Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity of the message traffic become […]
Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks
Energy awareness for computation and protocol management is becoming a crucial factor in the design of protocols and algorithms. On the other hand, in order to support node mobility, scalable routing strategies have been designed and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce the […]
A Novel Word Spotting Method Based on Recurrent Neural Networks
Keyword spotting refers to the process of retrieving all instances of a given keyword from a document. In the present paper, a novel keyword spotting method for handwritten documents is described. It is derived from a neural network-based system for unconstrained handwriting recognition. As such it performs template-free spotting, i.e., it is not necessary for […]
POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily available to end users. In […]
Packet-Hiding Methods for Preventing Selective Jamming Attacks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol […]
e-ARAN: Enhanced Authenticated Routing for ad hoc networks to handle selfish nodes
Mobile ad hoc network requires lots of attention towards secure reputed routing. This paper proposed a novel reputed e-ARAN scheme to detect and handle authenticated selfish nodes, based on reputed OCEAN scheme. With description of all four phases of reputed e-ARAN it also proves that the proposed scheme gives better end-to-end delay and throughput as […]
Optimizing throughput with reduction in power consumption and performance comparison of DSR and AODV routing protocols
The main objective of the paper is to increase the throughput thereby reducing the Network Load and end to end delay between nodes. To achieve this, it is proposed to go for reactive routing protocols. Proactive routing protocols use table-driven strategy that is the routing tables are exchanged periodically between nodes which lead to more […]
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
For real-time video broadcast where multiple users are interested in the same content, mobile-to-mobile cooperation can be utilized to improve delivery efficiency and reduce network utilization. Under such cooperation, however, real-time video transmission requires end-to-end delay bounds. Due to the inherently stochastic nature of wireless fading channels, deterministic delay bounds are prohibitively difficult to guarantee. […]
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per-packet reward […]
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also […]
- « Previous Page
- 1
- …
- 65
- 66
- 67
- 68
- 69
- …
- 108
- Next Page »