Ad Hoc & Sensor Wireless Networks最新文献

筛选
英文 中文
Study on the Impact of DASH Streaming Services using Energy Efficient Ethernet 使用节能以太网的DASH流媒体服务的影响研究
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488527
T. R. Vargas, J. C. Guerri, P. Arce
{"title":"Study on the Impact of DASH Streaming Services using Energy Efficient Ethernet","authors":"T. R. Vargas, J. C. Guerri, P. Arce","doi":"10.1145/3479240.3488527","DOIUrl":"https://doi.org/10.1145/3479240.3488527","url":null,"abstract":"Dynamic Streaming over HTTP is the main standard used for online video streaming, service that has about 1.1 billion subscribers around the world. That implies billions of streaming connections between video servers and client displays. These devices involved in the streaming connection use an Ethernet Interface Card that consumes energy. In order to reduce the energy consumption, the IEEE 802.3az Energy Efficient Ethernet has been proposed. In this study, the ethernet traffic pattern when transmitting online video content is characterized in order to analyze the efficiency of the IEEE 802.3az standard under video streaming scenarios, and to verify the convenience of activating this energy saving alternative at the network interface of billions of client devices.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85766502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Support Vector Machine Implementation for Traffic Assignment Problem 交通分配问题的支持向量机实现
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488502
J. González-Vergara, N. Serrano, Cristhian Iza
{"title":"A Support Vector Machine Implementation for Traffic Assignment Problem","authors":"J. González-Vergara, N. Serrano, Cristhian Iza","doi":"10.1145/3479240.3488502","DOIUrl":"https://doi.org/10.1145/3479240.3488502","url":null,"abstract":"Simulating urban mobility scenarios is a useful tool for researchers in multiple fields like Urban Planning, Traffic Optimization, CO$^2$ Emissions Analysis, Performance Evaluation of Protocols for Connected Vehicles, among others. SUMO handles microscopic traffic simulations and allows communication to Python language through an API which is also shared by VEINS. This communication channel lets researchers interact with the simulation on-live, facilitating the implementation of state-of-the-art algorithms from Machine Learning (ML) and Artificial Intelligence (AI). On the other hand, OMNeT++ is a framework to manage and analyze communication protocols of mobile networks. We experimentally evaluated the training of a Support Vector Machine (SVM) in the SUMO-VEINS-OMNeT++ framework. Our experiments show the best classification model for a particular traffic light assignment scenario.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88738381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Frame Aggregation to Enhance Access Point Selection 利用帧聚合增强接入点选择
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488507
Nour El Houda Bouzouita, A. Busson, H. Rivano
{"title":"Exploiting Frame Aggregation to Enhance Access Point Selection","authors":"Nour El Houda Bouzouita, A. Busson, H. Rivano","doi":"10.1145/3479240.3488507","DOIUrl":"https://doi.org/10.1145/3479240.3488507","url":null,"abstract":"IEEE 802.11 (known as Wi-Fi) has emerged as a vital wireless network access technology for mobile devices. By providing the potential for high connectivity speeds, this technology has led to a dramatic rise in the number of access points (APs). In such environments, mobile devices have the choice to join several Wi-Fi networks. Despite its importance to user Quality of Experience (QoE), the AP selection is still trivial since it focuses at best on the received signal strength if not only the user's history. Crucial metrics that capture the overall dynamics of the AP load condition, such as the network load, are not taken into account. In this paper, we propose to use the Busy Time Fraction (BTF) as a metric to choose the best AP to attach to. The BTF level of a given channel is inferred based on the frame aggregation scheme proposed since the 802.11n standard. In this regard, we propose an analytical model based on a Discrete-Time Markov chain that discerns the theoretical DownLink aggregation levels for probe traffic concurrent to cross traffic. We validate the accuracy of our proposed approach against ns-3 simulations under several scenarios.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80288103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSVL: Detecting Selfish Node in Vehicular Ad-hoc Networks (VANET) by Learning Automata 基于学习自动机的车辆自组织网络(VANET)自利节点检测
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-08-02 DOI: 10.32908/ahswn.v53.7989
Ainaz Nobahari, S. J. Mirabedini
{"title":"DSVL: Detecting Selfish Node in Vehicular Ad-hoc Networks (VANET) by Learning Automata","authors":"Ainaz Nobahari, S. J. Mirabedini","doi":"10.32908/ahswn.v53.7989","DOIUrl":"https://doi.org/10.32908/ahswn.v53.7989","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) are a set of mobile nodes that move on the road and connect via wireless. Due to the limited radio range, they send data to each other by collaborating. Some nodes drop the other nodes’ packets to save the network supplements; therefore, the network’s performance will reduce. So it is necessary to identify selfish nodes to prevent other nodes from cooperating with them. In the proposed scheme, a punishmentbased algorithm is presented to identify the selfish nodes used in Adaptive Resonance Theory (ART) clustering to monitor and control them. The cluster head determines if selfish behaviors occur in the cluster or not. If the cluster head discovers that there is a selfish behavior in the cluster, it begins to check the packets that were sent and received by all nodes. In the proposed method, each node in the network is equipped with learning automata, the probability of selecting each neighbor node to send the packet, which is rewarded or punished according to the performance. Simulation results have shown that the rate of detection of selfish nodes is more than other methods, and the false alarm rate (FAR) is less than other similar methods.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73900197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Host-based Detection and Prevention of Black Hole Attacks by AODV-ICCSO Algorithm for Security in MANETs 基于AODV-ICCSO算法的基于主机的黑洞攻击检测与防范
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-07-20 DOI: 10.21203/rs.3.rs-188928/v1
P. Sathyaraj, S. Rukmani Devi, K. Kannan
{"title":"Host-based Detection and Prevention of Black Hole Attacks by AODV-ICCSO Algorithm for Security in MANETs","authors":"P. Sathyaraj, S. Rukmani Devi, K. Kannan","doi":"10.21203/rs.3.rs-188928/v1","DOIUrl":"https://doi.org/10.21203/rs.3.rs-188928/v1","url":null,"abstract":"\u0000 Background: Mobile Ad-hoc Networks (i.e.) MANETs are gaining rapid fame in recent days and are considered as very significant because of their easier implementation and growing property. Various types of attacks are prone to damage the networks due to the elastic property possessed by the network. And among different categories of attacks that can affect MANETs, black hole attack is considered as the commonly occurring one within a MANET. Chicken Swarm Optimization (CSO) algorithm is one among the technique used for the detection of black hole attacks occurring in the MANETs. But the CSO algorithm possesses some disadvantages and necessity rises for overcoming the weakness in the CSO algorithm. Objective: Therefore, in this research paper, to address the black hole attack in MANET, an Improved Crossover Chicken Swarm Optimization (ICCSO) algorithm and the concept of Enhanced Partially-Mapped Crossover operation proposed and the best fitness values obtained. Methods: In ICCSO algorithm, parameter initialization is carried out in step 1 of the algorithm, where the attacked nodes and non-attack nodes are created separately with the aid of parameters like PDR (i.e.) Packet Delivery Ratio and RSSI (i.e.) Received Signal Strength Indicator. Further, If the node is affected by any attack, then the nodes are discarded and the data is transmitted through the non-attacked node. Routing is carried by a protocol of AODV.Results: The effectiveness of the algorithm proposed in the work is evaluated using various performance measures like packet delivery ratio (PDR), end-to-end delay (EED) and throughput. The performance measures are compared with a different state of the art routing protocols and it can be inferred that the proposed methodology comes up with improved results.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87689828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Sensor Networks: 15th China Conference, CWSN 2021, Guilin, China, October 22–25, 2021, Revised Selected Papers 无线传感器网络:第十五届中国会议,CWSN 2021,中国桂林,2021年10月22日至25日,修订论文选集
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-01-01 DOI: 10.1007/978-981-16-8174-5
{"title":"Wireless Sensor Networks: 15th China Conference, CWSN 2021, Guilin, China, October 22–25, 2021, Revised Selected Papers","authors":"","doi":"10.1007/978-981-16-8174-5","DOIUrl":"https://doi.org/10.1007/978-981-16-8174-5","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74545835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Trends On TCP Performance Over Urban 5G mmWave Networks 城市5G毫米波网络中TCP性能的开放趋势
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2020-11-16 DOI: 10.1145/3416011.3424749
Reza Poorzare, A. C. Augé
{"title":"Open Trends On TCP Performance Over Urban 5G mmWave Networks","authors":"Reza Poorzare, A. C. Augé","doi":"10.1145/3416011.3424749","DOIUrl":"https://doi.org/10.1145/3416011.3424749","url":null,"abstract":"The 5G (fifth-generation) mobile networks, especially by exploiting higher bandwidth in the mmWave (millimeter wave) spectrum, is the leading candidate to be used as the coming generation for ubiquitous networks. The vast available bandwidth in mmWave can satisfy the high data rate and low latency expectations from 5G networks in order to provide new services and use cases. Although 5G mmWave networks come up with innovative and robust services, they suffer from a drawback. As the frequency rises, the penetration power and coverage area of the network decreases, so it results in having discontinuous communication between a base station and a user. This intermittent characteristic is caused due to an existing obstacle such as a car or a building on the communication path that can hurdle the establishment of a transmission, which is called NLoS (Non-Line of Sight) state. NLoS states can degrade the functionality of the network and prevent from having seamless connectivity by forcing fluctuations in the network's channels. The reason for this shortcoming is because of the susceptibility of high frequencies to the blockage that can be generated by obstacles. The intense negative effect of having a blockage in the network is on an end-to-end communication when other layers protocols such as the transport layer widely used protocol TCP (Transmission Control Protocol) are used. Having frequent disconnections in the network impairs the TCP's functionality with inducing congestion states and preventing it from achieving higher performance. In this paper, we present the performance evaluation and analysis of TCP in different situations in an urban area and find out how various conditions can affect the performance of the protocol. The simulation results indicate that conventional TCPs are not adequate enough to be exploited in 5G mmWave networks. For having them functioning in their full potential, some modifications should be made in order to adapt them to 5G mmWave networks. Some ML (Machine Learning) techniques such as Neural Networks and Reinforcement Learning can be deployed as the key enablers to network performance improvement.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90156573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session details: Session 1: Vehicular Networks 会议详情:会议1:车辆网络
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2020-11-16 DOI: 10.1145/3436345
Luis J. de la Cruz Llopis
{"title":"Session details: Session 1: Vehicular Networks","authors":"Luis J. de la Cruz Llopis","doi":"10.1145/3436345","DOIUrl":"https://doi.org/10.1145/3436345","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76897437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Fast and Efficient Strategy to Assign Channels in WLANs with Channel Bonding 基于信道绑定的无线局域网信道分配策略研究
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2020-11-16 DOI: 10.1145/3416011.3424755
Amel Chadda, Marija Stojanova, Thomas Begin, A. Busson, I. G. Lassous
{"title":"Towards a Fast and Efficient Strategy to Assign Channels in WLANs with Channel Bonding","authors":"Amel Chadda, Marija Stojanova, Thomas Begin, A. Busson, I. G. Lassous","doi":"10.1145/3416011.3424755","DOIUrl":"https://doi.org/10.1145/3416011.3424755","url":null,"abstract":"With the aim of increasing wireless data rates, IEEE 802.11n introduced the possibility for WLAN nodes to bond two channels into a single channel. However, channel bonding also limits spacial reutilization and complexifies channel assignment. In this paper, we present a fast and efficient solution for channel width selection and channel assignment in 802.11 WLANs using channel bonding. The proposed algorithm uses a novel, graph-centric metric to propose a single channel width for all the APs of the WLAN aiming at avoiding starvation in any of the network's APs. Decoupling the choice of channel width and channel assignment results in a scalable approach that bypasses the usual complexity issues of classic channel assignment schemes. We test the solution's precision in choosing a suited channel width and assignment by comparing its results with those delivered by the ns-3 network simulator. We obtain that, in the large majority of the cases, the choice made by our solution matches the simulation results.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75821666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 2: Wireless Sensor Networks and Internet of Things 会议详情:第二部分:无线传感器网络和物联网
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2020-11-16 DOI: 10.1145/3436346
M. A. Igartua
{"title":"Session details: Session 2: Wireless Sensor Networks and Internet of Things","authors":"M. A. Igartua","doi":"10.1145/3436346","DOIUrl":"https://doi.org/10.1145/3436346","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78868239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信