Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj May 2021

A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj

Library Philosophy and Practice (e-journal)

Broadcasting in Mobile ad hoc network is very crucial process and if not taken care led to Broadcast storm problem. Several Broadcasting techniques are proposed in the literature, but probabilistic broadcasting is the one the major technique which can really avoid the broadcasting storm problem. The protocols employing probabilistic broadcasting is surveyed in this bibliometric paper. The bibliometric survey aims to throw light on several types of protocols employed in Mobile ad hoc Network. The primary aim of this paper is to assess the amount of work done in the field of Probabilistic Broadcasting in Mobile ad hoc Network, as …


Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner Jul 2020

Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner

Publications and Research

Autonomous unmanned aerial vehicles (UAVs) operating as a swarm can be deployed in austere environments, where cyber electromagnetic activities often require speedy and dynamic adjustments to swarm operations. Use of central controllers, UAV synchronization mechanisms or pre-planned set of actions to control a swarm in such deployments would hinder its ability to deliver expected services. We introduce artificial intelligence and game theory based flight control algorithms to be run by each autonomous UAV to determine its actions in near real-time, while relying only on local spatial, temporal and electromagnetic (EM) information. Each UAV using our flight control algorithms positions itself …


Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia Mar 2020

Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia

FIU Electronic Theses and Dissertations

With the proliferation of drones applications, there is an increasing need for handling their numerous challenges. One of such challenges arises when a swarm-of-drones is deployed to accomplish a specific task which requires coordination and communication. While this swarm-of-drones is essentially a special form of mobile ad hoc networks (MANETs) which has been studied for many years, there are still some unique requirements of drone applications that necessitates re-visiting MANET approaches. These challenges stem from 3-D environments the drones are deployed in, and their specific way of mobility which adds to the wireless link management challenges. In this thesis, we …


Modeling Security And Resource Allocation For Mobile Multi-Hop Wireless Neworks Using Game Theory, Laurent L. Y. Njilla Sep 2015

Modeling Security And Resource Allocation For Mobile Multi-Hop Wireless Neworks Using Game Theory, Laurent L. Y. Njilla

FIU Electronic Theses and Dissertations

This dissertation presents novel approaches to modeling and analyzing security and resource allocation in mobile ad hoc networks (MANETs). The research involves the design, implementation and simulation of different models resulting in resource sharing and security’s strengthening of the network among mobile devices. Because of the mobility, the network topology may change quickly and unpredictably over time. Moreover, data-information sent from a source to a designated destination node, which is not nearby, has to route its information with the need of intermediary mobile nodes. However, not all intermediary nodes in the network are willing to participate in data-packet transfer of …


Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah Jul 2014

Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

One of the most promising network that has emerged from the technology world is the mobile ad-hoc network or MANET. It is a type of multi-hop network. Wireless by nature, MANETs do not have a specific network infrastructure. It is a collection of wireless mobile devices that communicate with each other without the help of any third party backbone like a base-station or a router. It can be hard to imagine how every node in this type of network communicate with one another without having a router. In MANETs, nodes change locations with time, configure themselves and get the information …


Protocols For Highly-Dynamic Airborne Networks, Egemen K. Çetinkaya, Justin P. Rohrer, Abdul Jabbar, Mohammed J. F. Alenazi, Dongsheng Zhang, Dan S. Broyles, Kamakshi Sirisha Pathapati, Hemanth Narra, Kevin Peters, Santosh Ajith Gogi, James P. G. Sterbenz Jan 2012

Protocols For Highly-Dynamic Airborne Networks, Egemen K. Çetinkaya, Justin P. Rohrer, Abdul Jabbar, Mohammed J. F. Alenazi, Dongsheng Zhang, Dan S. Broyles, Kamakshi Sirisha Pathapati, Hemanth Narra, Kevin Peters, Santosh Ajith Gogi, James P. G. Sterbenz

Electrical and Computer Engineering Faculty Research & Creative Works

End-to-end communication in highly-dynamic airborne networks is challenging due to the presence of highly mobile nodes and the inherent nature of wireless communication channels. Domain-specific protocols are required that can address these challenges and enable reliable transmission of data in this environment. We develop the ANTP (airborne network and transport protocols) suite that operates in this highly-dynamic environment while utilising cross-layer optimisations between the physical, MAC, network, and transport layers. We show how each component in the ANTP suite outperforms the traditional TCP/IP and MANET protocols through simulation using ns-3. Having verified these protocols through simulation and analysis, the next …


Idma: Improving The Defense Against Malicious Attack For Mobile Ad Hoc Networks Based On The Artp Protocol, Chaorong Peng, Chang Wen Chen Apr 2008

Idma: Improving The Defense Against Malicious Attack For Mobile Ad Hoc Networks Based On The Artp Protocol, Chaorong Peng, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the …