scispace - formally typeset
Search or ask a question
Topic

Ad hoc wireless distribution service

About: Ad hoc wireless distribution service is a research topic. Over the lifetime, 17734 publications have been published within this topic receiving 488205 citations.


Papers
More filters
Proceedings ArticleDOI
Filipe Araujo, Luís Rodrigues, Jörg Kaiser1, C. Liu1, C. Mitidieri1 
06 Jun 2005
TL;DR: This paper presents a proof-of-concept DHT, called cell hash routing (CHR), designed from scratch to cope with problems like limited available energy, communication range or node mobility, and believes that CHR is a simple and yet powerful adaptation of the DHT concept for wireless ad hoc environments.
Abstract: his paper focuses on the problem of implementing a distributed hash table (DHT) in wireless ad hoc networks. Scarceness of resources and node mobility turn routing into a challenging problem and therefore, we claim that building DHT as an overlay network (like in wired environments) is not the best option. Hence, we present a proof-of-concept DHT, called cell hash routing (CHR), designed from scratch to cope with problems like limited available energy, communication range or node mobility. CHR overcomes these problems, by using position information to organize a DHT of clusters instead of individual nodes. By using position-based routing on top of these clusters, CHR is very efficient. Furthermore, its localized routing and its load sharing schemes, make CHR very scalable in respect to network size and density. For these reasons, we believe that CHR is a simple and yet powerful adaptation of the DHT concept for wireless ad hoc environments.

78 citations

Journal ArticleDOI
TL;DR: The analysis showed that the proposed framework is capable of forming a search maps that is able to define multiple way points for each UAV in the network to follow a non-redundant path for searching and identifying various user nodes and geographical territories.
Abstract: Cooperative ad hoc networks are becoming very important in various military and civilian applications. The interfacing between different ad hoc networks provides large applications in field of surveillance, navigation, disaster monitoring and homeland security. This paper focuses on implementation of UAV (unmanned aerial vehicles) ad hoc network that forms a guidance system for ground ad hoc network. The network framework proposed in the paper uses neural network to form cognitive and topology maps. Indirect and Bayesian Kalman Filter are used for estimations. These estimations allows updating of pre-constructed cognitive map to form ideal final search map that is shared among all nodes to perform search and track operations. The analysis showed that the proposed framework is capable of forming a search maps that is able to define multiple way points for each UAV in the network to follow a non-redundant path for searching and identifying various user nodes and geographical territories. The effectiveness of the model is demonstrated using simulations.

78 citations

Journal ArticleDOI
TL;DR: An efficient and practical pseudonymous authentication protocol with conditional privacy preservation that protects a user's privacy until the user honestly follows the protocol and the results show the feasibility of the protocol in terms of end-to-end delay and packet delivery ratio.
Abstract: Vehicular ad hoc network (VANET) is a technology that enables smart vehicles to communicate with each other and form a mobile network VANET facilitates users with improved traffic efficiency and safety Authenticated communication becomes one of the prime requirements of VANET However, authentication may reveal a user’s personal information such as identity or location, and therefore, the privacy of an honest user must be protected This paper proposes an efficient and practical pseudonymous authentication protocol with conditional privacy preservation Our protocol proposes a hierarchy of pseudonyms based on the time period of their usage We propose the idea of primary pseudonyms with relatively longer time periods that are used to communicate with semi-trusted authorities and secondary pseudonyms with a smaller life time that are used to communicate with other vehicles Most of the current pseudonym-based approaches are based on certificate revocation list (CRL) that causes significant communication and storage overhead or group-based approaches that are computationally expensive and suffer from group-management issues These schemes also suffer from trust issues related to certification authority Our protocol only expects an honest-but-curious behavior from otherwise fully trusted authorities Our proposed protocol protects a user’s privacy until the user honestly follows the protocol In case of a malicious activity, the true identity of the user is revealed to the appropriate authorities Our protocol does not require maintaining a CRL and the inherent mechanism assures the receiver that the message and corresponding pseudonym are safe and authentic We thoroughly examined our protocol to show its resilience against various attacks and provide computational as well as communicational overhead analysis to show its efficiency and robustness Furthermore, we simulated our protocol in order to analyze the network performance and the results show the feasibility of our proposed protocol in terms of end-to-end delay and packet delivery ratio

78 citations

01 Jan 2003
TL;DR: This paper proposes a more lightweight overlay structure: lanes and presents algorithms to correct and optimize its structure in case of topology changes and shows how it enables the trading of services specified by arbitrary descriptions.
Abstract: The ability to discover services offered in a mobile ad hoc network is the major prerequisite for effective usability of these networks. Unfortunately, existing approaches to service trading are not well suited for these highly dynamic topologies since they either rely on centralized servers or on resource-consuming query flooding. Application layer overlays seem to be a more promising approach. However, existing solutions like the ContentAddressable Network (CAN) are especially designed for internet based peerto-peer networks yielding structural conditions that are far too complex for ad hoc networks. Therefore, in this paper, we propose a more lightweight overlay structure: lanes. We present algorithms to correct and optimize its structure in case of topology changes and show how it enables the trading of services specified by arbitrary descriptions.

78 citations

Journal ArticleDOI
TL;DR: This paper proposes a secure routing protocol based on the AODV (Ad hoc On-demand Distance Vector) routing protocol, which is named WARP (Wormhole-Avoidance Routing Protocol), which considers link-disjoint multipaths during path discovery, and provides greater path selections to avoid malicious nodes, but eventually uses only one path to transmit data.

78 citations


Network Information
Related Topics (5)
Wireless ad hoc network
49K papers, 1.1M citations
96% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
95% related
Wireless network
122.5K papers, 2.1M citations
95% related
Network packet
159.7K papers, 2.2M citations
93% related
Wireless sensor network
142K papers, 2.4M citations
93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202317
202261
20215
20202
20192
201856