EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Secure Opportunistic Routing Protocol Based on Reputation Systems in VANETs

Download or read book Secure Opportunistic Routing Protocol Based on Reputation Systems in VANETs written by Eqbal Darraji and published by . This book was released on 2021 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks

Download or read book Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks written by Mahmood Salehi and published by . This book was released on 2017 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having significantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness of communications is also a challenging task. More specifically, almost all traditional and opportunistic routing protocols require cooperation of all network nodes to complete the routing process. However, some nodes in the network may be compromised and avoid collaboration with others due to various selfish or malicious motivations. The focus of this thesis is on modeling security challenges and developing trust-based opportunistic routing protocols. This way, communication between nodes will not only benefit from the reliability of opportunistic routing methods, but also from the security of trust and reputation management schemes. For this purpose, a novel trust-based opportunistic routing protocol is proposed that introduces three different candidate selection metrics known as RTOR, TORDP, and GEOTOR. Such metrics have been designed to address specific characteristics of opportunistic routing protocols. In continue, a watchdog mechanism is proposed to assist nodes in monitoring their candidates, recalculating their trust value, and finally replacing malicious candidates with benign ones. Afterwards, an analytical approach is introduced using Discrete-Time Markov Chain to demonstrate the effect of malicious nodes on different parameters of a wireless network that uses opportunistic routing. In this model, a new method of calculating packet drop ratio is introduced to represent the effect of attackers. The model is then applied on different well-known opportunistic routing protocols and results of the model are verified by simulation. Finally, the proposed analytical model is extended to include a defensive mechanism against adversary nodes. In fact, a packet salvaging mechanism is developed through which backup candidates attempt to save some of the maliciously dropped data packets. Different related network parameters such as delivery ratio, salvage ratio, direct-delivery ratio, etc. are then introduced, calculated, and reported using the introduced model.

Book Wireless Algorithms  Systems  and Applications

Download or read book Wireless Algorithms Systems and Applications written by Lei Wang and published by Springer Nature. This book was released on 2022-11-17 with total page 679 pages. Available in PDF, EPUB and Kindle. Book excerpt: The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in theoretical frameworks and analysis of fundamental cross-layer protocol and network design and performance issues; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobility models and mobile social networking; underwater and underground networks; vehicular networks; algorithms, systems, and applications of edge computing

Book Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security

Download or read book Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security written by Singh, Dharm and published by IGI Global. This book was released on 2017-04-17 with total page 304 pages. Available in PDF, EPUB and Kindle. Book excerpt: Networking capabilities have been significantly enhanced in recent years. With emerging advancements in technology, wireless communication has increased exponentially. Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security is a comprehensive resource on the latest technological advancements in designing secure wireless networks and secure transmission of data, voice and video over wireless networks and other innovations. Featuring comprehensive coverage across a range of relevant topics such as network planning, radio resource allocation, and broadband wireless networks, this publication is an ideal reference source for network designers, industries, researchers, educators, and governments who are involved in designing and implementing security and wireless networks and applications.

Book Information and Communication Technology for Intelligent Systems  ICTIS 2017    Volume 1

Download or read book Information and Communication Technology for Intelligent Systems ICTIS 2017 Volume 1 written by Suresh Chandra Satapathy and published by Springer. This book was released on 2017-08-07 with total page 645 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume includes 74 papers presented at ICTIS 2017: Second International Conference on Information and Communication Technology for Intelligent Systems. The conference was held on 25th and 26th March 2017, in Ahmedabad, India and organized jointly by the Associated Chambers of Commerce and Industry of India (ASSOCHAM) Gujarat Chapter, the G R Foundation, the Association of Computer Machinery, Ahmedabad Chapter and supported by the Computer Society of India Division IV – Communication and Division V – Education and Research. The papers featured mainly focus on information and communications technology (ICT) for computation, algorithms and data analytics. The fundamentals of various data analytics and algorithms discussed are useful to researchers in the field.

Book Vehicular Social Networks

Download or read book Vehicular Social Networks written by Anna Maria Vegni and published by CRC Press. This book was released on 2017-03-31 with total page 192 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Book Routing in Opportunistic Networks

Download or read book Routing in Opportunistic Networks written by Isaac Woungang and published by Springer Science & Business Media. This book was released on 2013-09-10 with total page 421 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Book Adaptation and Cross Layer Design in Wireless Networks

Download or read book Adaptation and Cross Layer Design in Wireless Networks written by Mohamed Ibnkahla and published by CRC Press. This book was released on 2018-10-08 with total page 526 pages. Available in PDF, EPUB and Kindle. Book excerpt: Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communications Series through a unified framework across all layers of the wireless protocol stack ranging from the physical layer to the application layer, and from cellular systems to next-generation wireless networks. Adaptation and Cross Layer Design in Wireless Networks is devoted to adaptation in the data link layer, network layer, and application layer. The book presents state-of-the-art adaptation techniques and methodologies, including cross-layer adaptation, joint signal processing, coding and networking, selfishness in mobile ad hoc networks, cooperative and opportunistic protocols, adaptation techniques for multimedia support, self –organizing routing, and tunable security services. It presents several new theoretical paradigms and analytical findings which are supported with various simulation and experimental results. Adaptation in wireless communications is needed in order to achieve high capacity and ubiquitous communications. The current trend in wireless communication systems is to make adaptation dependent upon the state of the relevant parameters in all layers of the system. Focusing on simplified cross layer design approaches, this volume describes advanced techniques such as adaptive resource management, adaptive modulation and coding, 4G communications, QoS, diversity combining, and energy and mobility aware MAC protocols. The first volume in the series, Adaptive Signal Processing in Wireless Communications (cat no.46012) covers adaptive signal processing at the physical layer.

Book Tourism Informatics

Download or read book Tourism Informatics written by Tokuro Matsuo and published by Springer. This book was released on 2015-07-14 with total page 176 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.

Book Adaptation in Wireless Communications   2 Volume Set

Download or read book Adaptation in Wireless Communications 2 Volume Set written by Mohamed Ibnkahla and published by CRC Press. This book was released on 2018-10-08 with total page 1048 pages. Available in PDF, EPUB and Kindle. Book excerpt: The widespread use of adaptation techniques has helped to meet the increased demand for new applications. From adaptive signal processing to cross layer design, Adaptation in Wireless Communications covers all aspects of adaptation in wireless communications in a two-volume set. Each volume provides a unified framework for understanding adaptation and relates various specializations through common terminologies. In addition to simplified state-of-the-art cross layer design approaches, they also describe advanced techniques, such as adaptive resource management, 4G communications, and energy and mobility aware MAC protocols.

Book Computing and Network Sustainability

Download or read book Computing and Network Sustainability written by H.R . Vishwakarma and published by Springer. This book was released on 2017-07-05 with total page 427 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Book Opportunistic Networks

Download or read book Opportunistic Networks written by Anshul Verma and published by CRC Press. This book was released on 2021-08-19 with total page 409 pages. Available in PDF, EPUB and Kindle. Book excerpt: The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Book Delay Tolerant Networks

    Book Details:
  • Author : Athanasios V. Vasilakos
  • Publisher : CRC Press
  • Release : 2016-04-19
  • ISBN : 1439811121
  • Pages : 362 pages

Download or read book Delay Tolerant Networks written by Athanasios V. Vasilakos and published by CRC Press. This book was released on 2016-04-19 with total page 362 pages. Available in PDF, EPUB and Kindle. Book excerpt: A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applicat

Book Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks

Download or read book Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks written by Azzedine Boukerche and published by John Wiley & Sons. This book was released on 2008-11-03 with total page 520 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc networks, particularly algorithmic methods and distributed computing with mobility and computation capabilities. It covers everything readers need to build a foundation for the design of future mobile ad hoc networks: Establishing an efficient communication infrastructure Robustness control for network-wide broadcast The taxonomy of routing algorithms Adaptive backbone multicast routing The effect of inference on routing Routing protocols in intermittently connected mobile ad hoc networks and delay tolerant networks Transport layer protocols ACK-thinning techniques for TCP in MANETs Power control protocols Power saving in solar powered WLAN mesh networks Reputation and trust-based systems Vehicular ad hoc networks Cluster interconnection in 802.15.4 beacon enabled networks The book is complemented with a set of exercises that challenge readers to test their understanding of the material. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks is appropriate as a self-study guide for electrical engineers, computer engineers, network engineers, and computer science specialists. It also serves as a valuable supplemental textbook in computer science, electrical engineering, and network engineering courses at the advanced undergraduate and graduate levels.

Book Advances in Mobile Cloud Computing and Big Data in the 5G Era

Download or read book Advances in Mobile Cloud Computing and Big Data in the 5G Era written by Constandinos X. Mavromoustakis and published by Springer. This book was released on 2016-11-19 with total page 381 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

Book Encyclopedia on Ad Hoc and Ubiquitous Computing

Download or read book Encyclopedia on Ad Hoc and Ubiquitous Computing written by Dharma P. Agrawal and published by World Scientific. This book was released on 2010 with total page 689 pages. Available in PDF, EPUB and Kindle. Book excerpt: Ad hoc and ubiquitous computing technologies have received extensive attention in both the academia and industry with the explosive growth of wireless communication devices. These technologies are beneficial for many applications, such as offering futuristic high bandwidth access for users, and are expected to offer more exciting and efficient services, anytime and anywhere. In order to satisfy these diverse applications, The design issues of various wireless networks such as ad hoc, sensor, and mesh networks are extremely complicated and there are a number of technique challenges that need to be explored, involving every layer of the OSI protocol stack. This book aims to provide a complete understanding of these networks by investigating the evolution of ad hoc, sensor, and mesh networking technologies from theoretic concept to implementation protocols, from fundamentals to real applications. it provides the necessary background material needed to go deeper into the subject and explore the research literature. The explanation in the book is therefore sufficiently detailed to serve as a comprehensive reference for students, instructors, researchers, engineers, and other professionals, building their understanding of these networks.