scispace - formally typeset
Search or ask a question
Author

Silvia Giordano

Bio: Silvia Giordano is an academic researcher from SUPSI. The author has contributed to research in topics: Wireless ad hoc network & Mobile ad hoc network. The author has an hindex of 37, co-authored 145 publications receiving 7870 citations. Previous affiliations of Silvia Giordano include Sapienza University of Rome & École Normale Supérieure.


Papers
More filters
Book
01 May 2004

1,064 citations

Book
01 Jan 2010
TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.
Abstract: Contributors.Preface.1. Mobile Ad-Hoc networking with a View of 4G Wireless: Imperatives and Challenges (J. Liu & I. Chlamtac).2. Off-the-Shelf Enables of Ad Hoc Networks (G. Zaruba & S. Das).3. IEEE 802.11 in Ad Hoc Networks: Protocols, Performance and Open Issues (G. Anastasi, et al.).4. Scatternet Formation in Bluetooth Networks (S. Basagni, et al.).5. Antenna Beamforming and Power Control for Ad Hoc Networks (R. Ramanathan).6. Topology Control in Wireless Ad Hoc Networks (X. Li).7. Broadcasting and Activity Scheduling in Ad Hoc Networks (I. Stojmenovic & J. Wu).8. Location Discovery (A. Savvidesn & M. Srivastava).9. Mobile Ad Hoc Networks (MANETs): Routing Technology for Dynamic, Wireless Networking (J. Macker & M. Corson).10. Routing Approaches in Mobile Ad Hoc Networks (E. Belding-Royer).11. Energy-Efficient Communication in Ad Hoc Wireless Networks (L. Feeney).12. Ad Hoc Networks Security (P. Michiardi & R. Molva).13. Self-Organized and Cooperative Ad Hoc Networking (S. Giordano & A. Urpi).14. Simulation and Modeling of Wireless, Mobile, and Ad Hoc Networks (A. Boukerche & L. Bononi).15. Modeling Cross-Layering Interaction Using Inverse Optimization (V. Syrotiuk & A.Bikki).16. Algorithmic Challenges in Ad Hoc Networks (A. Farago).Index.About the Editors.

757 citations

Journal ArticleDOI
TL;DR: The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract: Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

430 citations

Journal ArticleDOI
TL;DR: This article discusses the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the IETF MANET research, and analyzes four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application.
Abstract: In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This paradigm has often been identified with the solutions developed inside the IETF MANET working group, and for this reason it is called the MANET paradigm. However, they do not coincide, and in the last decade they clearly diverged. In this article, we start from the reasons why the MANET paradigm did not have a major impact on computer communications, and we discuss the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the MANET research. Specifically, we analyze four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application of the multihop ad hoc networking paradigm. We also present the new research directions in the multihop ad hoc networking field: peoplecentric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications.

427 citations

Journal ArticleDOI
TL;DR: A global description of the building blocks used by the basic operation of the Terminodes network; they all rely on various concepts of self-organization.
Abstract: The Terminodes project is designing a wide-area mobile ad hoc network which is meant to be used in a public environment; in our approach, the network is run by users themselves. We give a global description of the building blocks used by the basic operation of the network; they all rely on various concepts of self-organization. Routing uses a combination of geography-based information and local MANET-like protocols. Terminode positioning is obtained by either GPS or a relative positioning method. Mobility management uses self-organized virtual regions. Terminodes employ a form of virtual money called nuglets as an incentive to collaborate. Lastly, we discuss directions for providing some level of security.

416 citations


Cited by
More filters
Proceedings ArticleDOI
Kevin Fall1
25 Aug 2003
TL;DR: This work proposes a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources.
Abstract: The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. To achieve interoperability between them, we propose a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources. The architecture operates as an overlay above the transport layers of the networks it interconnects, and provides key services such as in-network data storage and retransmission, interoperable naming, authenticated forwarding and a coarse-grained class of service.

3,511 citations

01 Jan 1990
TL;DR: An overview of the self-organizing map algorithm, on which the papers in this issue are based, is presented in this article, where the authors present an overview of their work.
Abstract: An overview of the self-organizing map algorithm, on which the papers in this issue are based, is presented in this article.

2,933 citations

Book ChapterDOI
26 Sep 2002
TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Abstract: Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities’ collaboration using a technique called reputation. The reputation is calculated based on various types of information on each entity’s rate of collaboration. Since there is no incentive for a node to maliciously spread negative information about other nodes, simple denial of service attacks using the collaboration technique itself are prevented. The generic mechanism can be smoothly extended to basic network functions with little impact on existing protocols.

1,746 citations

Journal ArticleDOI
TL;DR: An overview of ad hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination and previously proposed location services are discussed in addition to position-based packet forwarding strategies.
Abstract: We present an overview of ad hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination. Other than the destination's position, each node need know only its own position and the position of its one-hop neighbors in order to forward packets. Since it is not necessary to maintain explicit routes, position-based routing does scale well even if the network is highly dynamic. This is a major advantage in a mobile ad hoc network where the topology may change frequently. The main prerequisite for position-based routing is that a sender can obtain the current position of the destination. Therefore, previously proposed location services are discussed in addition to position-based packet forwarding strategies. We provide a qualitative comparison of the approaches in both areas and investigate opportunities for future research.

1,722 citations

Book
06 Jul 2001
TL;DR: The application of Network Calculus to the Internet and basic Min-plus and Max-plus Calculus and Optimal Multimedia Smoothing and Adaptive and Packet Scale Rate Guarantees are studied.
Abstract: Network Calculus.- Application of Network Calculus to the Internet.- Basic Min-plus and Max-plus Calculus.- Min-plus and Max-plus System Theory.- Optimal Multimedia Smoothing.- FIFO Systems and Aggregate Scheduling.- Adaptive and Packet Scale Rate Guarantees.- Time Varying Shapers.- Systems with Losses.

1,666 citations