game learning approach to improve aggregate system capacity
This paper presents a game theoretic solution for joint channel allocation and power control in cognitive radio networks analyzed under the physical interference model. The objective is to find a distributed solution that maximizes the network utility, ...
Auto-localization algorithm for local positioning systems
This paper studies the problem of determining the position of beacon nodes in Local Positioning Systems (LPSs), for which there are no inter-beacon distance measurements available and neither the mobile node nor any of the stationary nodes have ...
A new system for controlled testing of sensor network applications: architecture, prototype and experimental evaluation
In this paper we first argue the case for a system which can accurately reproduce sensed input or stimuli for fair evaluation of wireless sensor network applications. It is shown, with a simple example, that consistent input is crucial in the evaluation ...
Chains of Trust in vehicular networks: A secure Points of Interest dissemination strategy
This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, hotels, etc. and sign those ...
Connectivity constrained wireless sensor deployment using multiobjective evolutionary algorithms and fuzzy decision making
Deployment of sensor nodes is an important issue in designing sensor networks. The sensor nodes communicate with each other to transmit their data to a high energy communication node which acts as an interface between data processing unit and sensor ...
Survey Paper: Distance distributions in random networks
To account for stochastic properties when modeling connectivity in wireless mobile systems such as cellular, ad hoc and sensor networks, spatial point processes are used. Since connectivity can be expressed as a function of the distance between nodes, ...