scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2010"


Journal ArticleDOI
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.

12,539 citations


Journal ArticleDOI
TL;DR: This paper provides several state of the art examples together with the design considerations like unobtrusiveness, scalability, energy efficiency, security and also provides a comprehensive analysis of the benefits and challenges of these systems.

1,331 citations


Journal ArticleDOI
TL;DR: The existing technologies and a wide array of past and state-of-the-art projects on network virtualization are surveyed followed by a discussion of major challenges in this area.

1,235 citations


Journal ArticleDOI
TL;DR: An architectural framework for resilience and survivability in communication networks is provided and a survey of the disciplines that resilience encompasses is provided, along with significant past failures of the network infrastructure.

698 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of the VHD algorithms designed to satisfy the required Quality of Service (QoS) requirements of the forthcoming Fourth Generation (4G) heterogeneous wireless networks is presented.

485 citations


Journal ArticleDOI
TL;DR: This tutorial survey provides a comprehensive treatment of game theory with important applications in cognitive radio networks, and will aid the design of efficient, self-enforcing, and distributed spectrum sharing schemes in future wireless networks.

485 citations


Journal ArticleDOI
TL;DR: The objective of this survey is to provide better understanding of the potentials for bio-inspired networking which is currently far from being fully recognized, and to motivate the research community to further explore this timely and exciting topic.

311 citations


Journal ArticleDOI
Uichin Lee1, Mario Gerla1
TL;DR: A comparative study confirms that system performance is impacted by a variety of factors such as wireless access methods, mobility, user location, and popularity of the information, in the process gaining insight into vehicular sensor network design.

239 citations


Journal ArticleDOI
TL;DR: This survey collects applications of game theory in wireless networking and presents them in a layered perspective, emphasizing on which fields game theory could be effectively applied.

215 citations


Journal ArticleDOI
TL;DR: This paper reviews the state of the art of lightweight key management solutions for WSNs and focuses on pre-distribution schemes well-adapted for homogeneous networks, thus identifying generic features that can improve some of these metrics.

213 citations


Journal ArticleDOI
TL;DR: Three aspects of WSNs security are studied: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms: memory and energy consumption and insight into the suitability of different security algorithms for use in WSN environments are provided.

Journal ArticleDOI
TL;DR: The current state-of-the-art of secure multipath routing protocols in WSNs is surveyed, the protocols in categories are classed according to their security-related operational objectives, a new threat model in the routing procedure is defined and open research issues in the area are identified.

Journal ArticleDOI
TL;DR: Compared to typical routing algorithms in sensor networks and the traditional ant-based algorithm, this new algorithm has better convergence and provides significantly better QoS for multiple types of services in wireless multimedia sensor networks.

Journal ArticleDOI
TL;DR: Why biology and computer network research are such a natural match is explored, and research efforts are most successful when they separate biological design from biological implementation - that is to say, when they extract the pertinent principles from the former without imposing the limitations of the latter.

Journal ArticleDOI
TL;DR: Using the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D), the DPAP is decomposed into a set of scalar subproblems that are classified based on their objective preference and tackled in parallel by using neighborhood information and problem-specific evolutionary operators, in a single run.

Journal ArticleDOI
TL;DR: This paper presents and evaluates ContentPlace, a data dissemination system for opportunistic networks, i.e., mobile networks in which stable simultaneous multi-hop paths between communication endpoints cannot be provided, and considers a scenario in which users both produce and consume data objects.

Journal ArticleDOI
TL;DR: An opportunistic routing protocol (EHOR) for multi-hop WSN-HEAP is designed and the results show that EHOR increases goodput and efficiency compared to traditional opportunist routing protocols and other non-opportunistic routing protocols suited for WSN -HEAP.

Journal ArticleDOI
TL;DR: This paper presents a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography and is proven existentially unforgeable against adaptive chosen-message attacks under the standard computational Diffie-Hellman assumption.

Journal ArticleDOI
TL;DR: The state of the art of exact and approximate MCOP computation algorithms are drawn, with particular attention to the networking area, and for each of them the worst case computational complexity is derived.

Journal ArticleDOI
TL;DR: A new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment is presented and it is demonstrated that the protocol is provably secure against previous attacks.

Journal ArticleDOI
TL;DR: An intelligent backbone formation algorithm based on distributed learning automata (DLA) in which a near optimal solution to the minimum CDS problem is found and a trade-off between the running time and message complexity of algorithm with the backbone size can be made.

Journal ArticleDOI
TL;DR: A mesh based multicast routing scheme that finds stable multicast path from source to receivers that produces better packet delivery ratio, reduced packet delay and reduced overheads.

Journal ArticleDOI
TL;DR: Results from the implementation complexity analysis demonstrate that with the aid of agent technology, ALBR has lower on- board computation, storage, signaling requirements than other on-board routing schemes.

Journal ArticleDOI
TL;DR: The resilience of the on-line models considering general and specific failures is evaluated and, in both cases, the proposed model is more robust and presents a graceful degradation of the network latency, which shows the resilience of those models.

Journal ArticleDOI
TL;DR: A fuzzy logic-based handoff decision algorithm is introduced for wireless heterogeneous networks and the results show that the performance is significantly enhanced for both user and network by the method proposed.

Journal ArticleDOI
TL;DR: This paper proposes a new scheme designed to protect the privacy of the users from a web search engine that tries to profile them, which uses social networks to provide a distorted user profile to theweb search engine.

Journal ArticleDOI
TL;DR: A novel MAC-layer mixing method, named BEND, which proactively seizes opportunities for coding by taking advantage of redundant copies of a packet in the neighborhood coding repository, and the number of mixing points, and thus the coding opportunities, can be significantly increased.

Journal ArticleDOI
TL;DR: This paper addresses the problem of primary-secondary spectrum sharing in cognitive radio access networks using a framework based on a Discrete Time Markov Chain (DTMC) model and proves the suitability of the specified model while allowing a wide range of extended implementations and enhanced capabilities to be considered.

Journal ArticleDOI
TL;DR: This study indicates that ALAR increases the sender's anonymity performance by over 81% in different adversary densities with a 5% reduction in delivery ratio.

Journal ArticleDOI
TL;DR: The experimental results show that SALA outperforms the existing methods such as LEACH, GAF, PEAS and PW in terms of energy consumption.