scispace - formally typeset
Search or ask a question
Topic

Ad hoc wireless distribution service

About: Ad hoc wireless distribution service is a research topic. Over the lifetime, 17734 publications have been published within this topic receiving 488205 citations.


Papers
More filters
Proceedings ArticleDOI
20 Nov 2000
TL;DR: Simulation experiments show that LANMAR provides efficient and scalable routing in large, mobile, ad hoc environments in which group mobility applies.
Abstract: In this paper, we present a novel routing protocol for wireless ad hoc networks-landmark ad hoc routing (LANMAR). LANMAR combines the features of fisheye state routing (FSR) and landmark routing. The key novelty is the use of landmarks for each set of nodes which move as a group (e.g., a team of co-workers at a convention or a tank battalion in the battlefield) in order to reduce routing update overhead. Like in FSR, nodes exchange link state only with their neighbors. Routes within the fisheye scope are accurate, while routes to remote groups of nodes are "summarized" by the corresponding landmarks. A packet directed to a remote destination initially aims at the landmark; as a gets closer to the destination it eventually switches to the accurate route provided by fisheye. Simulation experiments show that LANMAR provides efficient and scalable routing in large, mobile, ad hoc environments in which group mobility applies.

406 citations

Proceedings ArticleDOI
01 Jul 2002
TL;DR: This work provides scalable, distributed authentication services in ad hoc networks, in which multiple nodes collaboratively provide authentication services for other nodes in the network, and formalizes a localized trust model that lays the foundation for the design.
Abstract: Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service attacks by malicious nodes and attacks from compromised nodes or stolen devices. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well.This work provides scalable, distributed authentication services in ad hoc networks. Our design takes a self-securing approach, in which multiple nodes (say, k) collaboratively provide authentication services for other nodes in the network. We first formalize a localized trust model that lays the foundation for the design. We further propose refined localized certification services based on our previous work, and develop a new scalable share update to resist more powerful adversaries. Finally, we evaluate the solution through simulation and implementation.

403 citations

Proceedings ArticleDOI
Takahiro Hara1
22 Apr 2001
TL;DR: This work proposes three replica allocation methods to improve data accessibility by replicating data items on mobile hosts by taking into account the access frequency from mobile hosts to each data item and the status of the network connection.
Abstract: The advances in computer and wireless communication technologies have led to an increasing interest in ad hoc networks which are temporarily constructed by only mobile hosts. In ad hoc networks, since mobile hosts move freely, disconnections occur frequently, and this causes frequent network division. Consequently, data accessibility in ad hoc networks is lower than that in the conventional fixed networks. We propose three replica allocation methods to improve data accessibility by replicating data items on mobile hosts. In these three methods, we take into account the access frequency from mobile hosts to each data item and the status of the network connection. We also show the results of simulation experiments regarding the performance evaluation of our proposed methods.

402 citations

Proceedings ArticleDOI
21 Sep 1999
TL;DR: It is shown via simulations that this new carrier-sense multiple access (CSMA) protocol provides a higher throughput compared to its single channel counterpart by reducing the packet loss due to collisions and the use of channel reservation provides better performance than multichannel CSMA with purely random idle channel selection.
Abstract: We describe a new carrier-sense multiple access (CSMA) protocol for multihop wireless networks, sometimes also called ad hoc networks. The CSMA protocol divides the available bandwidth into several channels and selects an idle channel randomly for packet transmission. It also employs a notion of "soft" channel reservation as it gives preference to the channel that was used for the last successful transmission. We show via simulations that this multichannel CSMA protocol provides a higher throughput compared to its single channel counterpart by reducing the packet loss due to collisions. We also show that the use of channel reservation provides better performance than multichannel CSMA with purely random idle channel selection.

402 citations

Proceedings ArticleDOI
14 Sep 2003
TL;DR: TBF decouples path naming from the actual path; it provides cheap path diversity; it trades off communication for computation; and these aspects address the double scalability issue with respect to mobility rate and network size.
Abstract: Trajectory based forwarding (TBF) is a novel methodto forward packets in a dense ad hoc network that makes it possible to route a packet along a predefined curve. It is a hybrid between source based routing and Cartesian forwarding in that the trajectory is set by the source, but the forwarding decision is based on the relationship to the trajectory rather than names of intermediate nodes. The fundamental aspects of TBF are: it decouples path naming from the actual path; it provides cheap path diversity; it trades off communication for computation. These aspects address the double scalability issue with respect to mobility rate and network size. In addition, TBF provides a common framework for many services such as: broadcasting, discovery, unicast, multicast and multipath routing in ad hoc networks. TBF requires that nodes know their position relative to a coordinate system. While a global coordinate system afforded by a system such as GPS would be ideal, approximate positioning methods provided by other algorithms are also usable.

398 citations


Network Information
Related Topics (5)
Wireless ad hoc network
49K papers, 1.1M citations
96% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
95% related
Wireless network
122.5K papers, 2.1M citations
95% related
Network packet
159.7K papers, 2.2M citations
93% related
Wireless sensor network
142K papers, 2.4M citations
93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202317
202261
20215
20202
20192
201856