期刊文献+
共找到379篇文章
< 1 2 19 >
每页显示 20 50 100
Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks(MANETS)
1
作者 Ahmed Alhussen Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第5期1903-1923,共21页
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Ne... Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities. 展开更多
关键词 mobile adhocnetworks(manet) urban traffic prediction artificial intelligence(AI) traffic congestion chaotic spatial fuzzy polynomial neural network(CSFPNN)
下载PDF
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
2
作者 W.Gracy Theresa A.Gayathri P.Rama 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1337-1351,共15页
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th... Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods. 展开更多
关键词 mobile ad-hoc network(manet) intrusion detection system secure energy routing(SER) elliptical curve cryptography(ECC) security
下载PDF
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
3
作者 LI Jingfeng ZHU Yuefei ZHANG Yajuan PAN Heng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1621-1624,共4页
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin... Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. 展开更多
关键词 manets mobile ad hoe networks) SIGNCRYPTION threshold eryptography mobile commerce
下载PDF
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
4
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 虫眼腐蚀 通信网络 网络安全 恢复方法
下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
5
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(manet).
下载PDF
移动自组网中基于Mobile Agent的分布式密钥管理
6
作者 张毅 王小非 +1 位作者 夏学知 徐海樵 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2007年第9期821-824,共4页
提出了移动自组网(MANET)中一种基于移动Agent的分布式密钥管理方法。该方法使用很少的Agent获得较多的全局信息,并快速交换密钥信息,可以解决分布式认证算法中网络负载大、服务时间长、申请证书成功率低等问题,减少了系统的开销,具有... 提出了移动自组网(MANET)中一种基于移动Agent的分布式密钥管理方法。该方法使用很少的Agent获得较多的全局信息,并快速交换密钥信息,可以解决分布式认证算法中网络负载大、服务时间长、申请证书成功率低等问题,减少了系统的开销,具有很高的效率和鲁棒性。 展开更多
关键词 分布式密钥 移动AGENT 移动自组网
下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
7
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model manet P2P networks P2P manet UNSTRUCTURED search algorithms Peer-to-Peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast PEER
下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
8
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 网络生存性 3D 移动AD 建模 manet 定量分析方法 半马尔可夫过程 不良行为
下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
9
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 manetmobile ad hoe networks) MULTILEVEL trust algorithm
下载PDF
Impact of Mobility on Delay-Throughput Performance in Multi-Service Mobile Ad-Hoc Networks
10
作者 Mohamed Amnai Youssef Fakhri Jaafar Abouchabaka 《International Journal of Communications, Network and System Sciences》 2011年第6期395-402,共8页
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure. Despite the importance of type of the exchanged data between the knots on the QoS of the MANETs, the mul-tiservice d... Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure. Despite the importance of type of the exchanged data between the knots on the QoS of the MANETs, the mul-tiservice data were not treated by the larger number of previous researches. In this paper we propose an adaptive method which gives the best performances in terms of delay and throughput. We have studied the impact, respectively, of mobility models and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio) of routing protocol (On-Demand Distance Vector) AODV by using in the first a multiservice VBR (MPEG-4) and secondly the Constant Bit Rate (CBR) traffic. Finally we com-pare the performance on both cases. Experimentally, we considered the three mobility models as follows Random Waypoint, Random Direction and Mobgen Steady-State. The experimental results illustrate that the behavior of AODV change according to the model and the used traffics. 展开更多
关键词 mobilITY Models AODV VBR CBR QoS manet
下载PDF
Empirical Modeling and Simulation of Temporal Based Adaptive Mobility Model for MANET
11
作者 Gurusamy Prema Chandrabose Aravindan +1 位作者 Kirthivasan Kannan Rathinam Maheswaran 《International Journal of Communications, Network and System Sciences》 2011年第4期232-240,共9页
Mobile Ad Hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. To conduct meaningful performance analysis of MANETs, it is essenti... Mobile Ad Hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. To conduct meaningful performance analysis of MANETs, it is essential that the simulation of mobility model should reflect the realistic mobility pattern of mobile nodes i.e. placement of mobile nodes at different intervals of time. The formation of spontaneous network depends heavily on the movement of different nodes in a particular practical scenario. This research focuses on the modeling and simulation of a temporal Adaptive Mobility Model which can be adapted to any dynamic practical scenario. The mobility in the realistic environment is simulated based on a Probability Transition Matrix named as Personal Behavior Model (PBM) and validated for a practical Health Care Environment. The formation of MANET is assumed to be based on the movement of the patient i.e. mobile nodes in the health care environment. Patients waiting in front of each service point for different time intervals are taken as results and compared with the actual data. 展开更多
关键词 manet mobilITY Model PROBABILITY TRANSITION MATRIX System Dynamics
下载PDF
QoS Aware Power and Hop Count Constraints Routing Protocol with Mobility Prediction for MANET Using SHORT
12
作者 Senthilkumar Maruthamuthu Somasundaram Sankaralingam 《International Journal of Communications, Network and System Sciences》 2011年第3期189-195,共7页
A mobile ad hoc network (MANET) is composed of mobile nodes, which do not have any fixed wired communication infrastructure. This paper proposes a protocol called “Delay, Jitter, Bandwidth, Cost, Power and Hop count ... A mobile ad hoc network (MANET) is composed of mobile nodes, which do not have any fixed wired communication infrastructure. This paper proposes a protocol called “Delay, Jitter, Bandwidth, Cost, Power and Hop count Constraints Routing Protocol with Mobility Prediction for Mobile Ad hoc Network using Self Healing and Optimizing Routing Technique (QPHMP-SHORT)”. It is a multiple constraints routing protocol with self healing technique for route discovery to select a best routing path among multiple paths between a source and a destination as to increase packet delivery ratio, reliability and efficiency of mobile communication. QPHMP-SHORT considers the cost incurred in channel acquisition and the incremental cost proportional to the size of the packet. It collects the residual battery power of each node for each path;selects multiple paths, which have nodes with good battery power for transmission to satisfy the power constraint. QPHMP-SHORT uses Self-Healing and Optimizing Routing Technique (SHORT) to select a shortest best path among multiple selected paths by applying hops count constraint. It also uses the mobility prediction formula to find the stability of a link between two nodes. 展开更多
关键词 QoS POWER CONSUMPTION HOP COUNT Routing mobility Prediction manet
下载PDF
Integrating Mobile Ad Hoc Network to the Internet
13
作者 王茂宁 《Journal of Electronic Science and Technology of China》 CAS 2005年第4期304-309,共6页
A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, emplo... A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the lnternet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%. 展开更多
关键词 mobile ad hoc network (manet optimized link state routing (OLSR) wireless networks mobile IPv6 hierarchical mobile 1Pv6
下载PDF
Performance Analysis of Adjusted Counter Based Broadcasting in Mobile Ad Hoc Networks
14
作者 Muneer Bani Yassein Balqees Abd Hameed +1 位作者 Wail Mardini Yaser Khamayseh 《Communications and Network》 2013年第4期353-359,共7页
Mobile Ad Hoc Network (MANET) is a reliable system formed by co-operating and independent nodes that connect and communicate with each other wirelessly without pre-existing infrastructure. In such a network, the easie... Mobile Ad Hoc Network (MANET) is a reliable system formed by co-operating and independent nodes that connect and communicate with each other wirelessly without pre-existing infrastructure. In such a network, the easiest way to broadcast the packets to all network nodes is flooding. However, flooding leads to serious drawbacks such as collision, contention and redundant retransmission. These drawbacks are known as the broadcast storm problem. This research proposes an adaptive algorithm in order to decrease the overall network overhead and minimize the problems associated to flooding. Moreover this research concentrates on studying the effect of using different mobility models that provide general idea about nodes movement, status and locations. In particular the performance of Random Waypoint and File mobility models in terms of their effect on network communication is evaluated. Moreover, this research provides performance evaluation of different traffic types such as Constant Bit Rate (CBR) and Traffic GEN. Results from Qualnet simulations have revealed that the new proposed algorithm outperforms flooding in terms of different metrics: reducing end-to-end delay in addition to minimizing the normalized routing load and maximizing the packets delivery ratio, in addition to concluding that Traffic GEN outperforms the CBR in terms of throughput. Moreover the CBR traffic has higher delay values than Traffic GEN. 展开更多
关键词 manetS mobilITY ROUTING Protocol mobilITY Models
下载PDF
Security: A Core Issue in Mobile <i>Ad hoc</i>Networks
15
作者 Asif Shabbir Fayyaz Khalid +2 位作者 Syed Muqsit Shaheed Jalil Abbas M. Zia-Ul-Haq 《Journal of Computer and Communications》 2015年第12期41-66,共26页
Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless l... Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless links for communication. Wireless networks are considered more exposed to security attacks as compared to wired networks, especially;MANETs are the soft target due to vulnerable in nature. Lack of infrastructure, open peer to peer connectivity, shared wireless medium, dynamic topology and scalability are the key characteristics of MANETs which make them ideal for security attacks. In this paper, we shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis of network attacks. Finally, we shall propose solutions to meet the security challenges, according to our framed security criteria. 展开更多
关键词 mobile Devices Optimal Choice manet SECURITY WIRELESS NETWORK Taxonomy Intrusion Detection NETWORK SECURITY Threats Layer Wise NETWORK Vulnerabilities of WIRELESS SECURITY Criteria
下载PDF
An effective connected dominating set based mobility management algorithm in MANETs
16
作者 Xin-yu WANG Xiao-hu YANG Jian-ling SUN Wei LI Wei SHI Shan-ping LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1318-1325,共8页
This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connec... This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connectivity and efficiency of the CDS. Compared with Wu's algorithm, the proposed algorithm can make full use of present network conditions and involves fewer nodes. Also it has better performance with regard to the approximation factor, message complexity, and time complexity. 展开更多
关键词 移动AD HOC网络 CDS 迁移率 管理算法
下载PDF
A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS
17
作者 Li Yanping Wang Xin +1 位作者 Xue Xiangyang C. K. Toh 《Journal of Electronics(China)》 2006年第5期650-655,共6页
Although clustering is a convenient framework to enable traffic control and service support in Mo- bile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for... Although clustering is a convenient framework to enable traffic control and service support in Mo- bile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is dissemi- nated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering. 展开更多
关键词 易变AD HOC网络 簇类 路由 环基
下载PDF
Effect of Varying Mobility on the Performance of MANET Protocols
18
作者 Ibrahiem M. M. El Emary Samir S. Malallah Shatha J. Kadhim 《通讯和计算机(中英文版)》 2011年第7期523-535,共13页
关键词 动态源路由协议 性能变化 移动AD manet 网络拓扑结构 AODV协议 无线路由协议 移动节点
下载PDF
Design of Fuzzy Logic Control Framework for QoS Routing in MANET
19
作者 M.Vargheese S.Vanithamani +1 位作者 D.Stalin David Ganga Rama Koteswara Rao 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3479-3499,共21页
Wireless networks with no infrastructure arise as a result of multiple wireless devices working together.The Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless l... Wireless networks with no infrastructure arise as a result of multiple wireless devices working together.The Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless links.A MANET is self-configuring in telecommunications,while MN produces non-infrastructure networks that are entirely decentralized.Both the MAC and routing layers of MANETs take into account issues related to Quality of Service(QoS).When culling a line of optical discernment communication,MANET can be an effective and cost-saving route cull option.To maintain QoS,however,more or fewer challenges must be overcome.This paper proposes a Fuzzy Logic Control(FLC)methodology for specifying a probabilistic QoS guaranteed for MANETs.The framework uses network node mobility to establish the probabil-istic quality of service.Fuzzy Logic(FL)implementations were added to Network Simulator-3(NS-3)and used with the proposed FLC framework for simulation.Researchers have found that for a given node’s mobility,the path’s bandwidth decreases with time,hop count,and radius.It is resolutely based on this fuzzy rule that the priority index for a packet is determined.Also,by avoiding sending pack-ets(PKT)out of source networks when there are no beneficial routes,bandwidth is not wasted.The FLC outperforms the scheduling methods with a wide range of results.To improve QoS within MANETs,it is therefore recommended that FLC is used to synchronize packets.Thus,using these performance metrics,the QoS-responsible routing can opt for more stable paths.Based on network simulation,it is evident that incorporating QoS into routing protocols is meant to improve traf-fic performance,in particular authentic-time traffic. 展开更多
关键词 manet quality of service fuzzy logic mobile node network traffic
下载PDF
Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation
20
作者 Y.M.Mahaboob John G.Ravi 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3653-3666,共14页
Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To redu... Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To reduce this drawback,this paper proposes a new secure routing algorithm based on real-time partial ME(Mobility,energy)approximation.The routing method RRME(Real-time Regional Mobility Energy)divides the whole network into several parts,and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly.It is done in the path discovery phase,estimated to identify and remove malicious nodes.In addition,Trusted Forwarding Factor(TFF)calculates the various nodes based on historical records and other characteristics of multiple nodes.Similarly,the calculated QoS Support Factor(QoSSF)calculating by the Data Forwarding Support(DFS),Throughput Support(TS),and Lifetime Maximization Support(LMS)to any given path.One route was found to implement the path of maximizing MANET QoS based on QoSSF value.Hence the proposed technique produces the QoS based on real-time regional ME feature approximation.The proposed simulation implementation is done by the Network Simulator version 2(NS2)tool to produce better performance than other methods.It achieved a throughput performance had 98.5%and a routing performance had 98.2%. 展开更多
关键词 mobile ad-hoc network(manet) routing problem regional approximation secure routing QoS support factor trusted forwarding factor data forwarding support(DFS) mobility energy
下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部