scispace - formally typeset
Search or ask a question

Showing papers on "Wireless ad hoc network published in 2010"


Book
01 Jan 2010
TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.
Abstract: Contributors.Preface.1. Mobile Ad-Hoc networking with a View of 4G Wireless: Imperatives and Challenges (J. Liu & I. Chlamtac).2. Off-the-Shelf Enables of Ad Hoc Networks (G. Zaruba & S. Das).3. IEEE 802.11 in Ad Hoc Networks: Protocols, Performance and Open Issues (G. Anastasi, et al.).4. Scatternet Formation in Bluetooth Networks (S. Basagni, et al.).5. Antenna Beamforming and Power Control for Ad Hoc Networks (R. Ramanathan).6. Topology Control in Wireless Ad Hoc Networks (X. Li).7. Broadcasting and Activity Scheduling in Ad Hoc Networks (I. Stojmenovic & J. Wu).8. Location Discovery (A. Savvidesn & M. Srivastava).9. Mobile Ad Hoc Networks (MANETs): Routing Technology for Dynamic, Wireless Networking (J. Macker & M. Corson).10. Routing Approaches in Mobile Ad Hoc Networks (E. Belding-Royer).11. Energy-Efficient Communication in Ad Hoc Wireless Networks (L. Feeney).12. Ad Hoc Networks Security (P. Michiardi & R. Molva).13. Self-Organized and Cooperative Ad Hoc Networking (S. Giordano & A. Urpi).14. Simulation and Modeling of Wireless, Mobile, and Ad Hoc Networks (A. Boukerche & L. Bononi).15. Modeling Cross-Layering Interaction Using Inverse Optimization (V. Syrotiuk & A.Bikki).16. Algorithmic Challenges in Ad Hoc Networks (A. Farago).Index.About the Editors.

757 citations


Journal ArticleDOI
TL;DR: A survey of routing protocols for Wireless Sensor Network is given and their strengths and limitations are compared.
Abstract: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.

582 citations


Journal ArticleDOI
TL;DR: The objective of this article is to illustrate the power of spatial models and analytical techniques in the design of wireless networks, and to provide an entry-level tutorial.
Abstract: The performance of wireless networks depends critically on their spatial configuration, because received signal power and interference depend critically on the distances between numerous transmitters and receivers. This is particularly true in emerging network paradigms that may include femtocells, hotspots, relays, white space harvesters, and meshing approaches, which are often overlaid with traditional cellular networks. These heterogeneous approaches to providing high-capacity network access are characterized by randomly located nodes, irregularly deployed infrastructure, and uncertain spatial configurations due to factors like mobility and unplanned user-installed access points. This major shift is just beginning, and it requires new design approaches that are robust to spatial randomness, just as wireless links have long been designed to be robust to fading. The objective of this article is to illustrate the power of spatial models and analytical techniques in the design of wireless networks, and to provide an entry-level tutorial.

446 citations


Journal Article
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas of MANET_s characteristics, capabilities and applications are reviewed.
Abstract: A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. The Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. It represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the adhoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas of MANET_s characteristics, capabilities and applications.

442 citations


Journal ArticleDOI
TL;DR: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity and applies it to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network.
Abstract: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or adhoc networks, the transmission capacity (TC) framework allows for quantification of achievable single-hop rates by focusing on a simplified physical/MAC-layer model. By using stochastic geometry to quantify the multi-user interference in the network, the relationship between the optimal spatial density and success probability of transmissions in the network can be determined, and expressed-often fairly simply-in terms of the key network parameters. The basic model and analytical tools are first discussed and applied to a simple network with path loss only and we present tight upper and lower bounds on transmission capacity (via lower and upper bounds on outage probability). We then introduce random channels (fading/shadowing) and give TC and outage approximations for an arbitrary channel distribution, as well as exact results for the special cases of Rayleigh and Nakagami fading. We then apply these results to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network. The paper closes by discussing shortcomings in the model as well as future research directions.

417 citations


Journal ArticleDOI
TL;DR: A distributed algorithm based on the distributed coloring of the nodes, that increases the delay by a factor of 10–70 over centralized algorithms for 1000 nodes, and obtain upper bound for these schedules as a function of the total number of packets generated in the network.
Abstract: Algorithms for scheduling TDMA transmissions in multi-hop networks usually determine the smallest length conflict-free assignment of slots in which each link or node is activated at least once. This is based on the assumption that there are many independent point-to-point flows in the network. In sensor networks however often data are transferred from the sensor nodes to a few central data collectors. The scheduling problem is therefore to determine the smallest length conflict-free assignment of slots during which the packets generated at each node reach their destination. The conflicting node transmissions are determined based on an interference graph, which may be different from connectivity graph due to the broadcast nature of wireless transmissions. We show that this problem is NP-complete. We first propose two centralized heuristic algorithms: one based on direct scheduling of the nodes or node-based scheduling, which is adapted from classical multi-hop scheduling algorithms for general ad hoc networks, and the other based on scheduling the levels in the routing tree before scheduling the nodes or level-based scheduling, which is a novel scheduling algorithm for many-to-one communication in sensor networks. The performance of these algorithms depends on the distribution of the nodes across the levels. We then propose a distributed algorithm based on the distributed coloring of the nodes, that increases the delay by a factor of 10---70 over centralized algorithms for 1000 nodes. We also obtain upper bound for these schedules as a function of the total number of packets generated in the network.

381 citations


Book ChapterDOI
01 Jan 2010
TL;DR: The chapter discusses the advantages and disadvantages of these routing protocols, explores the motivation behind their design and trace the evolution of these protocols, and points out some open issues and possible direction of future research related to VANET routing.
Abstract: The chapter provides a survey of routing protocols in vehicular ad hoc networks. The routing protocols fall into two major categories of topology-based and position-based routing. The chapter discusses the advantages and disadvantages of these routing protocols, explores the motivation behind their design and trace the evolution of these routing protocols. Finally, it concludes the chapter by pointing out some open issues and possible direction of future research related to VANET routing. INTRODUCTION With the sharp increase of vehicles on roads in the recent years, driving has not stopped from being more challenging and dangerous. Roads are saturated, safety distance and reasonable speeds are hardly respected, and drivers often lack enough attention. Without a clear signal of improvement in the near future, leading car manufacturers decided to jointly work with national government agencies to develop solutions aimed at helping drivers on the roads by anticipating hazardous events or avoiding bad traffic areas. One of the outcomes has been a novel type of wireless access called Wireless Access for Vehicular Environment (WAVE) dedicated to vehicle-to-vehicle and vehicle-to-roadside communications. While the major objective has clearly been to improve the overall safety of vehicular traffic, promising traffic management solutions and on-board entertainment applications are also expected by the different bodies (C2CCC, VII, CALM) and projects (VICS (Yamada, 1996), CarTALK 2000 (Reichardt D, 2002), NOW, CarNet (Morris R, 2000), FleetNet (Franz, 2001)) involved in this field. When equipped with WAVE communication devices, cars and roadside units form a highly dynamic network called a Vehicular Ad Hoc Network (VANET), a special kind of Mobile AdHoc Networks (MANETs). While safety applications mostly need local broadcast connectivity, it is expected that some emerging scenarios (Lee, 2009) developed for intelligent transportation systems (ITS) would benefit from unicast communication over a multi-hop connectivity. Moreover, it is conceivable that applications that deliver contents and disseminate useful information can flourish with the support of multi-hop connectivity in VANETs. Although countless numbers of routing protocols (Mauve, 2001; Mehran, 2004) have been developed in MANETs, many do not apply well to VANETs. VANETs represent a particularly challenging class of MANETs. They are distributed, self-organizing communication networks formed by moving vehicles, and are thus characterized by very high node mobility and limited degrees of freedom in mobility patterns. As shown in Figure 1, there are two categories of routing protocols: topology-based and geographic routing. Topology-based routing uses the information about links that exist in the network to perform packet forwarding. Geographic routing uses neighboring location information to perform packet forwarding. Since link information changes in a regular basis, topology-based routing suffers from routing route breaks. Car 2 Car Communication Consortium, http://www.car‐to‐car.org The Vehicle Infrastructure Integration (VII) Initiative, http://www.vehicle‐infrastructure.org Continuous Air Interface for Long and Medium Interface (CALM), http://www.calm.hu Vehicle Information and Communication System Network On Wheels, www.network‐on‐wheels.de Figure 1: Taxonomy of Various Routing Protocols in VANET Despite many surveys already published on routing protocols in MANETs (Mauve, 2001; Mehran, 2004Giordano, 2003; Stojemnovic, 2004), a survey of newly developed routing protocols specific to VANETs has long been overdue. Li et al. (2007) have made an effort to introduce VANET routing protocols, yet there is still deficiency in a thorough and comprehensive treatment on this subject. A discussion of VANET topics and applications is incomplete without detailed coverage of relevant routing protocols and their impact on overall VANET architecture. In this book chapter, we seek to provide the missing building blocks by detailing the advances in VANET routing protocols. Section III describes the VANET architecture and its characteristics. Section IV presents a survey of these protocols experimented on or tailored to VANET and their advantages and disadvantages. It will explore the motivation behind their design and trace the evolution of these routing protocols. Finally, Section V will point out some open issues and possible direction of future research, and then conclude the book chapter.

362 citations


Journal ArticleDOI
TL;DR: In this article, insights are provided into the latest developments in 802.11s and how the overall mesh concept fits into the 802 set of networking standards are explained.
Abstract: The wireless local area network standard IEEE 802.11 is the preferred solution for lowcost data services. Key to its success are the 2.4 and 5 GHz unlicensed bands. The transmit power limitations imposed due to regulatory requirements limit the range (coverage) that can be achieved by WLANs in these bands. However, the demand for "larger" wireless infrastructure is emerging, ranging from office/university campuses to city-wide deployments. To overcome the limitations of singlehop communication, data packets need to traverse over multiple wireless hops, and wireless mesh networks are called for. Since 2004 Task Group S has been developing an amendment to the 802.11 standard to exactly address the aforementioned need for multihop communication. Besides introducing wireless frame forwarding and routing capabilities at the MAC layer, the 802.11s amendment brings new interworking and security. In this article, we provide insights into the latest developments in 802.11s and explain how the overall mesh concept fits into the 802 set of networking standards.

361 citations


Journal ArticleDOI
TL;DR: This article presents the design and implementation of a new distributed vehicular multihop broadcast protocol, DV-CAST, that can operate in all traffic regimes, including extreme scenarios such as dense and sparse traffic regimes.
Abstract: The potential of infrastructureless vehicular ad hoc networks for providing safety and nonsafety applications is quite significant. The topology of VANETs in urban, suburban, and rural areas can exhibit fully connected, fully disconnected, or sparsely connected behavior, depending on the time of day or the market penetration rate of wireless communication devices. In this article we focus on highway scenarios, and present the design and implementation of a new distributed vehicular multihop broadcast protocol, that can operate in all traffic regimes, including extreme scenarios such as dense and sparse traffic regimes. DV-CAST is a distributed broadcast protocol that relies only on local topology information for handling broadcast messages in VANETs. It is shown that the performance of the proposed DV-CAST protocol in terms of reliability, efficiency, and scalability is excellent.

361 citations


Journal ArticleDOI
TL;DR: A unified view of some basic theoretical foundations and main techniques in convex optimization, game theory, and VI theory is provided, putting special emphasis on the generality of the VI framework, showing how it allows to tackle several interesting problems in nonlinear analysis, classical optimization, and equilibrium programming.
Abstract: In this article, we have provided a unified view of some basic theoretical foundations and main techniques in convex optimization, game theory, and VI theory. We put special emphasis on the generality of the VI framework, showing how it allows to tackle several interesting problems in nonlinear analysis, classical optimization, and equilibrium programming. In particular, we showed the relevance of the VI theory in studying Nash and GNE problems. The first part of the article was devoted to provide the (basic) theoretical tools and methods to analyze some fundamental issues of an equilibrium problem, such as the existence and uniqueness of a solution and the design of iterative distributed algorithms along with their convergence properties. The second part of the article made these theoretical results practical by showing how the VI framework can be successfully applied to solve several challenging equilibrium problems in ad hoc wireless (peer-to-peer wired) networks, in the emerging field of CR networks, and in multihop communication networks. We hope that this introductory article would serve as a good starting point for readers to apply VI theory and methods in their applications, as well as to locate specific references either in applications or theory.

347 citations


Journal ArticleDOI
TL;DR: This paper proposes a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality.
Abstract: Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehavior, in order to ensure correct and smooth operations of the network. In this paper, we propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehavior in VANET access, considering the challenge that privacy provides avenue for misbehavior. The proposed system employs an identity-based cryptosystem where certificates are not needed for authentication. We show the fulfillment and feasibility of our system with respect to the security goals and efficiency.

Journal ArticleDOI
TL;DR: The state-of-art results on communication resource allocation over space, time, and frequency for emerging cognitive radio (CR) wireless networks are provided and convex optimization plays an essential role in solving these problems, in a both rigorous and efficient way.
Abstract: This article provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging cognitive radio (CR) wireless networks Focusing on the interference-power/interference-temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems are formulated, and some of the corresponding solutions are shown to be obtainable by restructuring some classic results known for traditional (non-CR) wireless networks It is demonstrated that convex optimization plays an essential role in solving these problems, in a both rigorous and efficient way Promising research directions on interference management for CR and other related multiuser communication systems are discussed

01 Jan 2010
TL;DR: This research paper provides an overview of several routing protocols for mobile ad hoc networks by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance.
Abstract: Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This research paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved.

Journal ArticleDOI
TL;DR: It is shown that vectorlinear codes outperform scalar linear index codes and that vector linear codes are insufficient for achieving the optimum number of transmissions.
Abstract: The index coding problem has recently attracted a significant attention from the research community due to its theoretical significance and applications in wireless ad hoc networks. An instance of the index coding problem includes a sender that holds a set of information messages X={x1,...,xk} and a set of receivers R. Each receiver (x,H) in R needs to obtain a message x X and has prior side information consisting of a subset H of X . The sender uses a noiseless communication channel to broadcast encoding of messages in X to all clients. The objective is to find an encoding scheme that minimizes the number of transmissions required to satisfy the demands of all the receivers. In this paper, we analyze the relation between the index coding problem, the more general network coding problem, and the problem of finding a linear representation of a matroid. In particular, we show that any instance of the network coding and matroid representation problems can be efficiently reduced to an instance of the index coding problem. Our reduction implies that many important properties of the network coding and matroid representation problems carry over to the index coding problem. Specifically, we show that vector linear codes outperform scalar linear index codes and that vector linear codes are insufficient for achieving the optimum number of transmissions.

Journal ArticleDOI
TL;DR: Simulation results confirm that if packet generation rate and associated transmission power for safety messages are adjusted in an on-demand and adaptive fashion, robust tracking is possible under various traffic conditions.
Abstract: Vehicular ad hoc networks play a critical role in enabling important active safety applications such as cooperative collision warning. These active safety applications rely on continuous broadcast of self-information by all vehicles, which allows each vehicle to track all its neighboring cars in real time. The most pressing challenge in such safety-driven communication is to maintain acceptable tracking accuracy while avoiding congestion in the shared channel. In this article we propose a transmission control protocol that adapts communication rate and power based on the dynamics of a vehicular network and safety-driven tracking process. The proposed solution uses a closed-loop control concept and accounts for wireless channel unreliability. Simulation results confirm that if packet generation rate and associated transmission power for safety messages are adjusted in an on-demand and adaptive fashion, robust tracking is possible under various traffic conditions.

Proceedings ArticleDOI
14 Mar 2010
TL;DR: This work presents an evaluation using real mobility traces of nodes and their social interactions to show that PeopleRank manages to deliver messages with near optimal success rate (close to Epidemic Routing) while reducing the number of message retransmissions by 50% compared to Epilogue Routing.
Abstract: In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between cost (number of message replicas) and rate of successful message delivery. We address this challenge by developing the PeopleRank approach in which nodes are ranked using a tunable weighted social information. Similar to the PageRank idea, PeopleRank gives higher weight to nodes if they are socially connected to important other nodes of the network. We develop centralized and distributed variants for the computation of PeopleRank. We present an evaluation using real mobility traces of nodes and their social interactions to show that PeopleRank manages to deliver messages with near optimal success rate (close to Epidemic Routing) while reducing the number of message retransmissions by 50% compared to Epidemic Routing.

Proceedings Article
20 Feb 2010
TL;DR: Cognitive radios, with the capabilities to sense the operating environment, learn and adapt in real time according to environment creating a form of mesh network, are seen as a promising technology.
Abstract: The radio frequency spectrum is a scarce natural resource and its efficient use is of the utmost importance. The spectrum bands are usually licensed to certain services, such as mobile, fixed, broadcast, and satellite, to avoid harmful interference between different networks to affect users. Most spectrum bands are allocated to certain services but worldwide spectrum occupancy measurements show that only portions of the spectrum band are fully used. Moreover, there are large temporal and spatial variations in the spectrum occupancy. In the development of future wireless systems the spectrum utilization functionalities will play a key role due to the scarcity of unallocated spectrum. Moreover, the trend in wireless communication systems is going from fully centralized systems into the direction of self organizing systems where individual nodes can instantaneously establish ad hoc networks whose structure is changing over time. Cognitive radios, with the capabilities to sense the operating environment, learn and adapt in real time according to environment creating a form of mesh network, are seen as a promising technology. Cognitive radio is a new technology that allows spectrum to be dynamically shared between users.

Journal ArticleDOI
TL;DR: This paper efficiently copes with challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures.
Abstract: Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures. In our proposal, we employ each RSU to maintain and manage an on-the-fly group within its communication range. Vehicles entering the group can anonymously broadcast vehicle-to-vehicle (V2V) messages, which can be instantly verified by the vehicles in the same group (and neighboring groups). Later, if the message is found to be false, a third party can be invoked to disclose the identity of the message originator. Our protocol efficiently exploits the specific features of vehicular mobility, physical road limitations, and properly distributed RSUs. Our design leads to a robust VANET since, if some RSUs occasionally collapse, only the vehicles that are driving in those collapsed areas will be affected. Due to the numerous RSUs sharing the load to maintain the system, performance does not significantly degrade when more vehicles join the VANET; hence, the system is scalable.

Journal ArticleDOI
07 Sep 2010
TL;DR: The latest methods which have been proposed by researchers to manage trust and reputation in wireless communication systems in the fields of mobile ad hoc networks, wireless sensor networks, and cognitive radio networks are examined.
Abstract: Trust is an important concept in human interactions which facilitates the formation and continued existence of functional human societies. In the first decade of the 21st century, computational trust models have been applied to solve many problems in wireless communication systems. This cross-disciplinary research has yielded many innovative solutions. In this paper, we examine the latest methods which have been proposed by researchers to manage trust and reputation in wireless communication systems. Specifically, we survey the state of the art in the application of trust models in the fields of mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and cognitive radio networks (CRNs). We classify the mainstream methods into natural categories and illustrate how they complement each other in achieving design goals. Major research directions are also outlined.

Journal ArticleDOI
TL;DR: This paper classifies proposed wireless sensor network key management schemes into three categories based on the encryption key mechanism, and divides each category into several subcategories based on key pre-distribution and key establishment.

Book
20 Oct 2010
TL;DR: The Handbook of Mobile Ad Hoc Networks for Mobility Models as discussed by the authors introduces 40 major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and handheld devices.
Abstract: The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Journal ArticleDOI
TL;DR: DistressNet is presented, an ad hoc wireless architecture that supports disaster response with distributed collaborative sensing, topology-aware routing using a multichannel protocol, and accurate resource localization andimation techniques improve localization accuracy in difficult environments.
Abstract: Situational awareness in a disaster is critical to effective response. Disaster responders require timely delivery of high volumes of accurate data to make correct decisions. To meet these needs, we present DistressNet, an ad hoc wireless architecture that supports disaster response with distributed collaborative sensing, topology-aware routing using a multichannel protocol, and accurate resource localization. Sensing suites use collaborative and distributed mechanisms to optimize data collection and minimize total energy use. Message delivery is aided by novel topology management, while congestion is minimized through the use of mediated multichannel radio protocols. Estimation techniques improve localization accuracy in difficult environments.

Proceedings ArticleDOI
14 Mar 2010
TL;DR: An extensive experiment involving thousands of operational taxies in Shanghai city establishes an exponential model that can accurately depict the tail behavior of the inter-contact time in VANETs and provides fundamental guidelines on design of new vehicular mobility models in urban scenarios, new data forwarding protocols and their performance analysis.
Abstract: Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to prohibitive costs, little work has conducted experimental study on inter-contact time in urban vehicular environments. In this paper, we carry out an extensive experiment involving thousands of operational taxies in Shanghai city. Studying the taxi trace data on the frequency and duration of transfer opportunities between taxies, we observe that the tail distribution of the inter-contact time, that is the time gap separating two contacts of the same pair of taxies, exhibits a light tail such as one of an exponential distribution, over a large range of timescale. This observation is in sharp contrast to recent empirical data studies based on human mobility, in which the distribution of the inter-contact time obeys a power law. By performing a least squares fit, we establish an exponential model that can accurately depict the tail behavior of the inter-contact time in VANETs. Our results thus provide fundamental guidelines on design of new vehicular mobility models in urban scenarios, new data forwarding protocols and their performance analysis.

Journal ArticleDOI
TL;DR: The interference models are presented in this survey from the perspective of the radio capture phenomenon, resulting in a unified view of interference models, which may be helpful when selecting the appropriate model for a given purpose.
Abstract: The recent increasing interest in ad hoc networks has motivated the study and development of interference models capable of capturing the intrinsic characteristics of this kind of network, such as the lack of a central coordination and the consequent distributed nature of some of the network functions (e.g., medium access control and routing protocols). As a consequence, a myriad of interference models for ad hoc networks can be found in the literature, that describe the effects of interference at different layers and with different levels of detail. Some of these models describe interference as a random process whose statistics depend mainly on physical layer parameters, and are better suited for the analysis of issues related to the physical layer. Other models focus on the effects of interference at higher layers, and are more appropriate when the analysis of network-related issues is of interest. This paper presents a comprehensive survey of interference models for wireless ad hoc networks, emphasizing their domains of application, illustrated with examples. The interference models are presented in this survey from the perspective of the radio capture phenomenon, resulting in a unified view of interference models, which may be helpful when selecting the appropriate model for a given purpose.

Journal ArticleDOI
TL;DR: A cross-layer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks, which is called the routing and dynamic spectrum-allocation (ROSA) algorithm, which aims to maximize the network throughput by performing joint routing, dynamic spectrum allocation, scheduling, and transmit power control.
Abstract: Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hop by hop. For this reason, a cross-layer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, which is called the routing and dynamic spectrum-allocation (ROSA) algorithm. Through local control actions, ROSA aims to maximize the network throughput by performing joint routing, dynamic spectrum allocation, scheduling, and transmit power control. Specifically, the algorithm dynamically allocates spectrum resources to maximize the capacity of links without generating harmful interference to other users while guaranteeing a bounded bit error rate (BER) for the receiver. In addition, the algorithm aims to maximize the weighted sum of differential backlogs to stabilize the system by giving priority to higher capacity links with a high differential backlog. The proposed algorithm is distributed, computationally efficient, and has bounded BER guarantees. ROSA is shown through numerical model-based evaluation and discrete-event packet-level simulations to outperform baseline solutions, leading to a high throughput, low delay, and fair bandwidth allocation.

Proceedings ArticleDOI
14 Mar 2010
TL;DR: A discrete-time version of the CSMA algorithm based on a generalization of the so-called Glauber dynamics from statistical physics, which generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption.
Abstract: Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. However, these algorithms assume an idealized continuous-time CSMA protocol where collisions can never occur. In addition, simulation results indicate that the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as distributed approximations of greedy maximal scheduling) can yield much better delay performance for a large set of arrival rates, they may only achieve a fraction of the capacity region in general. In this paper, we propose a discrete-time version of the CSMA algorithm. Central to our results is a discrete-time distributed randomized algorithm which is based on a generalization of the so-called Glauber dynamics from statistical physics, where multiple links are allowed to update their states in a single time slot. The algorithm generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption. More importantly, the algorithm allows us to incorporate delay-reduction mechanisms which lead to very good delay performance while retaining the throughput-optimality property.

Journal ArticleDOI
TL;DR: A privacy-preserving system that guarantees message trustworthiness in vehicle-to-vehicle (V2V) communications and offers the possibility of a posteriori tracing the message generator and its endorsers is proposed.
Abstract: Vehicular ad hoc networks (VANETs) are being designed to improve traffic safety and efficiency. To meet this goal, the messages disseminated in VANETs must be trustworthy. We propose a privacy-preserving system that guarantees message trustworthiness in vehicle-to-vehicle (V2V) communications. Vehicle privacy is provided as long as a vehicle does not attempt to endorse the same message more than once. In spite of a message having been validly endorsed, if it is later found to be false, the system offers the possibility of a posteriori tracing the message generator and its endorsers. Our proposal demonstrates a number of distinctive features. The system is equipped with both a priori and a posteriori countermeasures. The threshold used for a priori endorsement can adaptively change according to the message urgency and traffic context, rather than being preset in the system design stage as in existing schemes. The verification of authenticated V2V messages is accelerated by batch message-processing techniques. Simulation results illustrate that the system maintains its performance under various traffic conditions.

Journal ArticleDOI
TL;DR: The proposed Pi protocol is a practical incentive protocol, called Pi, such that when a source node sends a bundle message, it also attaches some incentive on the bundle, which is not only attractive but also fair to all participating DTN nodes.
Abstract: Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagation delays within the network. As a result, the message propagation process in DTNs follows a store-carryand- forward manner, and the in-transit bundle messages can be opportunistically routed towards the destinations through intermittent connections under the hypothesis that each individual DTN node is willing to help with forwarding. Unfortunately, there may exist some selfish nodes, especially in a cooperative network like DTN, and the presence of selfish DTN nodes could cause catastrophic damage to any well designed opportunistic routing scheme and jeopardize the whole network. In this paper, to address the selfishness problem in DTNs, we propose a practical incentive protocol, called Pi, such that when a source node sends a bundle message, it also attaches some incentive on the bundle, which is not only attractive but also fair to all participating DTN nodes. With the fair incentive, the selfish DTN nodes could be stimulated to help with forwarding bundles to achieve better packet delivery performance. In addition, the proposed Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes, such as free ride attack, layer removing and adding attacks. Extensive simulation results demonstrate the effectiveness of the proposed Pi protocol in terms of high delivery ratio and lower average delay.

Proceedings ArticleDOI
04 Jun 2010
TL;DR: The proposed MobiCloud framework enhances the operation of the ad hoc network itself by treating mobile devices as service nodes and will enhance communication by addressing trust management, secure routing, and risk management issues in the network.
Abstract: Cloud services can greatly enhance the computing capability of mobile devices. Mobile users can rely on the cloud to perform computationally intensive operations such as searching, data mining, and multimedia processing. In this paper, we propose a new mobile cloud framework called MobiCloud. In addition to providing traditional computation services, MobiCloud also enhances the operation of the ad hoc network itself by treating mobile devices as service nodes. The MobiCloud framework will enhance communication by addressing trust management, secure routing, and risk management issues in the network. A new class of applications can be developed using the enhanced processing power and connectivity provided by MobiCloud. Open research issues for MobiCloud are also discussed to outline future research directions.

Journal ArticleDOI
TL;DR: The authors discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can been implemented to thwart those attacks.
Abstract: Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years They have become a fundamental component of many intelligent transportation systems and VANETs are being used to improve road safety and enable a wide variety of value-added services Many forms of attacks against VANETs have emerged recently that attempt to compromise the security of such networks Such security attacks on VANETs may lead to catastrophic results such as the loss of lives or loss of revenue for those value-added services Therefore making VANETs secure has become a key objective for VANET designers To develop and deploy secure VANET infrastructures remains a significant challenge The authors discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to thwart those attacks