E-Book, Englisch, 312 Seiten
Cheng / Li Advances in Wireless Ad Hoc and Sensor Networks
1. Auflage 2008
ISBN: 978-0-387-68567-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 312 Seiten
Reihe: Signals and Communication Technology
ISBN: 978-0-387-68567-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Within thirteen self-contained chapters, these volume provides a complete survey of the state-of-the-art research that encompasses all areas of ad hoc and sensor networks. Written by distinguished researchers in the field, these chapters focus on the theoretical and experimental study of advanced research topics involving security and trust, broadcasting and multicasting, power control and energy efficiency, and QoS provisioning. This book is a great reference tool for graduate students, researchers, and mathematicians interested in studying mobile ad hoc and sensor networks.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;6
2;Foreword;8
3;Backbone Quality-of-Service Routing Protocol for Heterogeneous Mobile Ad Hoc Networks;10
3.1;1 Introduction;10
3.2;2 Related Works;12
3.3;3 The Path Bandwidth Calculation Algorithm;15
3.4;4 QoS Routing Based on Backbone Nodes;16
3.5;5 Performance Evaluation;29
3.6;6 The Probability of Having B-Nodes;38
3.7;7 Conclusions;40
3.8;References;40
4;Optimal Path Selection in Ad Hoc Networks Based on Multiple Metrics: Bandwidth and Delay;44
4.1;1 Introduction;44
4.2;2 QoS Routing in Ad Hoc Networks;45
4.3;3 Metrics Measurements;50
4.4;4 Routing Table Calculation;53
4.5;5 Heuristics for the Selection of Multipoint Relays;56
4.6;6 Performance Evaluation;62
4.7;7 Conclusions;67
4.8;References;67
5;Analyzing Voice Transmission Between Ad Hoc Networks and Fixed IP Networks Providing End- to- End Quality of Service;70
5.1;1 Introduction;70
5.2;2 Internet Connectivity with Mobile Ad Hoc Networks;72
5.3;3 The Differentiated Services Architecture;74
5.4;4 QoS in Mobile Ad Hoc Networks;77
5.5;5 Voice Transmission in Ad Hoc Networks;82
5.6;6 DS-SWAN (Differentiated Services SWAN);83
5.7;7 Simulations;84
5.8;8 Conclusions;93
5.9;9 Acknowledgments;93
5.10;References;93
6;Separable Threshold Decryption for Ad Hoc Wireless Networks;98
6.1;1 Introduction;98
6.2;2 Building Blocks;101
6.3;3 The Model;103
6.4;4 A Secure Scheme;104
6.5;5 Security Consideration;107
6.6;6 Conclusion;108
6.7;References;108
7;A Secure Group Communication Protocol for Ad Hoc Wireless Networks;112
7.1;1 Introduction;112
7.2;2 System Assumptions;117
7.3;3 Proposed Protocol;121
7.4;4 Maintenance Processes;127
7.5;5 Security Analysis;133
7.6;6 Performance Analysis;134
7.7;7 Conclusions and Future Works;136
7.8;References;137
8;Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms;142
8.1;1 Introduction;142
8.2;2 Trust and Security Issues;144
8.3;3 Attacks on Wireless Networks;145
8.4;4 Previous Work;146
8.5;5 The Trust Model;149
8.6;6 Extension to DSR;151
8.7;7 Simulation;159
8.8;8 Analysis;163
8.9;9 Conclusion;165
8.10;References;166
9;On the Power Optimization and Throughput Performance of Multihop Wireless Network Architectures;170
9.1;1 Introduction;170
9.2;2 Description of MCN Architecture;173
9.3;3 Description of MuPAC Architecture;174
9.4;4 OurWork;176
9.5;5 Theoretical Analysis;182
9.6;6 Performance Analysis;185
9.7;7 Conclusions;197
9.8;References;198
10;Provisioning the Performance in Wireless Sensor Networks Through Computational Geometry Algorithms;200
10.1;1 Introduction;201
10.2;2 WSN Architecture;202
10.3;3 Related Work;204
10.4;4 Scheduling Nodes and Voronoi Diagram;205
10.5;5 Incremental Deployment;210
10.6;6 Experimental Results;214
10.7;7 Concluding Remarks;218
10.8;References;220
11;Message-Optimal Self-Configuration for Mobile Ad Hoc Networks;224
11.1;1 Introduction;224
11.2;2 Preliminaries;225
11.3;3 Related Work;227
11.4;4 Proposed Algorithm;230
11.5;5 Analysis;237
11.6;6 Conclusion;241
11.7;References;241
12;Energy-Efficient Two-Tree Multicast for Mobile Ad Hoc Networks;244
12.1;1 Introduction;244
12.2;2 Related Work;246
12.3;3 Energy Efficiency of Multicast Protocols;250
12.4;4 Energy-Efficient Two-Tree Multicast;257
12.5;5 Performance Evaluation;260
12.6;6 Conclusion;264
12.7;References;264
13;SPLAST: A Novel Approach for Multicasting in Mobile Wireless Ad Hoc Networks;270
13.1;1 Introduction;270
13.2;2 Definitions and Key Terms;272
13.3;3 Fundamental SPLAST Techniques;274
13.4;4 The Static Algorithm;275
13.5;5 The Distributed Algorithm;276
13.6;6 Mobile SPLAST Algorithm;279
13.7;7 Simulation Results;283
13.8;8 Conclusion;285
13.9;References;285
14;A Simple and Efficient Broadcasting Scheme for Mobile Ad Hoc Networks;288
14.1;1 Introduction;288
14.2;2 Preliminaries and Related Work;290
14.3;3 Proposed CBB+ Scheme;291
14.4;4 Simulation Results and Analysis;298
14.5;5 Conclusions;305
14.6;6 Appendix;305
14.7;7 Acknowledgments;306
14.8;References;307
15;Energy-Efficient Broadcast/Multicast Routing with Min- Max Transmission Power in Wireless Ad Hoc Networks;310
15.1;1 Introduction;310
15.2;2 Related Work;311
15.3;3 Network Model;312
15.4;4 Our Solution;313
15.5;5 Simulations;316
15.6;6 Conclusion;319
15.7;References;319




