Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleOctober 2024
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method
AbstractIn a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the ...
An analysis of the three major protocols of AODV, DSDV, and OLSR in the VANET environment based on the proposed ECIE method is the major focus of this work. The work performed authentication and encrypting of vehicles and route data before forwarding it. ...
- research-articleMay 2024
Clustered DTN routing based on sensing node relationship strength
AbstractDelay tolerant networks (DTNs) is a network evolved from mobile networks. Differing from the traditional network, which has a stable end‐to‐end transmission path, DTNs are sparse and intermittently connected mobile ad hoc network, which are ...
A novel clustered delay tolerant networks (DTN) routing model based on sensing node relationship strength are proposed. The routing mechanism takes advantage of the number of other nodes encountered by the nodes in the process of movement and the changes ...
- research-articleApril 2024
Distributed MA‐IDDPG‐OLSR based stable routing protocol for unmanned aerial vehicle ad‐hoc network
AbstractIn unmanned aerial vehicle ad‐hoc network (UANET), the node speed of unmanned aerial vehicles (UAVs) may reach up to 400 km/h. The fast or slow movement of UAV nodes leads to different speeds of topology change of the nodes. Traditional ...
This article proposes a distributed MA‐IDDPG‐OLSR routing protocol that can adaptively adjust Hello and TC message sending cycles based on the speed of local topology changes in unmanned aerial vehicle ad hoc networks. This method can improve the QoS ...
- research-articleMarch 2024
An improved seeds scheme in K‐means clustering algorithm for the UAVs control system application
AbstractClustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the ...
K‐means clustering is a widely used method in intelligent systems. However, K‐means algorithm is susceptible to the local optimum due to the influence of the initial centroid. Herein, a simpler and more effective algorithm for seed initialization is ...
- research-articleFebruary 2024
Investigating delay of the media access control protocols for IoT‐RoF using quantum entanglement
AbstractOne of the significant challenges of the Radio over fibre (RoF) Medium Access Control (MAC) protocol is the propagation delay. This delay can lead to serious issues, such as higher propagation delay resulting in collisions and unnecessary ...
IoT‐RoF QE‐based: MAC Protocol Delay Study. image image
-
- research-articleJuly 2023
Anchored self‐similar 3D Gauss‐Markov mobility model for ad hoc routing scenarios
- George Amponis,
- Thomas Lagkas,
- Vasileios Argyriou,
- Ioannis Moscholios,
- Maria Zevgara,
- Savvas Ouzounidis,
- Panagiotis Sarigiannidis
AbstractGiven the observed developments of novel communication modes and the establishment of next‐generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling ...
Given the observed developments of novel communication modes and the establishment of next‐generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks (FANETs) are key pivots in enabling ...
- short-paperMay 2023
Poster Abstract: An IoT Mesh Network for a Smart Refrigeration Monitoring System
IoTDI '23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and ImplementationPages 472–473https://doi.org/10.1145/3576842.3589174A major challenge of the next decade is food scarcity and food waste. Smart automation refrigeration systems have emerged, but the devices, methods and outcomes vary significantly. In this work, a smart refrigerator IoT infrastructure is built to ...
- research-articleMarch 2023
Queries allocation in WSNs with fuzzy control system
AbstractProcessing queries in wireless sensor networks causes quality of service challenges such as data latency and validity. In fact, this paper is going to shed light on identifying the right trade‐off between latency and the freshness of the data. For ...
In this paper, an approach to solve the query allocation problem in a wireless sensor network is proposed. With each new request arriving at the network, a controller will assign the request processing for the wireless sensor network, cache server or base ...
- research-articleJanuary 2023
Cluster-based combined hybrid relay vehicle selection approach for improving performance and reliability in vehicular ad hoc networks
International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 29, Issue 5Pages 532–554https://doi.org/10.1504/ijcnds.2023.133173One of the main objectives of smart transport systems is to improve road safety. Ad hoc vehicle networks use vehicle accident alert systems that broadcast crashes to vehicles. Reliable and timely receipt of messages are two of the main intents for the ...
- research-articleJanuary 2023
Connectivity analysis of multihop wireless networks using route distribution model
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 24, Issue 3-4Pages 403–427https://doi.org/10.1504/ijaip.2023.129186Most of the management and routing protocols in multihop wireless networks rely on strict connectivity condition among nodes. In this paper, we construct mathematical framework to model connectivity of wireless ad hoc and wireless sensor networks. We use ...
- research-articleDecember 2022
Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory
Automatic Control and Computer Sciences (ACCS), Volume 56, Issue 8Pages 1016–1024https://doi.org/10.3103/S0146411622080168AbstractA model that can describe the functioning of large-scale systems with a dynamical and adaptive network topology is developed. Dynamical graph theory is chosen as the mathematical tools on which the model is based. Therefore, the functioning of the ...
- research-articleDecember 2022
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology
Automatic Control and Computer Sciences (ACCS), Volume 56, Issue 8Pages 906–915https://doi.org/10.3103/S0146411622080132AbstractThis work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network infrastructure. The proposed systematization provides a one-time view of the specifics of such systems in ...
- research-articleJune 2022
Enabling Self-Organizing TDMA Scheduling for Aerial Swarms
DroNet '22: Proceedings of the Eighth Workshop on Micro Aerial Vehicle Networks, Systems, and ApplicationsPages 13–18https://doi.org/10.1145/3539493.3539584With the proliferation of affordable VTOL drones, application domain of aerial swarms expands everyday, spanning from public drone art to offensive military operations. Orchestrating these systems towards a successful mission, especially in contested ...
- research-articleJanuary 2022
Optimal dense convolutional network model for image classification in unmanned aerial vehicles based ad hoc networks
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 39, Issue 1-2Pages 46–57https://doi.org/10.1504/ijahuc.2022.120944Unmanned aerial vehicles (UAVs) have the potential of generating an ad hoc communication network on the fly. Aerial image classification gains more importance in the remote sensing community and several studies have been carried out in recent days. This ...
- research-articleNovember 2021
Optimisation of the routing protocol for quantum wireless Ad Hoc network
AbstractThis study addresses the optimisation of on‐demand routing protocols for quantum wireless Ad Hoc network. The study improves the route discovery protocol by proposing a ‘reverse synchronisation method’, which means after the route request is ...
- research-articleNovember 2021
m-Stability: Threshold Security Meets Transferable Utility
CCSW '21: Proceedings of the 2021 on Cloud Computing Security WorkshopPages 73–82https://doi.org/10.1145/3474123.3486758Use of game theory and mechanism design in cloud security is a well-studied topic. When applicable, it has the advantages of being efficient and simple compared to cryptography alone. Most analyses consider two-party settings, or multi-party settings ...
- research-articleJanuary 2021
Secured spray and focus protocol design in intermittently connected mobile networks
International Journal of Information and Computer Security (IJICS), Volume 14, Issue 3-4Pages 344–353https://doi.org/10.1504/ijics.2021.114710Mobile ad hoc networks are the wireless networks in which there is no fixed route from source to destination because of dynamic topology. One of such networks is an intermittently connected mobile network. In this network, the conventional routing ...
- research-articleJanuary 2021
Managing the levels of CO2 in a tunnel using oppnet virtual machine
- Shorouq S. Almayouf,
- Atheer M. AlTamimi,
- Fatimah M. Kharrat,
- Hessah I. AlSaidan,
- Naba S. AlQahtani,
- Sarah I. Bin Nafisah,
- Mai A. Alduailij
International Journal of Innovative Computing and Applications (IJICA), Volume 12, Issue 2-3Pages 146–174https://doi.org/10.1504/ijica.2021.113754This work aims at managing the levels of CO2 inside King Abdulaziz Road Tunnel in Makkah, Saudi Arabia, by using heterogeneous systems and devices that can interact with each other autonomously through various communication media. This can be achieved by ...
- research-articleDecember 2020
VTE‐AKA: an optimum vector time encoding scheme for synchronising authenticated key agreements in cognitive radio ad hoc networks
IET Communications (CMU2), Volume 14, Issue 20Pages 3529–3540https://doi.org/10.1049/iet-com.2019.1010In a hostile wireless environment, a cognitive radio ad hoc network, a robust‐spectrum aware paradigm, is susceptible to spectrum sensing data falsification at the data link layer. In the state‐of‐the‐art literature, distributed cooperative spectrum ...
- research-articleNovember 2020
Defending pollution attacks in network coding enabled wireless ad hoc networks: a game‐theoretic framework
IET Communications (CMU2), Volume 14, Issue 19Pages 3324–3333https://doi.org/10.1049/iet-com.2019.1372Network coding is a promising technique to improve the throughput and robustness of wireless ad hoc networks. However, the packet‐mixing nature of network coding also renders it more prone to pollution attacks. Most existing schemes to combat pollution ...