scispace - formally typeset
Search or ask a question
Author

Yuhua Yuan

Bio: Yuhua Yuan is an academic researcher from Shanghai University. The author has contributed to research in topics: Ad hoc wireless distribution service & Optimized Link State Routing Protocol. The author has an hindex of 5, co-authored 6 publications receiving 142 citations.

Papers
More filters
Proceedings ArticleDOI
12 Dec 2005
TL;DR: An optimization of ad hoc on-demand multipath distance vector (OAOMDV) is presented to solve the "route cutoff" problem in AOMVV and simulation results show the performance improvement.
Abstract: To avoid frequent route discovery, various multipath routing protocol has been proposed based on the existing single path routing protocol in ad hoc networks. Ad hoc on-demand multipath distance vector (AOMDV) is one of extensions to the well-studied ad hoc on distance vector (AODV). In this paper an optimized AOMDV (OAOMDV) is presented to solve the "route cutoff" problem in AOMDV. The proposed protocol adds a new scheme into AOMDV and simulation results show the performance improvement

100 citations

Proceedings ArticleDOI
05 Dec 2005
TL;DR: An effective scheme to balance the load in ad hoc network is presented, which can be applied in most on-demand routing protocols, and the performance of routing overhead and average end-to-end delay is improved.
Abstract: Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. In this paper, we present an effective scheme to balance the load in ad hoc network. The new scheme can be applied in most on-demand routing protocols. It is implemented in the process of route request. When route request (RREQ) messages are flooded to acquire routes, only the qualified nodes, which have a potential to serve as intermediate forwarding nodes, will respond to these messages, so that the established path will not be very congested, and the traffic will be distributed evenly in the network. In this scheme, a threshold value, which is used to judge if the intermediate node is overloaded, is variable and changing along with the nodes' interface queue occupancy around the backward path. Therefore, we call it an adaptive load-balancing approach. We apply this scheme in ad-hoc on-demand distance vector (AODV) and simulation results show that the network load is balanced on the whole, and the performance of routing overhead and average end-to-end delay is also improved.

27 citations

Journal ArticleDOI
TL;DR: An adaptive load balancing scheme is proposed to balance the load in ad hoc networks and can be applied in most on-demand routing protocols resulting in significant performance improvement.
Abstract: An adaptive load balancing scheme is proposed to balance the load in ad hoc networks. The new scheme can be applied in most on-demand routing protocols resulting in significant performance improvement. The proposed scheme is applied to the ad hoc on-demand distance vector (AODV) routing protocol. Simulation results show that the network load is balanced on the whole, and performance in packet loss rate, routing overhead and average end-to-end delay is also improved.

9 citations

Proceedings ArticleDOI
12 Dec 2005
TL;DR: According to simulation results, it is validated that DRMC performs significantly better than IEEE 802.11 standard which provides multiple channels while its MAC is still designed for a single channel.
Abstract: Multi-channel research in wireless ad hoc networks has drawn more attention in recent years. Several MAC protocols have been proposed for multi-channel access. However, they either suffer from additional hardware and algorithm cost or weak broadcast support. In this paper, a dual reservation MAC protocol based on CDMA (DRMC) is proposed to solve those problems. Code synchronization is dynamically implemented through RTS/CTS handshake. Once communication is set up, both sides can reserve resource through piggyback. And furthermore, broadcast messages are well supported by an out-of-band busy tone. According to simulation results, we have validated that DRMC performs significantly better than IEEE 802.11 standard which provides multiple channels while its MAC is still designed for a single channel

6 citations

Proceedings ArticleDOI
18 Apr 2006
TL;DR: Compared with IEEE 802.11 DCF protocol, the proposed mechanism can achieve better performance of network throughput and dynamic power control mechanism is implemented to reduce near-far interference.
Abstract: This paper proposes a new multi-channel MAC Protocol with Power Control for Ad hoc Networks. First, the code channel is divided into common channel, broadcast channel and data channel while code synchronization is dynamically implemented through RTS/CTS handshake. In order to decrease handshake cost and avoid code channel switching frequently, Dual Reservation scheme is proposed through ACK Piggybacking. And furthermore, dynamic power control mechanism is implemented to reduce near-far interference. Besides, broadcast is well supported by an out-of-band busy tone. Compared with IEEE 802.11 DCF protocol, the simulation results show that the proposed mechanism can achieve better performance of network throughput.

5 citations


Cited by
More filters
Journal ArticleDOI
01 Jan 2015
TL;DR: A survey on multihop ad hoc network paradigms for disaster scenarios highlights their applicability to important tasks in disaster relief operations and discusses the open challenges and the future research directions for each different ad hoc paradigm.
Abstract: Disastrous events are one of the most challenging applications of multihop ad hoc networks due to possible damages of existing telecommunication infrastructure. The deployed cellular communication infrastructure might be partially or completely destroyed after a natural disaster. Multihop ad hoc communication is an interesting alternative to deal with the lack of communications in disaster scenarios. They have evolved since their origin, leading to different ad hoc paradigms such as MANETs, VANETs, DTNs, or WSNs. This paper presents a survey on multihop ad hoc network paradigms for disaster scenarios. It highlights their applicability to important tasks in disaster relief operations. More specifically, the paper reviews the main work found in the literature, which employed ad hoc networks in disaster scenarios. In addition, it discusses the open challenges and the future research directions for each different ad hoc paradigm.

137 citations

Journal ArticleDOI
01 Feb 2020
TL;DR: A secure routing and monitoring protocol with multi-variant tuples using Two-Fish (TF) symmetric key approach to discover and prevent the adversaries in the global sensor network is proposed.
Abstract: Internet of Things (IoT) has advanced its pervasiveness across the globe for the development of smart networks. It is aimed to deploy network edge that enables smart services and computation for the IoT devices. In addition, this deployment would not only improve the user experience but also provide service resiliency in case of any catastrophes. In IoT applications, the edge computing exploits distributed architecture and closeness of end-users to provide faster response and better quality of service. However, the security concern is majorly addressed to resist the vulnerability of attacks (VoA). Existing methodologies deal only with static wireless sensor web to deduce the intrusions in which the sensor nodes are deployed in a uniform manner to retain the constancy. Since the sensor nodes are constantly being in question through different transmission regions with several levels of velocities, selection of sensor monitoring nodes or guard nodes has become a challenging job in recent research. In addition, the adversaries are also moving from one location to another to explore its specific chores around the network. Thus, to provide flexible security, we propose a secure routing and monitoring protocol with multi-variant tuples using Two-Fish (TF) symmetric key approach to discover and prevent the adversaries in the global sensor network. The proposed approach is designed on the basis of the Authentication and Encryption Model (ATE). Using Eligibility Weight Function (EWF), the sensor guard nodes are selected and it is hidden with the help of complex symmetric key approach. A secure hybrid routing protocol is chosen to be built by inheriting the properties of both Multipath Optimized Link State Routing (OLSR) and Ad hoc On-Demand Multipath Distance Vector (AOMDV) protocols. The result of the proposed approach is shown that it has a high percentage of monitoring nodes in comparison with the existing routing schemes. Moreover, the proposed routing mechanism is resilient to multiple mobile adversaries; and hence it ensures multipath delivery.

114 citations

Journal ArticleDOI
TL;DR: This work presents a holistic view on various trust management frameworks geared for MANETs, capable to handle main existing attacks deceiving trustworthiness computation to mislead trust-based network operations, referred to as trust-distortion attacks.
Abstract: Trust management is a promising approach to conduct nodes’ transactions and establish management interactions in distributed mobile ad hoc networks (MANETs) in which nodes’ collaboration is critical to achieve system goals. Lack of centralized management, severe resource constraints (e.g., computing power, energy, and bandwidth), and important network dynamics (e.g., topology changes, node mobility, node failure, and propagation channel conditions) make trust management a challenging task in such a network. Mainly, some trust management basis may be exploited to fulfill new attacks. In this work, we present a holistic view on various trust management frameworks geared for MANETs, capable to handle main existing attacks deceiving trustworthiness computation to mislead trust-based network operations, referred to as trust-distortion attacks. Besides, we propose a taxonomy of main identified trust-distortion attacks based on how the trustworthiness estimation of a node about another node is distorted. Moreover, we provide a holistic classification of main evaluation metrics, which can be used to evaluate and compare such frameworks. For each framework, a unified approach is used to describe the trust model, taking each component required for trust management as a guideline. Moreover, each framework is analyzed regarding its resistance against different trust-distortion attacks, the framework unique features, merits, demerits, and findings. Finally, we compare different trust-distortion resistant frameworks and outline the open issues and future research directions.

88 citations

Journal ArticleDOI
TL;DR: Fault-Tolerant Disjoint Multipath Distance Vector Routing Algorithm (FD-AOMDV) is proposed that sprints path discovery phase with a reduced amount of delay and finds disjoint paths in a way that routing overloads decrease considerably.
Abstract: Mobile ad-hoc network (MANET) plays a significant role in the field of communication. Due to the dynamic movement of nodes, the network infrastructure is frequently changed. All nodes have the capacity to configure themselves and are communicated either directly through some intermediate nodes based on signal strength or through multi-hop routing. However, selection of the intermediate nodes will increase the routing overload in the route discovery procedure. Destination nodes are selected using intermediate nodes for broadcasting data packets with link scalability. The previous works for this problem have limitations such as they are not flexible to deliver the Quality of Service in the network model, and the possibility of packet delivery is less. In this paper, we propose Fault-Tolerant Disjoint Multipath Distance Vector Routing Algorithm (FD-AOMDV) that sprints path discovery phase with a reduced amount of delay. It finds disjoint paths in a way that routing overloads decrease considerably. FD-AOMDV can increase the scalability by reducing the routing overload when the latest route is established. Moreover, owing to the mobility of the node in MANETs, subsequent breakages of a link will cause the active path disconnection and also enlarge the routing overload. The simulation results prove that the proposed work reduces the routing overload, decreases the end-to-end delay, and reduces the packet delivery ratio compared with AOMDV and ZD-AOMDV on Network Simulator 2.

54 citations

Proceedings ArticleDOI
14 Dec 2009
TL;DR: A cross-layer Ad hoc On-demand Multipath Distance Vector with retransmission counts metric (R-AOMDV) routing protocol is designed to make use of advantages of multi-path routing protocol, such as decrease of route discovery frequency.
Abstract: Vehicular Ad hoc Network (VANET) is a special class of wireless mobile communication network. For vehicle-to-vehicle (V2V) communication, suitable routing protocols are needed. A routing metric combining hop counts and retransmission counts at MAC layer is proposed with consideration of link quality and delay reduction. Based on the new routing metric, a cross-layer Ad hoc On-demand Multipath Distance Vector with retransmission counts metric (R-AOMDV) routing protocol is designed to make use of advantages of multi-path routing protocol, such as decrease of route discovery frequency. Compared with AOMDV with minimum hop-count metric, simulation results show that R-AOMDV achieves better performance with Pareto On/Off distribution traffic model in urban VANET, no matter in sparse or dense scenarios.

50 citations