for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> COMPUTER SCIENCE (Total: 1992 journals)
    - ANIMATION AND SIMULATION (29 journals)
    - ARTIFICIAL INTELLIGENCE (98 journals)
    - AUTOMATION AND ROBOTICS (98 journals)
    - CLOUD COMPUTING AND NETWORKS (60 journals)
    - COMPUTER ARCHITECTURE (9 journals)
    - COMPUTER ENGINEERING (9 journals)
    - COMPUTER GAMES (16 journals)
    - COMPUTER PROGRAMMING (24 journals)
    - COMPUTER SCIENCE (1159 journals)
    - COMPUTER SECURITY (45 journals)
    - DATA BASE MANAGEMENT (13 journals)
    - DATA MINING (32 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (29 journals)
    - ELECTRONIC DATA PROCESSING (21 journals)
    - IMAGE AND VIDEO PROCESSING (39 journals)
    - INFORMATION SYSTEMS (105 journals)
    - INTERNET (92 journals)
    - SOCIAL WEB (50 journals)
    - SOFTWARE (34 journals)
    - THEORY OF COMPUTING (8 journals)

COMPUTER SCIENCE (1159 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 13)
Abakós     Open Access   (Followers: 4)
ACM Computing Surveys     Hybrid Journal   (Followers: 23)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 9)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 13)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 6)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 12)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 4)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 14)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 5)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 1)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 21)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 8)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 9)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 11)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 25)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 11)
Advanced Engineering Materials     Hybrid Journal   (Followers: 26)
Advanced Science Letters     Full-text available via subscription   (Followers: 9)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 16)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15)
Advances in Computer Science : an International Journal     Open Access   (Followers: 14)
Advances in Computing     Open Access   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 51)
Advances in Engineering Software     Hybrid Journal   (Followers: 26)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 10)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 26)
Advances in Human-Computer Interaction     Open Access   (Followers: 20)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 39)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access   (Followers: 2)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 8)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Air, Soil & Water Research     Open Access   (Followers: 9)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 6)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 11)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 4)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 5)
American Journal of Sensor Technology     Open Access   (Followers: 4)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 7)
Analysis in Theory and Applications     Hybrid Journal   (Followers: 1)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 11)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 7)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Software Engineering     Hybrid Journal   (Followers: 13)
Annual Reviews in Control     Hybrid Journal   (Followers: 6)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 2)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 14)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Clinical Informatics     Hybrid Journal   (Followers: 2)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Computer Systems     Open Access   (Followers: 1)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 33)
Applied Medical Informatics     Open Access   (Followers: 11)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 16)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4)
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 5)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 135)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Artifact     Hybrid Journal   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 7)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Computer Science and Information Technology     Open Access  
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access   (Followers: 1)
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 4)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 11)
Automation in Construction     Hybrid Journal   (Followers: 6)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Basin Research     Hybrid Journal   (Followers: 5)
Behaviour & Information Technology     Hybrid Journal   (Followers: 52)
Biodiversity Information Science and Standards     Open Access  
Bioinformatics     Hybrid Journal   (Followers: 279)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 14)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 17)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 33)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 44)
British Journal of Educational Technology     Hybrid Journal   (Followers: 128)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 2)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal   (Followers: 1)
Cell Communication and Signaling     Open Access   (Followers: 1)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
CERN IdeaSquare Journal of Experimental Innovation     Open Access  
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 7)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Full-text available via subscription   (Followers: 12)
Circuits and Systems     Open Access   (Followers: 16)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 4)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 13)
Communication Methods and Measures     Hybrid Journal   (Followers: 12)
Communication Theory     Hybrid Journal   (Followers: 20)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 3)
Communications of the ACM     Full-text available via subscription   (Followers: 54)
Communications of the Association for Information Systems     Open Access   (Followers: 18)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access  
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Computación y Sistemas     Open Access  
Computation     Open Access  
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 2)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access   (Followers: 1)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 12)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access  
Computational Ecology and Software     Open Access   (Followers: 9)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Geosciences     Hybrid Journal   (Followers: 15)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 13)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 31)
Computer     Full-text available via subscription   (Followers: 87)
Computer Aided Surgery     Hybrid Journal   (Followers: 3)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 7)
Computer Communications     Hybrid Journal   (Followers: 10)
Computer Engineering and Applications Journal     Open Access   (Followers: 5)
Computer Journal     Hybrid Journal   (Followers: 8)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 21)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in the Geosciences     Full-text available via subscription   (Followers: 1)
Computer Music Journal     Hybrid Journal   (Followers: 16)
Computer Physics Communications     Hybrid Journal   (Followers: 6)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 17)
Computer Science and Information Technology     Open Access   (Followers: 12)
Computer Science Education     Hybrid Journal   (Followers: 13)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Master Research     Open Access   (Followers: 10)

        1 2 3 4 5 6 | Last

Journal Cover Ad Hoc Networks
  [SJR: 0.967]   [H-I: 57]   [11 followers]  Follow
    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 1570-8705
   Published by Elsevier Homepage  [3049 journals]
  • High density emulation platform for Wi-Fi performance testing
    • Authors: Germán Capdehourat; Germán Álvarez; Martín Álvarez; Pedro Porteiro; Fernando Bagalciague
      Pages: 1 - 13
      Abstract: Publication date: 1 March 2018
      Source:Ad Hoc Networks, Volume 70
      Author(s): Germán Capdehourat, Germán Álvarez, Martín Álvarez, Pedro Porteiro, Fernando Bagalciague
      The IEEE 802.11 standard has become the basis of one of the most successful wireless communication technologies of all time. Originally created to provide wireless connectivity for a few devices, a couple of decades later it may support thousands of users in a single wireless LAN. This fact has made 802.11 a relevant research topic, and as it happens with other wireless technologies, many of the work carried out is based on simulations. In particular, studies for scenarios with high user density are usually performed this way, in many cases leading to conclusions which do not apply to real world situations. This mismatch can be due to multiple factors, such as the specific protocol implementations or the hardware and drivers used. In this article we present a novel 802.11-based testing platform, which aims to bridge the gap between simulations and the real world, in order to carry out research work for typical high density scenarios. The platform is compatible with standard 802.11-based wireless cards on the market and it was tested with two different radios, The validation metrics considered were the TCP throughput, the airtime utilization and the effective data rate, with relative errors ranging from 0 up to 15%. The potential of the tool is illustrated with real world measurements from two example use cases in education facilities: a school classroom and a conference room. The results indicate this might be the first step towards an open platform to enable active Wi-Fi performance testing for large scale scenarios. Further emulation capabilities are shown with different application tests already integrated to the platform, such as QoE tests for YouTube video playback or e-learning platforms.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.007
      Issue No: Vol. 70 (2017)
       
  • An accurate prediction method for moving target localization and tracking
           in wireless sensor networks
    • Authors: Hanen Ahmadi; Federico Viani; Ridha Bouallegue
      Pages: 14 - 22
      Abstract: Publication date: 1 March 2018
      Source:Ad Hoc Networks, Volume 70
      Author(s): Hanen Ahmadi, Federico Viani, Ridha Bouallegue
      With the large use of wireless sensor devices, the interest in positioning and tracking by means of wireless sensor networks is expected to grow further. Particularly, accurate localization of a moving target is a fundamental requirement in several Machine to Machine monitoring applications. Tracking using Received Signal Strength Indicator (RSSI) has been frequently adopted thanks to the availability and the low cost of this parameter. In this paper, we propose an innovative target tracking algorithm which combines learning regression tree approach and filtering methods using RSSI metric. Regression Tree algorithm is investigated in order to estimate the position using the RSSI. This method is combined to filtering approaches yielding to more refined results. The suggested approach is evaluated through simulations and experiments. We also compare our method to existing algorithms available in the literature. The numerical and experimental results show the relevance and the efficiency of our method.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.008
      Issue No: Vol. 70 (2017)
       
  • Survey on security in intra-body area network communication
    • Authors: Marko Kompara; Marko Hölbl
      Pages: 23 - 43
      Abstract: Publication date: 1 March 2018
      Source:Ad Hoc Networks, Volume 70
      Author(s): Marko Kompara, Marko Hölbl
      With the advances in microelectronics, embedded computing, and wireless communications, the interest in Body Sensor Networks has risen sharply and has enabled the development and implementation of such networks. A Body Sensor Network is constructed from sensor nodes distributed in and on the user's body. The nodes form a wireless network that collects physiological data and forwards it on. This sort of network has wide application prospects in the future of healthcare. The collected data is highly private and must, therefore, be protected adequately. The security mechanisms usually deployed depend heavily on the key agreement scheme. Because of the reliability requirements, energy efficiency, and hardware constraints, building a key agreement scheme for a Body Sensor Network can be quite a challenge. This paper presents a state-of-the-art overview of security in Body Sensor Networks, focusing on proposed key agreement schemes, ways they are built in, and the methods used to evaluate their security and performance. Results show that the community is very much split between the traditional key agreement schemes and schemes that take advantage of physiological or other signals to exchange a key. Security analysis is rarely performed with formal methods; instead, descriptive analysis is commonplace. There are no standards or guidelines on measuring a scheme`s efficiency. The authors therefore used different methods and, consequently, schemes can be difficult to compare.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.006
      Issue No: Vol. 70 (2017)
       
  • A distributed multichannel MAC protocol for rendezvous establishment in
           cognitive radio ad hoc networks
    • Authors: Md Akbar Hossain; Nurul I Sarkar
      Pages: 44 - 60
      Abstract: Publication date: 1 March 2018
      Source:Ad Hoc Networks, Volume 70
      Author(s): Md Akbar Hossain, Nurul I Sarkar
      Rendezvous in cognitive radio ad-hoc networks is an essential step for a pair of unknown cognitive radio (CR) users to initiate a communication. Most of the existing studies address rendezvous problems as a design of a search strategy to meet on the same channel at the same time. However, in a multi-user environment, a rendezvous cannot guarantee even if two users are on the same channel at the same time due to channel contention and the multi-channel hidden node problem. To overcome problems, we propose a novel cognitive radio rendezvous (CR-RDV) protocol by integrating the rendezvous and medium access control (MAC) issues. We modify the traditional backoff strategy based on remaining transmission time and packet length to avoid the concurrent transmission with the primary users (PUs). Moreover, an additional sensing period is introduced immediately after the RTS packet to solve the blocking problem in the multi-user environment. The proposed CR-RDV protocol is analysed based on the modified Bianchi model and an absorbing Markov chain model to capture the multi-user and rendezvous channel contention. Through extensive simulations, we show that the proposed CR-RDV protocol outperforms the existing methods with respect to throughput, delay, and packet dropping.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.010
      Issue No: Vol. 70 (2017)
       
  • Time-optimized management of IoT nodes
    • Authors: Kostas Kolomvatsos
      Pages: 1 - 14
      Abstract: Publication date: February 2018
      Source:Ad Hoc Networks, Volume 69
      Author(s): Kostas Kolomvatsos
      The vision of Internet of Things (IoT) aims to offer a vast infrastructure of numerous interconnected devices usually called IoT nodes. The infrastructure consists of the basis of pervasive computing applications. Applications can be built with the participation of the IoT nodes that interact in very dynamic environments. In this setting, one can identify the need for applying updates in the software/firmware of the autonomous nodes. Updates may include software extensions and patches significant for the efficient functioning of the IoT nodes. Legacy methodologies involve centralized models where complex algorithms and protocols are adopted for the distribution of the updates to the nodes. This paper proposes a distributed approach where each node is responsible to initiate and conclude the update process. We envision that each node monitors specific performance metrics (related to the node itself and/or the network) and based on a time-optimized scheme identifies the appropriate time to perform the update process.We propose the adoption of a finite horizon optimal stopping scheme. Our stopping model originates in the Optimal Stopping Theory (OST) and takes into account multiple performance metrics. The aim is to have the nodes capable of identifying when their performance and the performance of the network are of high quality. In that time, nodes could be able to efficiently conclude the update process. We provide a set of formulations and the analysis of our problem. Extensive experiments and a comparison assessment reveal the advantages of the proposed solution.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.10.011
      Issue No: Vol. 69 (2017)
       
  • Heterogeneous fault diagnosis for wireless sensor networks
    • Authors: Rakesh Ranjan Swain; Pabitra Mohan Khilar; Sourav Kumar Bhoi
      Pages: 15 - 37
      Abstract: Publication date: February 2018
      Source:Ad Hoc Networks, Volume 69
      Author(s): Rakesh Ranjan Swain, Pabitra Mohan Khilar, Sourav Kumar Bhoi
      Fault diagnosis has been considered as a very challenging problem in wireless sensor network (WSN) research. Faulty nodes having different behavior such as hard, soft, intermittent, and transient fault are called as heterogeneous faults in wireless sensor networks. This paper presents a heterogeneous fault diagnosis protocol for wireless sensor networks. The proposed protocol consists of three phases, such as clustering phase, fault detection phase, and fault classification phase to diagnose the heterogeneous faulty nodes in the wireless sensor networks. The protocol strategy is based on time out mechanism to detect the hard faulty nodes, and analysis of variance method (ANOVA test) to detect the soft, intermittent, and transient faulty nodes in the network. The feed forward probabilistic neural network (PNN) technique is used to classify the different types of faulty nodes in the network. The performance of the proposed heterogeneous fault diagnosis protocol is evaluated using network simulator NS-2.35. The evaluation of the proposed model is also carried out by the testbed experiment in an indoor laboratory environment and outdoor environment.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.10.012
      Issue No: Vol. 69 (2017)
       
  • Directional MAC protocol for IEEE 802.11ad based wireless local area
           networks
    • Authors: Anique Akhtar; Sinem Coleri Ergen
      Pages: 49 - 64
      Abstract: Publication date: February 2018
      Source:Ad Hoc Networks, Volume 69
      Author(s): Anique Akhtar, Sinem Coleri Ergen
      IEEE 802.11ad defines a new physical and medium access control layer for IEEE 802.11 networks to operate in the unlicensed 60 GHz millimeter wave spectrum for multi-gigabit wireless communications. Higher frequency waves have higher propagation loss but smaller antenna size. Hence, for millimeter wave networks, higher number of antennas can be packed together, enabling beamforming with very large gains. In this paper, we propose a novel Directional MAC protocol for Basic Stations (DMBS) with the goal of fully leveraging spatial reusability, and limiting deafness and hidden terminal problems with minimal overhead, and without using any complicated hardware for localization. The distinguishing features of DMBS are threefold. First, DMBS extends the association beamforming training time (A-BFT) of IEEE 802.11ad, during which the stations perform initial beamforming training with the access point (AP), by an intelligent listening mechanism. This mechanism allows the stations to passively learn about the best direction of the neighboring stations, decreasing the associated beamforming training overhead. Second, DMBS determines the best transmission direction by using multi-directional sequential (circular) RTS/CTS (Request To Send/ Clear To Send) (CRTS/CCTS) packets, and tracks the best direction by updating its beamforming table upon reception of every RTS/CTS packet, without requiring any additional hardware for localization. If the location information of the destination is up-to-date, the source station only transmits directional RTS/CTS (DRTS/DCTS) in the known direction. Third, DMBS uses two network allocation vectors (NAVs). The first NAV, denoted by NAV1, is used to reduce deafness by determining the busy nodes upon the reception of every RTS/CTS packet. The second NAV, called NAV2, is used to limit hidden terminal problem while maximizing spatial reusability by determining whether a transmission can interfere with active communication links. If NAV2 is set, then the node defers its multi-directional communication but still communicates directionally. We provide a novel Markov chain based analytical model to calculate the aggregate network throughput of DMBS. We demonstrate via extensive simulations that DMBS performs better than existing directional communication protocols in terms of throughput for different network sizes, mobilities and number of receivers.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.10.009
      Issue No: Vol. 69 (2017)
       
  • Fast network joining algorithms in industrial IEEE 802.15.4 deployments
    • Authors: Elvis Vogli; Giuseppe Ribezzo; L. Alfredo Grieco; Gennaro Boggia
      Pages: 65 - 75
      Abstract: Publication date: February 2018
      Source:Ad Hoc Networks, Volume 69
      Author(s): Elvis Vogli, Giuseppe Ribezzo, L. Alfredo Grieco, Gennaro Boggia
      Time Slotted Channel Hopping (TSCH) Medium Access Control (MAC) is a key feature of the IEEE 802.15.4 standard, aimed at accommodating the requirements of industrial Internet of Things systems. Time Division Multiple Access (TDMA) is a main pillar of TSCH, on top of which frequency hopping is added to increase the resilience of short range radio links. A tight synchronization among the network nodes is required in TSCH. Luckily, once a node joins the network, several lean techniques can be used to keep alive its synchronization. On contrary, the subtleties of the joining phase in TSCH still deserve investigations since they could hinder an effective usage of the TSCH MAC. To this end, the problem of acquiring the first synchronization in a TSCH network is investigated hereby, from several perspectives: (i) four novel mechanisms are proposed and implemented in real motes to speed up joining operations; (ii) their average joining time is analytically modeled with closed form expressions as a function of node density, communication reliability, and beacon transmission frequency; (iii) their effectiveness and the agreement between experimental and theoretical outcomes are evaluated in several scenarios.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.10.013
      Issue No: Vol. 69 (2017)
       
  • Device-to-Device assisted wireless video delivery with network coding
    • Authors: Cheng Zhan; Zhe Wen; Xiumin Wang; Liyue Zhu
      Pages: 76 - 85
      Abstract: Publication date: February 2018
      Source:Ad Hoc Networks, Volume 69
      Author(s): Cheng Zhan, Zhe Wen, Xiumin Wang, Liyue Zhu
      Broadcasting popular data content such as videos to multiple users is widely used in mobile wireless networks. We consider a group of mobile users, within proximity of each other, who are interested in the same video or cloud services. In this scenario, users are able to use device-to-device (D2D) connections, e.g., WiFi or Bluetooth, to get the video in a cooperative way. In this paper we consider the D2D-assisted wireless network coded video broadcast problem for users with multiple interfaces to minimize the number of transmission slots. In order to obtain all needed videos, user can receive encoded packet according to cellular link and local cooperative D2D links simultaneously. We analyze the lower bound and upper bound of number of transmission slots under two different receiver models. In the first model, receiver just drop the encoded packet which cannot be decoded immediately, and we propose a joint broadcast and D2D encoding solution based on the clique partition in the graph. In the second model that receiver can buffer all received encoded packets and decode when enough packets are received, we propose an optimal solution using an integer linear programming (ILP) formulation, and we also propose an effective heuristic encoding solution based on random linear coding. Simulation results show that the proposed transmission strategy can significantly reduce the number of transmission slots in most cases, which is an important performance metric in wireless video delivery.

      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/j.adhoc.2017.11.001
      Issue No: Vol. 69 (2017)
       
  • Advances in Wireless Communication and Networking for Cooperating
           Autonomous Systems
    • Authors: Enrico Natalizio; Dave Cavalcanti; Kaushik Chowdhury; Mostafa El Said
      Abstract: Publication date: January 2018
      Source:Ad Hoc Networks, Volume 68
      Author(s): Enrico Natalizio, Dave Cavalcanti, Kaushik Chowdhury, Mostafa El Said


      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/s1570-8705(17)30196-8
      Issue No: Vol. 68 (2017)
       
  • Federated IoT services leveraging 5G technologies at the edge
    • Authors: I. Farris; A. Orsino; L. Militano; A. Iera; G. Araniti
      Pages: 58 - 69
      Abstract: Publication date: January 2018
      Source:Ad Hoc Networks, Volume 68
      Author(s): I. Farris, A. Orsino, L. Militano, A. Iera, G. Araniti
      The Internet of Things (IoT) ecosystem is evolving towards the deployment of integrated environments, wherein heterogeneous devices pool their capacities together to match wide-ranging user and service requirements. As a consequence, solutions for efficient and synergistic cooperation among objects acquire great relevance. Along this line, this paper focuses on the adoption of the promising MIFaaS (Mobile-IoT-Federation-as-a-Service) paradigm to support delay-sensitive applications for high-end IoT devices in next-to-come fifth generation (5G) environments. MIFaaS fosters the provisioning of IoT services and applications with low-latency requirements by leveraging cooperation among private/public clouds of IoT objects at the edge of the network. A performance assessment of the MIFaaS paradigm in a cellular 5G environment based on both Long Term Evolution (LTE) and the recent Narrowband IoT (NB-IoT) is presented. Obtained results demonstrate that the proposed solution outperforms classic approaches, highlighting significant benefits derived from the joint use of LTE and NB-IoT bandwidths in terms of increased number of successfully delivered IoT services.

      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/j.adhoc.2017.09.002
      Issue No: Vol. 68 (2017)
       
  • A distributed routing scheme for energy management in solar powered sensor
           networks
    • Authors: Ahmad H. Dehwah; Jeff S. Shamma; Christian G. Claudel
      Pages: 11 - 23
      Abstract: Publication date: December 2017
      Source:Ad Hoc Networks, Volume 67
      Author(s): Ahmad H. Dehwah, Jeff S. Shamma, Christian G. Claudel
      Energy management is critical for solar-powered sensor networks. In this article, we consider data routing policies to optimize the energy in solar powered networks. Motivated by multipurpose sensor networks, the objective is to find the best network policy that maximizes the minimal energy among nodes in a sensor network, over a finite time horizon, given uncertain energy input forecasts. First, we derive the optimal policy in certain special cases using forward dynamic programming. We then introduce a greedy policy that is distributed and exhibits significantly lower complexity. When computationally feasible, we compare the performance of the optimal policy with the greedy policy. We also demonstrate the performance and computational complexity of the greedy policy over randomly simulated networks, and show that it yields results that are almost identical to the optimal policy, for greatly reduced worst-case computational costs and memory requirements. Finally, we demonstrate the implementation of the greedy policy on an experimental sensor network.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.10.002
      Issue No: Vol. 67 (2017)
       
  • WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous
           wireless sensor networks
    • Authors: Jie Tian; Yi Wang; Xiaoyuan Liang; Guiling Wang; Yujun Zhang
      Pages: 40 - 52
      Abstract: Publication date: December 2017
      Source:Ad Hoc Networks, Volume 67
      Author(s): Jie Tian, Yi Wang, Xiaoyuan Liang, Guiling Wang, Yujun Zhang
      Nowadays, sensor nodes are deployed to different environments to perform applications. Harsh environments such as rain or snow could damage the sensor nodes permanently. In this paper, a novel survivability-heterogeneous wireless sensor network composed of sensor nodes that is resistant to environmental detriments is designed. We for the first time study the medium access control protocol in such heterogeneous wireless sensor networks for data transmission under different weather conditions. We present a new Weather Adaptive receiver-initiated MAC protocol, called WA-MAC. WA-MAC can largely reduce idle listening time to save energy consumption for sensors during data transmission and provide a relative delay bound data delivery service by establishing appropriate rendezvous time between senders and receivers. Besides, by adopting weather forecast information, WA-MAC adjusts the data transmission process between different types of sensors to avoid packets being lost or delayed. Simulation results in ns-2 simulator show that WA-MAC can achieve the required relative delay bound, a low duty cycle and a high packet delivery ratio in the network, which outperforms other existing MAC protocols.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.10.005
      Issue No: Vol. 67 (2017)
       
  • Node localization over small world WSNs using constrained average path
           length reduction
    • Authors: Om Jee Pandey; Rajesh M. Hegde
      Pages: 87 - 102
      Abstract: Publication date: December 2017
      Source:Ad Hoc Networks, Volume 67
      Author(s): Om Jee Pandey, Rajesh M. Hegde
      Small world characteristics have been observed and studied in social networks in the context of information dissemination in important applications like disease spread among communities. However, the significance of small world characteristics in wireless sensor network (WSN) applications has hitherto not been investigated. This work investigates the significance of introducing small world characteristics in a conventional WSN for improving the node localization accuracy. In this context, a novel constrained iterative average path length reduction algorithm is proposed to introduce small world characteristics into a conventional WSN. This method utilizes a novel frequency selective approach for the introduction of small world phenomena. The frequency selective approach utilizes two frequency bands for link addition and pruning to create an optimized small world WSN. Subsequently, a constrained least squares node localization method over the small world WSN is developed using both model-based and model-free signal propagation approaches. The proposed constrained iterative average path length reduction method provides reduced average path length and a high average clustering coefficient when compared to conventional WSN. Constrained least squares node localization over the small world WSN yields improved localization performance when compared to node localization over conventional WSN. Performance analysis in terms of localization error, power consumption, bandwidth and anchors required for node localization is also discussed. Cramer-Rao lower bound analysis for node location parameters is also used to provide insights into the error bounds obtained using the proposed method. The experimental results obtained are motivating enough for the introduction of small world phenomena in conventional WSN for applications like node localization and related applications.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.10.010
      Issue No: Vol. 67 (2017)
       
  • Interference aware bandwidth estimation for load balancing in EMHR-energy
           based with mobility concerns hybrid routing protocol for VANET-WSN
           communication
    • Authors: Linda F. Mohaisen; Laurie L. Joiner
      Pages: 1 - 15
      Abstract: Publication date: November 2017
      Source:Ad Hoc Networks, Volume 66
      Author(s): Linda F. Mohaisen, Laurie L. Joiner
      The main goal of Vehicular Ad Hoc Networks (VANETs) is to improve driving safety. However, VANETs may not guarantee timely detection of dangerous road conditions or maintain communication connectivity when the network density is low, which may pose a risk to driving safety. Towards addressing this problem, the VANET is integrated with the inexpensive Wireless Sensor Network (WSN). Sensor nodes are deployed along the roadside to sense road conditions, and to buffer and deliver information about dangerous conditions to vehicles regardless of the density or connectivity of the VANET. The most challenging features in VANETs are their dynamic topology and mobility, where vehicles are moving at variable and high speeds and in different trajectories. In contrast, the challenge in the WSN is in managing the limited energy resources of the nodes, since the performance of WSNs strongly depends on their lifetime. Thus, the fundamental design challenge in designing routing protocols for a hybrid network of VANET-WSN is to maximize network lifetime and connectivity, and to minimize delay and energy consumption. To overcome these challenges, this research investigates the effects of different Quality of Service (QoS) parameters on forwarding decisions in an efficient distributed position based routing protocol, and focuses on bandwidth estimation. Bandwidth estimation is of great importance to network Quality of Service assurance, network load balancing, and routing. In this research, a bandwidth estimation strategy based on normalized throughput of a link, taking into account the interference and packet loss ratio in discrete time for every successfully delivered packet is proposed for a hybrid network of VANET-WSN. The simulation results show that the strategy is effective, and can accurately estimate the bandwidth of VANET-WSN. A comprehensive performance analysis in representative urban scenarios is performed that takes into account realistic propagation models and real city scenario traffic.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.004
      Issue No: Vol. 66 (2017)
       
  • A location aided controlled spraying routing algorithm for Delay Tolerant
           Networks
    • Authors: Hang Guo; Xingwei Wang; Hui Cheng; Min Huang
      Pages: 16 - 25
      Abstract: Publication date: November 2017
      Source:Ad Hoc Networks, Volume 66
      Author(s): Hang Guo, Xingwei Wang, Hui Cheng, Min Huang
      Delay Tolerant Networks (DTNs) often suffer from intermittent disruption and variable long delay due to factors such as mobility and energy. In this paper, a Location Aided Controlled Spraying (LACS) routing algorithm is proposed to deal with the challenging issues in DTN routing. Only the routing information carried by the contacted nodes is needed in this algorithm, and there is no need for global networks knowledge and hardware support. The routing process is divided into two stages, i.e., controlled spraying routing stage and single-copy routing stage. The maximum transfer throughput of the contact is checked before each message is forwarded. During the controlled spraying stage, the current node adjusts spraying strategy according to the encounter angle of the contact nodes. During the single-copy stage, a location prediction model based on the semi-Markov process (SMP) is introduced, and the node's behaviors can be captured both in the temporal and spatial domains with this model. The current node predicts the destination node's location, and then decides whether to forward the message to target node based on the time used for meeting the destination node. Simulation results show that the proposed algorithm can achieve better performance than the traditional routing schemes of DTNs in terms of delivery ratio, network overhead and transmission delay under both random node movement model and realistic trace scenario.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.005
      Issue No: Vol. 66 (2017)
       
  • IoT_ProSe: Exploiting 3GPP services for task allocation in the Internet of
           Things
    • Authors: Virginia Pilloni; Emad Abd-Elrahman; Makhlouf Hadji; Luigi Atzori; Hossam Afifi
      Pages: 26 - 39
      Abstract: Publication date: November 2017
      Source:Ad Hoc Networks, Volume 66
      Author(s): Virginia Pilloni, Emad Abd-Elrahman, Makhlouf Hadji, Luigi Atzori, Hossam Afifi
      This work focuses on the problem of task allocation among mobile objects that aim to collaborate in the execution of IoT (Internet of Things) applications. We consider 3GPP Proximity Services (ProSe) that enable Device to Device (D2D) communications for direct interaction among IoT objects. We first define the framework where devices willing to cooperate: (i) discover and join a cluster of objects to take part to the IoT_ProSe service; (ii) compete with the other objects in the cluster when a request for a service is sent to the cluster from the IoT application server. We then focus on two important problems. The first problem is the decision about which node should win the competition, for which we propose a game-theory based approach to find a solution maximizing objects’ utility functions. The second problem is the computation of the optimal size of devices’ clusters within a cell by maximizing the signal quality across the cell. Experimental results provide insights on the strategy performance. By appropriately setting working parameters, it is possible to improve system reliability up to 21%, and system lifetime up to 68%.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.006
      Issue No: Vol. 66 (2017)
       
  • Flexible resource allocation adaptive to communication strategy selection
           for cellular clients using Stackelberg game
    • Authors: Jinsong Gui; Yijia Lu; Xiaoheng Deng; Anfeng Liu
      Pages: 64 - 84
      Abstract: Publication date: November 2017
      Source:Ad Hoc Networks, Volume 66
      Author(s): Jinsong Gui, Yijia Lu, Xiaoheng Deng, Anfeng Liu
      In cooperative communication Networks (or cooperative cognitive radio networks), a source node usually recruits non-altruistic relays to execute cooperative communication with a target node, through compensating these potential relays with a fraction of its licensed frequency band. When a source node is far apart from a target node, it is difficult to achieve the desired transmission performance by cooperative communication. In this paper, a source node's communication strategy can dynamically be adjusted with help of a base station according to variation of wireless communication environments. Also, an appropriate relaying path can be constructed to replace a long-distance wireless link without demand of channel state information. Furthermore, following the proposed Stackelberg game-theoretic method based on three-party-cooperation, a base station can determine the preliminary division of a source node's licensed frequency band and the initial power allocation for all the relays in the same relaying path, while the source node and the related relays can dynamically adjust them respectively during data transmission according to information feedback.

      PubDate: 2017-09-11T12:49:24Z
      DOI: 10.1016/j.adhoc.2017.08.003
      Issue No: Vol. 66 (2017)
       
  • Reliable delay-sensitive spectrum handoff management for re-entrant
           secondary users
    • Authors: Uthpala Subodhani Premarathne; Ibrahim Khalil; Mohammed Atiquzzaman
      Pages: 85 - 94
      Abstract: Publication date: November 2017
      Source:Ad Hoc Networks, Volume 66
      Author(s): Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman
      Opportunistic data transmissions in cognitive radio networks is an effective data transmission mechanism which reduces the limitations of fixed spectrum allocations. In cognitive radio networks secondary users (SUs) can transmit over the available spectrum when the primary users (PUs) are inactive. However, a SU may get interrupted over multiple times when the PU re-appear on that channel for data transmission. For an interrupted SU, efficient spectrum hand-off management is vital to complete the data transmission. Efficient spectrum hand-off necessitates greatly for delay sensitive data transmissions (e.g. time critical remote monitoring applications). For such data transmissions, delay sensitive spectrum hand-off mechanisms are necessary. However, the existing sensed spectrum hand-off management methods do not consider delay bounded repeated attempts for spectrum reallocation when there are multiple interruptions. In this paper a delay sensitive spectrum hand-off management for the re-entrant SUs due to multiple interruptions is proposed. Compared to the existing solutions, the proposed spectrum allocation strategy offers more reliable delay-tolerant opportunities for accessing the spectrum for the re-entrant SUs.

      PubDate: 2017-09-17T13:12:48Z
      DOI: 10.1016/j.adhoc.2017.04.008
      Issue No: Vol. 66 (2017)
       
  • An adaptive stabilizing imposter detection scheme for distributed mobile
           wireless sensor networks
    • Authors: Ebrahim A. Alrashed; Mehmet H. Karaata; Ali Hamdan; Badour Albahar
      Pages: 1 - 12
      Abstract: Publication date: October 2017
      Source:Ad Hoc Networks, Volume 65
      Author(s): Ebrahim A. Alrashed, Mehmet H. Karaata, Ali Hamdan, Badour Albahar
      Mobile wireless sensor networks (MWSNs) are wireless networks of small sensors moving around a certain coverage area relaying information among themselves and conveying their readings and data to base stations. Imposters are malicious nodes actively engaging other legitimate nodes in the network to read or inject wrong data. MWSN are susceptible to imposter attack and therefore, the protection of MWSN from imposter nodes placed by an adversary to contaminate the sensed data is essential for the reliability of its operation. Imposters detection algorithms need to be distributed in nature and therefore they are susceptible to variety of faults that can perturb the variables for algorithm and cause a major malfunction in the operation of the algorithm and subsequently the entire network if proper recovery mechanisms are not employed. The distributed nature of imposter detection schemes for WSN and the physical environment where the sensors are deployed require some approaches such as stabilization to deal with faults. A stabilizing distributed algorithm can withstand transient faults and start in an arbitrary initial configuration by eventually entering a legitimate system configuration regardless of the current system configuration. We view a fault as a transient fault if it affects the states of the system processes but not their program. In this paper, we propose an imposter detection scheme that can effectively deal with transient faults and arbitrary initialization. In addition, the proposed algorithm effectively adapts to the introduction and the removal of sensor nodes to/from the WSN which makes the proposed algorithm appropriate for practical sensor network applications. Other faults that can occur in the network and in the nodes are beyond the scope of this work.

      PubDate: 2017-07-24T04:41:55Z
      DOI: 10.1016/j.adhoc.2017.07.003
      Issue No: Vol. 65 (2017)
       
  • A review of broadcasting safety data in V2V: Weaknesses and requirements
    • Authors: Hanaa S. Basheer; Carole Bassil
      Pages: 13 - 25
      Abstract: Publication date: October 2017
      Source:Ad Hoc Networks, Volume 65
      Author(s): Hanaa S. Basheer, Carole Bassil
      One of the main goals in using vehicular ad hoc networks (VANETs) system is to provide the driver of a vehicle with services that helps him/her in avoiding chain accidents and traffic jam. Vehicles can get different services from global servers when connecting to the internet or can cooperate with each other, where each vehicle behaves as a collector for traffic information and a disseminator of necessary data to the neighbouring vehicles during their journey. However, disseminating safety data between connecting vehicles is a challenging task due to the quick change in the wireless network topology, and the broadcast protocol's reliance on many physical parameters (e.g. vehicle's speed, location, roads structures etc.). Thus, getting a reliable VANET system and ensuring the integrity of messages are the main objectives when introducing any dissemination method. This paper reviews several existing VANET safety applications, and revises the disseminating methods for safety messages between vehicles without infrastructure to cover a wide area in a quick reliable way. Wherefore we include relevant works that present different methods to broadcast the warning message between vehicles, particularly when no infrastructure is available. Towards the conclusion, we show a classification tabular for these works, and a comprehensive feedback to reach the optimal perception of the broadcast scheme during safety data dissemination that depends on three objects; the environment, the vehicle as a sender, and the vehicle as a receiver.

      PubDate: 2017-08-03T11:34:09Z
      DOI: 10.1016/j.adhoc.2017.07.004
      Issue No: Vol. 65 (2017)
       
  • Quantized feedback scheduling for MIMO-OFDM broadcast networks with
           subcarrier clustering
    • Authors: Prabina Pattanayak; Preetam Kumar
      Pages: 26 - 37
      Abstract: Publication date: October 2017
      Source:Ad Hoc Networks, Volume 65
      Author(s): Prabina Pattanayak, Preetam Kumar
      Feedback of user channel quality information (CQI) to base station (BS) is essential for efficient scheduling of multi-user (MU) multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) broadcast networks. This feedback overload increases linearly with the cardinality of users, transmit antennas and subcarriers present in MIMO-OFDM systems. Hence, clustering of adjacent subcarriers has been considered in literature for reduction in feedback load. Here users communicate the CQI of the center subcarrier of the clusters assuming that subcarriers of a cluster experience similar channel conditions. However, this method leads to inefficient resource scheduling for higher cluster sizes as it does not take advantage of CQI of other subcarriers that experience non-uniform channel conditions. This reason motivated us to develop a new limited feedback scheduling scheme where quantization of CQI with multiple bits is implemented along with clustering of adjacent subcarriers. In this scheme, the multi-bit quantized CQI of all the subcarriers of a cluster are examined for the efficient scheduling along with further reduction in the feedback overhead. Moreover, we proposed a less time consuming method to find the optimum quantization thresholds that play significant role in multi-bit quantization process by using genetic algorithm (GA). This GA methodology is computationally more efficient than exhaustive search process.

      PubDate: 2017-08-03T11:34:09Z
      DOI: 10.1016/j.adhoc.2017.07.007
      Issue No: Vol. 65 (2017)
       
  • Spectrum access in cognitive smart-grid communication system with
           prioritized traffic
    • Authors: Ram Narayan Yadav; Rajiv Misra; Sourabh Bhagat
      Pages: 38 - 54
      Abstract: Publication date: October 2017
      Source:Ad Hoc Networks, Volume 65
      Author(s): Ram Narayan Yadav, Rajiv Misra, Sourabh Bhagat
      Smart grid (SG) comprises heterogeneous characteristics of traffic such as control commands (safety, sensing, smart-meter readings) among power generation, transmission and end users. An effective and reliable two-way communication infrastructure between users and utility providers is important for improving the performance of smart grid. To support such traffic types in the smart grid, we have studied cognitive radio communication infrastructure-based smart grid. In this paper, we proposed a prioritized spectrum access scheme for cognitive smart grid communication systems to address the quality of service (QoS) requirements of heterogeneous traffic. SG traffic is categorized into two priority classes (high and low based on service requirements). We model the proposed spectrum access scheme (by considering the spectrum sensing error) using a multidimensional Markov chain. We have measured the performance based on the blocking probability, the dropping probability, the interference probability and the call completion rate for both the traffic types (high and the low class smart grid traffic). By Considering an environment where the traffic is heavy tailed, we have modeled the arrivals to follow a Pareto distribution, as the Poisson process model may under estimate the traffic especially when traffic is heavy tailed. The results illustrate that the proposed priority based scheme is able to significantly improve the QoS of high-priority traffic. It is also observed that the prioritized system is preferable over the non-prioritized system where all traffic types are treated the same in terms of SG data delivery.

      PubDate: 2017-08-03T11:34:09Z
      DOI: 10.1016/j.adhoc.2017.07.005
      Issue No: Vol. 65 (2017)
       
  • Performance of RF self-interference cancellation disturbed by fast-moving
           object in full-duplex wireless
    • Authors: Fei Wu; Chuan Huang; Youxi Tang
      Pages: 55 - 64
      Abstract: Publication date: October 2017
      Source:Ad Hoc Networks, Volume 65
      Author(s): Fei Wu, Chuan Huang, Youxi Tang
      In this paper, the performance of radio frequency (RF) self-interference (SI) cancellation in presence of flying/moving object is analyzed to achieve an uninterrupted FD transmission and reception. The SI leaked typically consists of two parts: slow time-varying SI and burst SI part. For simplification, slow time-varying SI part can be effectively suppressed. In addition, burst SI part can be modeled as a single path SI signal. To detect and estimate the burst SI part, superimposing training sequence is introduced in the transmit signals. Correspondingly, one special RF tap is adopted to suppress the burst SI part. Based on this scheme, the expression of instantaneous and average outage probability is derived and this can be solved by numerical method. It is found that the FD outage probability is significantly influenced by the flying/moving object velocity, by Doppler frequency, by the distance between the flying/moving object and the transceiver antenna, and the transmitter signal-to-training ratio.

      PubDate: 2017-08-03T11:34:09Z
      DOI: 10.1016/j.adhoc.2017.07.009
      Issue No: Vol. 65 (2017)
       
  • A secure data collection scheme based on compressive sensing in wireless
           sensor networks
    • Authors: Ping Zhang; Shaokai Wang; Kehua Guo; Jianxin Wang
      Abstract: Publication date: Available online 22 November 2017
      Source:Ad Hoc Networks
      Author(s): Ping Zhang, Shaokai Wang, Kehua Guo, Jianxin Wang
      The compressive sensing (CS) based data collection schemes can effectively reduce the transmission cost of wireless sensor networks (WSNs) by exploring the sparsity of compressible signals. Although many recent works explained CS as a symmetric cryptosystem, CS-based data collection schemes still face security threats, due to the complex deployment environment of WSNs. In this paper, we first propose two feasible attack models for specific applications. Then, we present a secure data collection scheme based on compressive sensing (SeDC), which enhances the data privacy by the asymmetric semi-homomorphic encryption scheme, and reduces the computation cost by sparse compressive matrix. More specifically, the asymmetric mechanism reduces the difficulty of secret key distribution and management. The homomorphic encryption allows the in-network aggregation in cipher domain, and thus enhances the security and achieves the network load balance. The sparse measurement matrix reduces both the computation cost and communication cost, which compensates the increasing cost caused by the homomorphic encryption. We also introduce a joint recovery model to improve the recovery accuracy. Experimental evaluation based on real data shows that the proposed scheme achieves a better performance compared with the most related works.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.011
       
  • Generalized analytical expressions for end-to-end throughput of IEEE
           802.11 string-topology multi-hop networks
    • Authors: Kosuke Sanada; Nobuyoshi Komuro; Zhetao Li; Tingrui Pei; Young-June Choi; Hiroo Sekiya
      Abstract: Publication date: Available online 16 November 2017
      Source:Ad Hoc Networks
      Author(s): Kosuke Sanada, Nobuyoshi Komuro, Zhetao Li, Tingrui Pei, Young-June Choi, Hiroo Sekiya
      It is an effective approach for comprehending network performance is to develop a mathematical model because complex relationship between system parameters and performance can be obtained explicitly. This paper presents generalized analytical expressions for end-to-end throughput of IEEE 802.11 string-topology multi-hop networks. For obtaining expressions, a relationship between the durations of the backoff-timer (BT) decrements and frame transmission is expressed by integrating modified Bianchi’s Markov-chain model and airtime expression. Additionally, the buffer queueing of each node is expressed by applying the queueing theory. The analytical expressions obtained in this paper provide end-to-end throughput for any hop number, any frame length, and any offered load, including most of analytical expressions presented in previous papers. The analytical results agree with simulation results quantitatively, which shows the verifications of the analytical expressions.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.009
       
  • Experimental Evaluation of Improved IoT Middleware for Flexible
           Performance and Efficient Connectivity
    • Authors: Soobin Jeon; Inbum Jung
      Abstract: Publication date: Available online 16 November 2017
      Source:Ad Hoc Networks
      Author(s): Soobin Jeon, Inbum Jung
      We previously proposed an Internet of Things (IoT) middleware called Middleware for Cooperative Interaction of Things (MinT). MinT supports thread pooling to quickly process requests from other IoT devices. However, using a thread pool with a fixed number of threads equal to the number of CPU cores can waste memory and CPU resources, and degrade the performance of the IoT device. In this paper, we propose an enhanced approach called Improved MinT (MinT-I) to efficiently improve the performance of MinT middleware by real-time adjustment of threads. We aim to improve the performance of the connection part, which is responsible for analyzing, processing, and retransmitting the received packets. The experimental results showed that MinT-I increased the average throughput by approximately 25% to 35% compared to the existing middleware. Moreover, the proposed MinT-I not only can optimize the memory and resource usage, but it can also reduce the latency and power consumption of IoT devices.

      PubDate: 2017-11-24T19:12:44Z
      DOI: 10.1016/j.adhoc.2017.11.005
       
  • ReSF: Recurrent Low-Latency Scheduling in IEEE 802.15.4e TSCH Networks
    • Authors: Glenn Daneels; Bart Spinnewyn; Steven Latré; Jeroen Famaey
      Abstract: Publication date: Available online 9 November 2017
      Source:Ad Hoc Networks
      Author(s): Glenn Daneels, Bart Spinnewyn, Steven Latré, Jeroen Famaey
      The recent increase of connected devices has triggered countless Internet-of-Things applications to emerge. By using the Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e MAC layer, wireless multi-hop networks enable highly reliable and low-power communication, supporting mission-critical and industrial applications. TSCH uses channel hopping to avoid both external interference and multi-path fading, and a synchronization-based schedule which allows precise bandwidth allocation. Efficient schedule management is crucial when minimizing the delay of a packet to reach its destination. In networks with recurrent sensor data transmissions that repeat after a certain period, current scheduling functions are prone to high latencies by ignoring this recurrent behavior. In this article, we propose a TSCH scheduling function that tackles this minimal-latency recurrent traffic problem. Concretely, this work presents two novel contributions. First, the recurrent traffic problem is defined formally as an Integer Linear Program. Second, we propose the Recurrent Low-Latency Scheduling Function (ReSF) that reserves minimal-latency paths from source to sink and only activates these paths when recurrent traffic is expected. Extensive experimental results show that using ReSF leads to a latency improvement up to 80% compared to state-of-the-art low-latency scheduling functions, with a negligible impact on power consumption of at most 6%.

      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/j.adhoc.2017.11.002
       
  • Multi-Functional Secure Data Aggregation Schemes for WSNs
    • Authors: Ping Zhang; Jianxin Wang; Kehua Guo; Fan Wu; Geyong Min
      Abstract: Publication date: Available online 8 November 2017
      Source:Ad Hoc Networks
      Author(s): Ping Zhang, Jianxin Wang, Kehua Guo, Fan Wu, Geyong Min
      Secure data aggregation schemes are widely adopted in wireless sensor networks, not only to minimize the energy and bandwidth consumption, but also to enhance the security. Statistics obtained from data aggregation schemes often fall into three categories, i.e., distributive, algebraic, and holistic. In practice, a wide range of reasonable aggregation queries are combinations of several different statistics. Providing multi-functional aggregation support is also a primary demand for data preprocessing in data mining. However, most existing secure aggregation schemes only focus on a single type of statistics. Some statistics, especially holistic ones (e.g., median), are often difficult to compute efficiently in a distributed mode even without considering the security issue. In this paper, we first propose a new Multi-functiOnal secure Data Aggregation scheme (MODA), which encodes raw data into well-defined vectors to provide value-preservation, order-preservation and context-preservation, and thus offering the building blocks for multi-functional aggregation. A homomorphic encryption scheme is adopted to enable in-ciphertext aggregation and end-to-end security. Then, two enhanced and complementary schemes are proposed based on MODA, namely, RandOm selected encryption based Data Aggregation (RODA) and COmpression based Data Aggregation (CODA). RODA can significantly reduce the communication cost at the expense of slightly lower but acceptable security on a leaf node, while CODA can dramatically reduce communication cost with the lower aggregation accuracy. The performance results obtained from theoretic analysis and experimental evaluation of three real datasets under different scenarios, demonstrate that our schemes can achieve the performance superior to the most closely related work.

      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/j.adhoc.2017.11.004
       
  • Security Threats and Countermeasures of MAC Layer in Cognitive Radio
           Networks
    • Authors: Mohsen Riahi Manesh; Naima Kaabouch
      Abstract: Publication date: Available online 8 November 2017
      Source:Ad Hoc Networks
      Author(s): Mohsen Riahi Manesh, Naima Kaabouch
      Cognitive radio is a promising technology proposed to solve the scarcity of the radio spectrum by opportunistically allocating the idle portion of the licensed users to unlicensed ones. The effectiveness of the cognitive radio is highly dependent on the fair and efficient management of the access to the unused portion of the frequency channels, which is performed by media access control (MAC) layer. Therefore, any malicious activities disrupting the operation of the MAC layer result in significant performance degradation of the cognitive radio networks. It is necessary to understand the different functionalities of the cognitive radio MAC (CR MAC) layer and to explore the possible attacks cognitive radio networks might encounter. The aim of this work is to investigate different attacks applicable to the MAC layer of cognitive radio and provide an overview of them based on CR MAC functionalities. In addition, the paper describes and compares recent defense strategies related to each attack.

      PubDate: 2017-11-11T12:35:06Z
      DOI: 10.1016/j.adhoc.2017.11.003
       
  • Multi-subpopulation evolutionary algorithms for coverage deployment of
           UAV-networks
    • Authors: D.G. Reina; H. Tawfik; S.L. Toral
      Abstract: Publication date: Available online 5 October 2017
      Source:Ad Hoc Networks
      Author(s): D.G. Reina, H. Tawfik, S.L. Toral
      The deployment of an unmanned aerial network (UAV-network) for the optimal coverage of ground nodes is an NP-hard problem. This work focuses on the application of a multi-layout multi-subpopulation genetic algorithm (MLMPGA) to solve multi-objective coverage problems of UAV-networks. The multi-objective deployment is based on a weighted fitness function that takes into account coverage, fault-tolerance, and redundancy as relevant factors to optimally place the UAVs. The proposed approach takes advantage of different subpopulations evolving with different layouts. This feature is aimed at reflecting the evolutionary concept of different species adapting to the search space conditions of the multi-objective coverage problem better than single-population genetic algorithms. The proposed multi-subpopulation genetic algorithm is evaluated and compared against single-population genetic algorithm configurations and other well-known meta-heuristic optimization algorithms, such as particle swarm optimization and hill climbing algorithm, under different numbers of ground nodes. The proposed MLMPGA achieves significantly better performance results than the other meta-heuristic algorithms, such as classical genetic algorithms, hill climbing algorithm, and particle swarm optimization, in the vast majority of our simulation scenarios.

      PubDate: 2017-11-05T13:01:05Z
      DOI: 10.1016/j.adhoc.2017.09.005
       
  • Recovery from Simultaneous Failures in a Large Scale Wireless Sensor
           Network
    • Authors: Samira Chouikhi; Inès El Korbi; Yacine Ghamri-Doudane; Leila Azouz Saidane
      Abstract: Publication date: Available online 14 October 2017
      Source:Ad Hoc Networks
      Author(s): Samira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leila Azouz Saidane
      The Wireless sensor networks (WSNs) become more and more recognized these recent years and their applications spread in several domains. In general, these applications require that the network presents a minimum degree of reliability, effectiveness and robustness. However, the specificity of the nodes used in this type of networks makes them prone to failures. Indeed, the multichannel communications are generally privileged in the interference context which is very frequent in several WSNs’ applications due to the density of sensors and the harsh environment in which they are deployed. Moreover, in real applications, the occurrence of some faults (for example fire) may alter an entire zone of the network especially in the case of large scale deployment. Therefore, in this paper, we propose a network fault recovery approach from simultaneous failures in a large scale multichannel WSN. To make our solution as realistic as possible, we consider the case of the precision agriculture application and propose a detailed deployment of the WSN for that application. The choice of precision agriculture application is motivated by the fact that this application require large scale WSN (thousands and thousands of sensors) to supervise such a large area. Based on such precision agriculture scenario, we propose our fault recovery approach, called Simultaneous Failure Recovery based on Relay Node Relocation (SFR-RNR), that aims to restore the connectivity and partially the coverage in the network. The performance of the proposed approach is evaluated by simulation.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.10.008
       
  • Distributed Sensor Deployment Using Potential Fields
    • Authors: Y. Sinan Hanay; Veysel Gazi
      Abstract: Publication date: Available online 13 October 2017
      Source:Ad Hoc Networks
      Author(s): Y. Sinan Hanay, Veysel Gazi
      Maximization of sensing coverage has been an important problem in mobile sensor networks. In this work, we present two novel algorithms for maximizing sensing coverage in 2D and 3D spaces. We evaluate our methods by comparing with two previously proposed methods. All the four methods are based on potential fields. The previous work used the same potential function, however the algorithms we propose use two different potential functions in this work. Potential fields require low complexity, which is crucial for resource lacking mobile sensor nodes. Though potential fields are widely used for path planning in robotics, only a few works use potential fields for coverage maximization in mobile sensor networks. Through simulations, we compare our proposal with the previous algorithms, and show that the algorithm we propose here outperforms previous algorithms.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.09.006
       
  • On the Packet Delivery Delay Study for Three-Dimensional Mobile Ad Hoc
           Networks
    • Authors: Wu Wang; Bin Yang; Osamu Takahashi; Xiaohong Jiang; Shikai Shen
      Abstract: Publication date: Available online 12 October 2017
      Source:Ad Hoc Networks
      Author(s): Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen
      This paper studies the packet delivery delay performance in three-dimensional mobile ad hoc networks (3D MANETs). Available work mainly focuses on the performance study in two-dimensional MANETs (2D MANETs), which cannot support delay-intensive applications in 3D MANETs. To explore the packet delivery delay performance in 3D MANETs, this paper adopts two-hop relay algorithm with packet replication for packet routing. With such an algorithm, source node can transmit a packet to at most f distinct relay nodes, which then help to forward the packet to its destination node. The algorithm is flexible such that the packet delivery process can be controlled through a proper setting of f. Specially, a general Markov chain theoretical framework is developed to model the packet delivery process under the algorithm in 3D MANETs. Based on the theoretical framework, the closed-form expressions are further derived for mean and relative standard deviation of packet delivery delay. Finally, extensive simulation and numerical results are provided to validate our theoretical models and illustrate the impact of network parameters on packet delivery delay performance in 3D MANETs.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.10.004
       
  • Chain-Branch-Leaf: a Clustering Scheme for Vehicular Networks Using Only
           V2V Communications
    • Authors: Lucas Rivoirard; Martine Wahl; Patrick Sondi; Marion Berbineau; Dominique Gruyer
      Abstract: Publication date: Available online 10 October 2017
      Source:Ad Hoc Networks
      Author(s): Lucas Rivoirard, Martine Wahl, Patrick Sondi, Marion Berbineau, Dominique Gruyer
      The development of vehicular networks leads to a plethora of new applications that are already becoming essential to the drivers and to cooperative vehicles. One important condition to the continuity of these new services is the existence of an ubiquitous network access, which cannot be completely guaranteed. In this context, developing reliable ad hoc vehicle-to-vehicle communications is a good alternative that also becomes mandatory. This work proposes a clustering scheme that combines the information on road configuration, vehicle mobility and link quality in order to build a structure similar to a vehicular network infrastructure, while relying only on the vehicles. This clustering scheme can be integrated into any reactive, proactive, or geographic ad hoc routing protocol in order to optimize the flooding of messages and simplify routing operations. The evaluations realized through simulation show that the proposed clustering scheme allows creating and maintaining a stable backbone during a significant time. Moreover, the simulation results show that the proposed clustering scheme reduces significantly the impact of broadcast traffic flooding in comparison with well-established techniques such as multipoint relaying, to mention few.

      PubDate: 2017-10-14T12:25:04Z
      DOI: 10.1016/j.adhoc.2017.10.007
       
  • No-Collision Grid Based broadcast scheme and Ant Colony System with Victim
           Lifetime Window for navigating robot in first aid applications
    • Authors: Sarah Allali; Mahfoud Fares Ouzzani Hamid Menouar
      Abstract: Publication date: Available online 6 October 2017
      Source:Ad Hoc Networks
      Author(s): Sarah Allali, Mahfoud Benchaïba, Fares Ouzzani, Hamid Menouar
      The system that we propose in this paper aims to help robots to rescue immobilized victims by providing first aid (e.g.: oxygen masks). Such first aid can increase the chances of saved lives, by maintaining the status of victims until the arrive of rescue team for the take over. The proposed system takes advantage from a grid-based architecture for sites monitoring that has been presented in a previous work. It is composed of a mobile robot and a wireless sensor network (WSN). The robot has the mission of rescuing victims, and the WSN has three main missions: (1) detecting the existence of victims or any anomaly in the area, (2) disseminating reliably information and alerts and finally (3) providing the robot with efficient route guidance. To disseminate information with low cost (i.e avoids collisions caused mainly by the hidden node problem), we propose a distributed algorithm that insures the no collisions in the broadcast scheme using a grid, we called it No-Collision Grid Based (NCCB). Using NCGB allows to create all possible paths from any cell to the victim. This helps in guiding the robot through the safest and shortest route in a distributed manner. In order to increase the number of rescued victims, we used Ant Colony System with Victim Lifetime Window (ACS-VLM) to schedule the sequence of victims to rescue. The proposed solution has been validated through intensive simulations which show an important improvement in terms of overall network overhead, success ratio and the number of rescued victims.

      PubDate: 2017-10-08T08:33:11Z
       
  • A Secure and Efficient Group Key Agreement Approach for Mobile Ad Hoc
           Networks
    • Authors: Orhan Ermiş; Şerif Bahtiyar; Emin Anarım; M. Ufuk Çağlayan
      Abstract: Publication date: Available online 3 October 2017
      Source:Ad Hoc Networks
      Author(s): Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, M. Ufuk Çağlayan
      Mobile ad hoc networks have been used in many application areas such as sensors, file sharing and vehicle-to-vehicle communications. Providing secure communications among the users in such networks is a significant issue. Group key agreement protocols are frequently used to provide security in mobile ad hoc networks. There is a number of problems related to the use of group key agreement protocols in mobile ad hoc networks, such as adaptation in cluster-based communications, securely selecting the cluster head for inter-cluster communications, providing secure group key update mechanism for dynamic groups and reducing costs of communications and computations. In this study, we propose a secure and efficient group key agreement protocol that is adaptive for cluster-based communications in mobile ad hoc networks. We describe a novel secure cluster-head selection mechanism in the proposed protocol. The protocol provides security for dynamic group operations in addition to the basic security properties. The proposed protocol also provides better performance in terms of reducing the communications and computational costs. Finally, we present a set of simulations for the proposed protocol in mobile ad hoc networks scenario.

      PubDate: 2017-10-08T08:33:11Z
      DOI: 10.1016/j.adhoc.2017.10.003
       
  • Design and Performance Analysis of a Full-Duplex MAC Protocol for Wireless
           Local Area Networks
    • Authors: Deniz Marlali; Ozgur Gurbuz
      Abstract: Publication date: Available online 2 October 2017
      Source:Ad Hoc Networks
      Author(s): Deniz Marlali, Ozgur Gurbuz
      In this paper, Synchronized Contention Window Full Duplex (S-CW FD) protocol is presented as a medium access control (MAC) protocol that enables full duplex (FD) in wireless local area networks (WLANs), while seamlessly operating together with legacy nodes. For performance analysis, a Markov chain model of S-CW FD is devised, using this model, the saturated throughput of S-CW FD is derived and the results are validated by comparisons with OPNET simulations. Later, through detailed simulations, S-CW FD is evaluated against standard half-duplex IEEE 802.11, considering realistic self-interference and channel models and the effect of hidden nodes. It is shown that S-CW FD MAC protocol can double the throughput of standard half duplex IEEE 802.11 without hidden nodes in the network, and its improvement can get as high as ten fold in the presence of hidden nodes. In this work, S-CW FD is also compared to two similar contention based FD MAC protocols from the literature, and it is shown that, under typical network loads, S-CW FD outperforms those protocols by up to 30%, despite much lower complexity. Overall, S-CW FD stands out as a promising candidate for implementing FD in WLANs due to significant performance improvements, simplicity and flexibility for application in different FD modes to support bidirectional, relaying and cellular scenarios.

      PubDate: 2017-10-08T08:33:11Z
      DOI: 10.1016/j.adhoc.2017.10.001
       
  • The CUSCUS simulator for Distributed Networked Control Systems:
           Architecture and Use-cases
    • Authors: Nicola Roberto Zema; Angelo Trotta; Enrico Natalizio; Marco Di Felice; Luciano Bononi
      Abstract: Publication date: Available online 28 September 2017
      Source:Ad Hoc Networks
      Author(s): Nicola Roberto Zema, Angelo Trotta, Enrico Natalizio, Marco Di Felice, Luciano Bononi
      The current merging of networking and control research fields within the scope of robotic applications is creating fascinating research and development opportunities. However, the tools for a proper and easy management of experiments still lag behind. Although different solutions have been proposed to simulate and emulate control systems and, more specifically, fleets of Unmanned Aerial Vehicles (UAVs), still they do not include an efficient and detailed network-side simulation, which is usually available only on dedicated software. On the other hand, current advancements in network simulations suites often do not include the possibility to include an accurate description of controlled systems. In the middle 2010s, integrated solutions of networking and control for fleets of UAVs are still lacking. In this paper, we fill such gap by presenting a simulation architecture for networked control systems which is based on two well-known solutions in both the fields of networking simulation (the NS-3 tool) and UAV control simulation (the FL-AIR tool). Three main research contributions are provided: (i) first, we show how the existing tools can be integrated on a closed-loop architecture, so that the network propagation model (NS-3 side) is influenced by the drone mobility and by the 3D scenario map (FL-AIR side); (ii) second, we implement a novel module, which allows modeling realistic 3D environments by importing city-wide characteristics by the popular OpenStreetMap service; (iii) third, we demonstrate the modeling capabilities of the CUSCUS framework on two realistic use-cases, corresponding to well-known application scenarios of UAVs, i.e. dynamic formation control and static coverage of a target area.

      PubDate: 2017-09-30T06:38:43Z
      DOI: 10.1016/j.adhoc.2017.09.004
       
  • Interest-aware energy collection & resource management in machine
           to machine communications
    • Authors: Eirini Eleni Tsiropoulou; Giorgos Mitsis; Symeon Papavassiliou
      Abstract: Publication date: Available online 23 September 2017
      Source:Ad Hoc Networks
      Author(s): Eirini Eleni Tsiropoulou, Giorgos Mitsis, Symeon Papavassiliou
      The emerging paradigm of Machine to Machine (M2M)-driven Internet of Things (IoT), where physical objects are not disconnected from the virtual world but aim at collectively provide contextual services, calls for enhanced and more energy-efficient resource management approaches. In this paper, the problem is addressed through a joint interest, physical and energy-aware clustering and resource management framework, capitalizing on the wireless powered communication (WPC) technique. Within the proposed framework the numerous M2M devices initially form different clusters based on the low complexity Chinese Restaurant Process (CRP), properly adapted to account for interest, physical and energy related factors. Following that, a cluster-head is selected among the members of each cluster. The proposed approach enables the devices of a cluster with the support of the cluster-head to harvest and store energy in a stable manner through Radio Frequency (RF) signals adopting the WPC paradigm, thus prolonging the operation of the overall M2M network. Each M2M device is associated with a generic utility function, which appropriately represents its degree of satisfaction in relation to the consumed transmission power. Based on the distributed nature of the M2M network, a maximization problem of each device's utility function is formulated as a non-cooperative game and its unique Nash equilibrium point is determined, in terms of devices’ optimal transmission powers. Considering the devices’ equilibrium transmission powers, the optimal charging transmission powers of the cluster-heads are derived. The performance of the proposed approach is evaluated via modeling and simulation and under various topologies and scenarios, and its operational efficiency and effectiveness is demonstrated.

      PubDate: 2017-09-30T06:38:43Z
      DOI: 10.1016/j.adhoc.2017.09.003
       
  • Drone networks: Communications, coordination, and sensing
    • Authors: Evşen Yanmaz; Saeed Yahyanejad; Bernhard Rinner; Hermann Hellwagner; Christian Bettstetter
      Abstract: Publication date: Available online 23 September 2017
      Source:Ad Hoc Networks
      Author(s): Evşen Yanmaz, Saeed Yahyanejad, Bernhard Rinner, Hermann Hellwagner, Christian Bettstetter
      Small drones are being utilized in monitoring, transport, safety and disaster management, and other domains. Envisioning that drones form autonomous networks incorporated into the air traffic, we describe a high-level architecture for the design of a collaborative aerial system consisting of drones with on-board sensors and embedded processing, coordination, and networking capabilities. We implement a multi-drone system consisting of quadcopters and demonstrate its potential in disaster assistance, search and rescue, and aerial monitoring. Furthermore, we illustrate design challenges and present potential solutions based on the lessons learned so far.

      PubDate: 2017-09-30T06:38:43Z
      DOI: 10.1016/j.adhoc.2017.09.001
       
  • Geographic Routing and Hole Bypass using Long Range Sinks for Wireless
           Sensor Networks
    • Authors: Moysés M. Lima; Horácio A.B.F. Oliveira; Daniel L. Guidoni; Antonio A.F. Loureiro
      Abstract: Publication date: Available online 6 September 2017
      Source:Ad Hoc Networks
      Author(s): Moysés M. Lima, Horácio A.B.F. Oliveira, Daniel L. Guidoni, Antonio A.F. Loureiro
      Greedy Forward is a well-known technique used by most of the geographic routing algorithms to forward packets to the node that is geographically closer to the destination node. It is the simplest form of the proposed geographic routing algorithms and it is particularly attractive in sensor networks by bringing additional advantages such scalability, dynamism, and high delivery rates. However, in the presence of a hole (or voids), greedy forward techniques tend to fail. Thus, a hole bypass solution needs to be used in order to route packets to a node where greedy forwarding process can be resumed. In this work, we propose a new geographic routing algorithm called REACT that can bypass routing holes and create routing paths toward the sink node. Our solution takes advantage of the higher communication range of the sink node and the Received Signal Strength Indicator (RSSI) to enable the construction of routing paths by self-electing the next hop at each step while also performing data aggregation. No extra packets are required to configure the routing task. Our results clearly show an efficient data delivery achieved by the proposed algorithm in scenarios with routing holes with all the benefits of a greedy forwarding technique.

      PubDate: 2017-09-11T12:49:24Z
      DOI: 10.1016/j.adhoc.2017.08.010
       
  • Approximate Cardinality Estimation (ACE) in Large-Scale Internet of Things
           Deployments
    • Authors: Qing Cao; Yunhe Feng; Zheng Lu; Hairong Qi; Leon Tolbert; Lipeng Wan; Zhibo Wang; Wenjun Zhou
      Abstract: Publication date: Available online 26 August 2017
      Source:Ad Hoc Networks
      Author(s): Qing Cao, Yunhe Feng, Zheng Lu, Hairong Qi, Leon Tolbert, Lipeng Wan, Zhibo Wang, Wenjun Zhou
      IoT (Internet of Things) deployments have been used in many diverse applications in increasingly large numbers, usually composed of embedded sensors, computational units, and actuators. One central problem with IoT applications is that we frequently need to query the number of nodes according to certain requirements, or filters. For example, a user may want to query the number of nodes that are currently actively sensing data, or having data above a threshold. Conventional methods typically require each active node to report their status, leading to a total communication overhead that is at least proportional to the network size. In this paper, we study the problem of deployment size estimation by investigating probabilistic methods for processing queries, where we only try to obtain approximate estimates within desired confidence intervals. Our methods are different with other probabilistic methods, such as sampling, in that our approach is based on the well-known birthday paradox in statistics. Hence, our methods provide a different solution that can be combined or used to enhance existing methods. We demonstrate through extensive simulations that their overhead is considerably lower than conventional methods, usually by an order of magnitude.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.009
       
  • Convergecast in Wireless Body Area Networks
    • Authors: Wafa Badreddine; Nesrine Khernane; Maria Potop-Butucaru; Claude Chaudet
      Abstract: Publication date: Available online 24 August 2017
      Source:Ad Hoc Networks
      Author(s): Wafa Badreddine, Nesrine Khernane, Maria Potop-Butucaru, Claude Chaudet
      Wireless Body Area Networks (WBAN) is a recent challenging area in the health monitoring domain. There are several concerns in this area ranging from energy efficient communication to designing delays efficient protocols that support nodes dynamicity induced by human body mobility. This paper focuses on the convergecast or data gathering protocols in WBAN. Our contribution is twofold. First, we extensively analyze the impact of postural body mobility on various classes of multi-hop convergecast strategies. Our study does not limit itself to the existing state-of-the-art in WBAN, we adapted to WBAN settings strategies from the areas of Delay Tolerant Networks (DTN) and Wireless Sensor Networks (WSN). We evaluate these strategies in terms of resilience to the human mobility, end-to-end delay and energy consumption, via the OMNeT++ simulator that we enriched with a realistic channel model issued from the recent research on biomedical and health informatics. Our simulations show that strategies that perform well in DTN and WSN cannot be just extrapolated to WBAN without a deeper investigation. That is, existing convergecast strategies for DTN or WSN do not perform well with postural body movements because of the topological partitioning provoked by important link attenuations due to signal obstructions either by clothes or by the body itself. Secondly, our extensive simulations give us valuable insights and directions for designing a novel convergecast strategy for WBAN called Hybrid that presents a good compromise in terms of resiliency to mobility, end-to-end delay and energy consumption.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.008
       
  • On State Maintenance in Cluster-Based Mobile Ad-hoc Networks
    • Authors: Amit Banerjee; Chung-Ta King; Hung-Chang Hsiao
      Abstract: Publication date: Available online 24 August 2017
      Source:Ad Hoc Networks
      Author(s): Amit Banerjee, Chung-Ta King, Hung-Chang Hsiao
      Clustering is an effective strategy for tackling the dynamics and scalability in a large-scale mobile ad hoc networks (MANETs). However, the mobility of the nodes makes it very difficult to maintain the states of the clusters, such as connectivity between clusters, available bandwidth, and node membership. A good maintenance scheme should balance the workload and power consumption of the nodes, incur little overhead, and track the changes timely and accurately. For this, we consider the implementation of a maintenance sublayer to handle the dynamic state of the clusters. The idea is to hide the dynamics of the underlying clusters, to improve the performance of applications in MANET. In this paper, we examine the design space of the state maintenance problem in cluster-based MANETs. At one end, we study a fully distributed approach, called Cluster-Based WithOut Head Overlay (CWOHO). At the other end, we consider the strategy that uses cluster heads to handle the maintenance operations, called Cluster-Based With Head Overlay (CWHO). In-between two extremes, we investigate a third possibility, called Clusters with Neighbor Information (CNI). We provide an in-depth and comprehensive study of these strategies under various network conditions and mobility models. Our experimental evaluation shows that the data delivery ratio of CWOHO is at least 7% more than CWHO, under increasing node mobility and number of clusters. However, the reverse is true for the control overhead.

      PubDate: 2017-08-27T15:13:13Z
      DOI: 10.1016/j.adhoc.2017.08.007
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.82.81.154
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016