scispace - formally typeset
Search or ask a question
Topic

Ad hoc wireless distribution service

About: Ad hoc wireless distribution service is a research topic. Over the lifetime, 17734 publications have been published within this topic receiving 488205 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This work proposes classifying candidate set selection procedures into sender-side, receiver- side, and hybrid approaches, and candidate coordination procedures into timer-based and control-packet-based approaches and argues that those characteristics should be considered during the design of opportunistic routing protocols for different scenarios in underwater sensor networks.
Abstract: The unique characteristics of the underwater acoustic channel impose many challenges that limit the utilization of underwater sensor networks. In this context, opportunistic routing, which has been extensively investigated in terrestrial wireless ad hoc network scenarios, has greater potential for mitigating drawbacks from underwater acoustic communication and improving network performance. In this work, we discuss the two main building blocks for the design of opportunistic routing protocols for underwater sensor networks: candidate set selection and candidate coordination procedures. We propose classifying candidate set selection procedures into sender-side, receiver-side, and hybrid approaches, and candidate coordination procedures into timer-based and control-packet-based approaches. Based on this classification, we discuss particular characteristics of each approach and how they relate to underwater acoustic communication. Furthermore, we argue that those characteristics should be considered during the design of opportunistic routing protocols for different scenarios in underwater sensor networks.

88 citations

Proceedings ArticleDOI
06 Aug 2007
TL;DR: A light-weight and scalable framework to detect Sybil attacks that does not require any vehicle in the network to disclose its identity, hence privacy is preserved at all times is proposed.
Abstract: Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs because a malicious user may deliberately mislead other vehicles and vehicular agencies. One type of malicious behavior is called a Sybil attack, wherein a malicious vehicle pretends to be multiple other vehicles. Reported data from a Sybil attacker will appear to arrive from a large number of distinct vehicles, and hence will be credible. This paper proposes a light-weight and scalable framework to detect Sybil attacks. Importantly, the proposed scheme does not require any vehicle in the network to disclose its identity, hence privacy is preserved at all times. Simulation results demonstrate the efficacy of our protocol.

88 citations

Journal ArticleDOI
TL;DR: This work proposes hybrid wireless network protocols to combine the advantages of BS-oriented and ad hoc wireless networks, which are more flexible, reliable, and have better performance than the traditional protocols.
Abstract: Basically, there are two types of wireless network systems - base-station (BS) oriented networks and ad hoc wireless networks. In the first type, the mobile hosts communicate with base stations, while, in ad hoc networks, the mobile hosts communicate with one another directly. The BS-oriented wireless network has better performance and is more reliable. However, the ad hoc network topology is desirable because of its low cost, plug-and-play convenience, and flexibility. Its usage of bandwidth and battery power is more efficient, but route and communication connectivity is fairly weak; any migration by a host participating in one or more routes could make the route invalid. Much cost is incurred in maintaining communication. Thus, the ad hoc wireless network is only suitable for applications in a small geographical area. We propose hybrid wireless network protocols to combine the advantages of BS-oriented and ad hoc wireless networks. We allow two mobile hosts to communicate directly (one-hop direct transmission) or through another mobile host (two-hop direct transmission) within a BS-oriented network. The hybrid protocols are more flexible, reliable, and have better performance than the traditional protocols. Simulation results show that two-hop direct-transmission has a lower non-completion probability. If the communicating parties are always within a two-hop direct-transmission area, the rate of complete communication improves by about 20%.

88 citations

Book
01 Nov 2006
Abstract: Localization Techniques.- Range-Free Localization.- A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks.- Learning Sensor Location from Signal Strength and Connectivity.- Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks.- Experiences from the Empirical Evaluation of Two Physical Layers for Node Localization.- Secure Localization.- Robust Wireless Localization: Attacks and Defenses.- Secure and Resilient Localization in Wireless Sensor Networks.- Secure Localization for Wireless Sensor Networks using Range-Independent Methods.- TRaVarSeL-Transmission Range Variation based Secure Localization.- Secure Sequence-based Localization for Wireless Networks.- Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations).- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.- Location Privacy in Wireless LAN.- Secure Time Synchronization.- Time Synchronization Attacks in Sensor Networks.- Secure and Resilient Time Synchronization in Wireless Sensor Networks.- Securing Timing Synchronization in Sensor Networks.

88 citations

Proceedings ArticleDOI
17 Nov 2002
TL;DR: Simulation results in networks with 200 nodes show that BlueMesh is effective in quickly generating a connected scatternet in which each node, on average, does not assume more than 2.3 roles.
Abstract: We describe BlueMesh, a new protocol for the establishment of scatternets, i.e., multihop ad hoc networks of Bluetooth devices. BlueMesh defines rules for device discovery, piconet formation and piconet interconnection in order to achieve the following desirable properties: a) BlueMesh generates connected scatternets without requiring the Bluetooth devices all to be in each other's transmission range; b) the BlueMesh scatternet topology is a mesh with multiple paths between any pair of nodes; c) BlueMesh piconets are made up of no more than 7 slaves. Simulation results in networks with 200 nodes show that BlueMesh is effective in quickly generating a connected scatternet in which each node, on average, does not assume more than 2.3 roles. Moreover, the length of routes between any two nodes in the network, is comparable to that of the shortest paths between the nodes.

88 citations


Network Information
Related Topics (5)
Wireless ad hoc network
49K papers, 1.1M citations
96% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
95% related
Wireless network
122.5K papers, 2.1M citations
95% related
Network packet
159.7K papers, 2.2M citations
93% related
Wireless sensor network
142K papers, 2.4M citations
93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202317
202261
20215
20202
20192
201856