scispace - formally typeset
Search or ask a question
Topic

Hazy Sighted Link State Routing Protocol

About: Hazy Sighted Link State Routing Protocol is a research topic. Over the lifetime, 6936 publications have been published within this topic receiving 169377 citations. The topic is also known as: HSLS.


Papers
More filters
Journal ArticleDOI
TL;DR: This study presents a novel link availability-based routing protocol (LBRP) for MANETs that takes unpredictable topology change and frequent link failure into account, and by a rough estimation of the distance between two adjacent nodes, is able to accurately predict link availability over a short period of time.
Abstract: Mobile ad hoc networks (MANETs) are becoming increasingly important. The most challenging issue in conjunction with MANETs is reliable routing, that is, the procedure that determines the trajectory of packets travelling over the network. The authors present a novel link availability-based routing protocol (LBRP) for MANETs. Compared with other routing protocols, LBRP takes unpredictable topology change and frequent link failure into account. Meanwhile, by a rough estimation of the distance between two adjacent nodes, the proposed approach is able to accurately predict link availability over a short period of time. Simulation results are given to verify the approach. This study could serve as groundwork for further MANET research, including analysing and optimising other network protocols. Reliable routing protocol can effectively improve the availability and reliability of upper layer services and quality of service.

54 citations

Proceedings ArticleDOI
01 Nov 2007
TL;DR: An improved variant of the GPSR protocol is presented that uses the inherent characteristics of the routing process to assess the trust in the network nodes and these trust levels are then used to influence the routing decisions so as to circumvent malevolent nodes in thenetwork.
Abstract: Ad-hoc networks generally comprise of mobile wireless nodes having limited communication and computation resources. These nodes execute special routing protocols, which help to establish multi-hop communication despite a dynamic topology. The greedy perimeter stateless routing (GPSR) protocol is one such routing protocol that is frequently used to establish routes in an ad-hoc or sensor network. However, for its precise execution, it is imperative that all nodes depict sustained benevolent behaviour. However, such an altruistic setting would never work in a wireless environment, which is intrinsically physically insecure. Consequently, participating malicious nodes may launch an array of attacks against the routing protocol leading to route severing, elongation or loop creation. In this paper, we present an improved variant of the GPSR protocol that uses the inherent characteristics of the routing process to assess the trust in the network nodes. These trust levels are then used to influence the routing decisions so as to circumvent malevolent nodes in the network. Extensive simulations indicate that the packet delivery ratio of the trusted GPSR protocol surpasses that of the standard GPSR by as much as 30% when as many as 50% of the nodes are acting maliciously in the network.

54 citations

Proceedings ArticleDOI
04 Oct 2011
TL;DR: A targeted, in-depth investigation of the current state of the BATMAN Advanced (batman-adv) protocol in a realistic office environment, using the thoroughly studied AODV protocol as a baseline, to study the reachability, packet loss, delay and throughput of the network.
Abstract: The performance of Wireless Mesh Networks under realistic conditions is not well understood. Given the huge design and parameter space for these networks, all-encompassing performance evaluations are unfeasible. We follow a practical approach and perform a targeted, in-depth investigation of the current state of the BATMAN Advanced (batman-adv) protocol in a realistic office environment, using the thoroughly studied AODV protocol as a baseline. In particular, we study the reachability, packet loss, delay and throughput of the network. We identify the main parameters influencing the routing performance and demonstrate failure modes of the studied protocols.

54 citations

Journal ArticleDOI
TL;DR: This paper introduces two complementary methods for enhancing privacy in social-network routing by obfuscating the friends lists used to inform routing decisions, and finds that it is possible to obfuscate theFriends lists without leading to a significant decrease in routing performance, as measured by delivery cost, delay and ratio.

54 citations

Journal ArticleDOI
TL;DR: The more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.
Abstract: Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.

54 citations


Network Information
Related Topics (5)
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
93% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Network packet
159.7K papers, 2.2M citations
92% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless network
122.5K papers, 2.1M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202210
20211
20193
201822
2017264