Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (34)

Search Parameters:
Keywords = NS-2 (network simulator 2)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2001 KiB  
Article
Reliable Low-Latency Multicasting in MANET: A DTN7-Driven Pub/Sub Framework Optimizing Delivery Rate and Throughput
by Xinwei Liu and Satoshi Fujita
Information 2025, 16(6), 508; https://doi.org/10.3390/info16060508 - 18 Jun 2025
Viewed by 441
Abstract
This paper addresses the challenges of multicasting in Mobile Ad Hoc Networks (MANETs), where communication relies exclusively on direct interactions between mobile nodes without the support of fixed infrastructure. In such networks, efficient information dissemination is critical, particularly in scenarios where an event [...] Read more.
This paper addresses the challenges of multicasting in Mobile Ad Hoc Networks (MANETs), where communication relies exclusively on direct interactions between mobile nodes without the support of fixed infrastructure. In such networks, efficient information dissemination is critical, particularly in scenarios where an event detected by one node must be reliably communicated to a designated subset of nodes. The highly dynamic nature of MANET, characterized by frequent topology changes and unpredictable connectivity, poses significant challenges to stable and efficient multicasting. To address these issues, we adopt a Publish/Subscribe (Pub/Sub) model that utilizes brokers as intermediaries for information dissemination. However, ensuring the robustness of broker-based multicasting in a highly mobile environment requires novel strategies to mitigate the effects of frequent disconnections and mobility-induced disruptions. To this end, we propose a framework based on three key principles: (1) leveraging the Disruption-Tolerant Networking Implementations of the Bundle Protocol 7 (DTN7) at the network layer to sustain message delivery even in the presence of intermittent connectivity and high node mobility; (2) dynamically generating broker replicas to ensure that broker functionality persists despite sudden node failures or disconnections; and (3) enabling brokers and their replicas to periodically broadcast advertisement packets to maintain communication paths and facilitate efficient data forwarding, drawing inspiration from Named Data Networking (NDN) techniques. To evaluate the effectiveness of our approach, we conduct extensive simulations using ns-3, examining its impact on message delivery reliability, latency, and overall network throughput. The results demonstrate that our method significantly reduces message delivery delays while improving delivery rates, particularly in high-mobility scenarios. Additionally, the integration of DTN7 at the bundle layer proves effective in mitigating performance degradation in environments where nodes frequently change their positions. Our findings highlight the potential of our approach in enhancing the resilience and efficiency of broker-assisted multicasting in MANET, making it a promising solution for real-world applications such as disaster response, military operations, and decentralized IoT networks. Full article
(This article belongs to the Special Issue Wireless IoT Network Protocols, 3rd Edition)
Show Figures

Graphical abstract

22 pages, 1378 KiB  
Article
Microhardness, Young’s and Shear Modulus in Tetrahedrally Bonded Novel II-Oxides and III-Nitrides
by Devki N. Talwar and Piotr Becla
Materials 2025, 18(3), 494; https://doi.org/10.3390/ma18030494 - 22 Jan 2025
Cited by 5 | Viewed by 1059
Abstract
Direct wide-bandgap III-Ns and II-Os have recently gained considerable attention due to their unique electrical and chemical properties. These novel semiconductors are being explored to design short-wavelength light-emitting diodes, sensors/biosensors, photodetectors for integration into flexible transparent nanoelectronics/photonics to achieve high-power radio-frequency modules, and [...] Read more.
Direct wide-bandgap III-Ns and II-Os have recently gained considerable attention due to their unique electrical and chemical properties. These novel semiconductors are being explored to design short-wavelength light-emitting diodes, sensors/biosensors, photodetectors for integration into flexible transparent nanoelectronics/photonics to achieve high-power radio-frequency modules, and heat-resistant optical switches for communication networks. Knowledge of the elastic constants structural and mechanical properties has played crucial roles both in the basic understanding and assessing materials’ use in thermal management applications. In the absence of experimental structural, elastic constants, and mechanical traits, many theoretical simulations have yielded inconsistent results. This work aims to investigate the basic characteristics of tetrahedrally coordinated, partially ionic BeO, MgO, ZnO, and CdO, and partially covalent BN, AlN, GaN, and InN materials. By incorporating a bond-orbital and a valance force field model, we have reported comparative results of our systematic calculations for the bond length d, bond polarity αP, covalency αC, bulk modulus B, elastic stiffness C(=c11c122), bond-stretching α and bond-bending β force constants, Kleinmann’s internal displacement ζ, and Born’s transverse effective charge eT*. Correlations between C/B, β/α, c12c11, ζ, and αC revealed valuable trends of structural, elastic, and bonding characteristics. The study noticed AlN and GaN (MgO and ZnO) showing nearly comparable features, while BN (BeO) is much harder compared to InN (CdO) material, with drastically softer bonding. Calculations of microhardness H, shear modulus G, and Young’s modulus Y have predicted BN (BeO) satisfying a criterion of super hardness. III-Ns (II-Os) could be vital in electronics, aerospace, defense, nuclear reactors, and automotive industries, providing integrity and performance at high temperature in high-power applications, ranging from heat sinks to electronic substrates to insulators in high-power devices. Full article
Show Figures

Figure 1

16 pages, 3862 KiB  
Article
A Navier–Stokes-Informed Neural Network for Simulating the Flow Behavior of Flowable Cement Paste in 3D Concrete Printing
by Tianjie Zhang, Donglei Wang and Yang Lu
Buildings 2025, 15(2), 275; https://doi.org/10.3390/buildings15020275 - 18 Jan 2025
Viewed by 1390
Abstract
In this work, we propose a Navier–Stokes-Informed Neural Network (NSINN) as a surrogate approach to predict the localized flow behavior of cementitious materials for advancing 3D additive construction technology to gain fundamental insights into multiscale mechanisms of cement paste rheology. NS equations are [...] Read more.
In this work, we propose a Navier–Stokes-Informed Neural Network (NSINN) as a surrogate approach to predict the localized flow behavior of cementitious materials for advancing 3D additive construction technology to gain fundamental insights into multiscale mechanisms of cement paste rheology. NS equations are embedded into the NSINN to interpret the flow pattern in the 3D printing barrel. The results show that the presented NSINN has a higher accuracy compared to a traditional artificial neural network (ANN) as the Mean Square Errors (MSEs) of the u, v, and p predicted by NSINN are 1.25×104, 1.85×105, and 3.91×103, respectively. Compared to the ANN, the MSE of the predictions are 5.88×102, 4.17×103, and 1.72×102, respectively. Moreover, the mean prediction time used in the NSINN, the ANN, and Computational Fluid Dynamics (CFD) are 0.039 s, 0.014 s, and 3.37 s, respectively. That means the method is more computationally efficient at performing simulations compared to CFD which is mesh-based. The NSINN is also utilized in studying the relationship between geometry and extrudability. The ratio (R = 0.25, 0.5, and 0.75) between the diameter of the outlet and that of the domain is studied. It shows that a larger ratio (R = 0.75) can lead to better extrudability of the 3D concrete printing (3DCP). Full article
(This article belongs to the Special Issue Advances in Cementitious Materials)
Show Figures

Figure 1

15 pages, 4429 KiB  
Article
NR Sidelink Performance Evaluation for Enhanced 5G-V2X Services
by Mehnaz Tabassum, Felipe Henrique Bastos, Aurenice Oliveira and Aldebaro Klautau
Vehicles 2023, 5(4), 1692-1706; https://doi.org/10.3390/vehicles5040092 - 24 Nov 2023
Cited by 8 | Viewed by 6988
Abstract
The Third Generation Partnership Project (3GPP) has specified Cellular Vehicle-to-Everything (C-V2X) radio access technology in Releases 15–17, with an emphasis on facilitating direct communication between vehicles through the interface, sidelink PC5. This interface provides end-to-end network slicing functionality together with a stable cloud-native [...] Read more.
The Third Generation Partnership Project (3GPP) has specified Cellular Vehicle-to-Everything (C-V2X) radio access technology in Releases 15–17, with an emphasis on facilitating direct communication between vehicles through the interface, sidelink PC5. This interface provides end-to-end network slicing functionality together with a stable cloud-native core network. The performance of direct vehicle-to-vehicle (V2V) communications has been improved by using the sidelink interface, which allows for a network infrastructure bypass. Sidelink transmissions make use of orthogonal resources that are either centrally allocated (Mode 1, Release 14) or chosen by the vehicles themselves (Mode 2, Release 14). With growing interest in connected and autonomous vehicles, the advancement in radio access technologies that facilitate dependable and low-latency vehicular communications is becoming more significant. This is especially necessary when there are heavy traffic conditions and patterns. We thoroughly examined the New Radio (NR) sidelink’s performance based on 3GPP Releases 15–17 under various vehicle densities, speeds, and distance settings. Thus, by evaluating sidelink’s strengths and drawbacks, we are able to optimize resource allocation to obtain maximum coverage in urban areas. The performance evaluation was conducted on Network Simulator 3 (NS3.34/5G-LENA) utilizing various network metrics such as average packet reception rate, throughput, and latency. Full article
(This article belongs to the Special Issue Reliability Analysis and Evaluation of Automotive Systems)
Show Figures

Figure 1

23 pages, 5730 KiB  
Article
Adaptive Power-Controlled Depth-Based Routing Protocol for Underwater Wireless Sensor Networks
by Biao Wang, Haobo Zhang, Yunan Zhu, Banggui Cai and Xiaopeng Guo
J. Mar. Sci. Eng. 2023, 11(8), 1567; https://doi.org/10.3390/jmse11081567 - 9 Aug 2023
Cited by 17 | Viewed by 2269
Abstract
Low energy consumption has always been one of the core issues in the routing design of underwater sensor networks. Due to the high cost and difficulty of deployment and replacement of current underwater nodes, many underwater applications require the routing protocol design to [...] Read more.
Low energy consumption has always been one of the core issues in the routing design of underwater sensor networks. Due to the high cost and difficulty of deployment and replacement of current underwater nodes, many underwater applications require the routing protocol design to consider the network lifetime extension problem. Based on this, we designed a new routing protocol that takes into account both low energy consumption and balanced energy consumption, and achieves effective extension of the network lifetime, called adaptive power-controlled depth-based routing protocol for underwater wireless sensor networks (APCDBRP). The protocol consists of two phases: (1) the route establishment phase and (2) the data transmission phase. In the route establishment phase, the initial path is established by the sink node broadcasting beacon packets at the maximum transmission power. The receiving nodes update their routing tables based on the beacon information and forward the beacon packets. In the data transmission phase, APCDBRP introduces a novel forwarding factor that considers both energy efficiency and energy balance. It selects the optimal next hop based on high energy efficiency and relatively abundant energy, thus extending the network’s lifetime. Additionally, APCDBRP proposes a new data protection and route reconstruction mechanism to address issues such as network topology changes due to node mobility and data transmission failures. Our simulation is based on AquaSim–Next Generation, which is a specialized tool built on the NS3 platform for researching underwater networks. Simulation results demonstrate that, compared to other typical routing protocols, APCDBRP exhibits superior performance in reducing network energy consumption and extending the network’s lifetime. It also achieves a high packet delivery rate with lower energy consumption. Full article
(This article belongs to the Special Issue Underwater Acoustic Communication and Network)
Show Figures

Figure 1

20 pages, 5102 KiB  
Article
Can the Orbital Debris Disease Be Cured Using Lasers?
by Stefan Scharring and Jürgen Kästel
Aerospace 2023, 10(7), 633; https://doi.org/10.3390/aerospace10070633 - 13 Jul 2023
Cited by 10 | Viewed by 3577
Abstract
Ground-based high-power lasers are, in principle, able to de-orbit any kind of space debris object from the low Earth orbit (LEO) by remotely inducing laser-ablative momentum. However, the assessment of efficiency and operational safety depends on many factors, like atmospheric constraints or the [...] Read more.
Ground-based high-power lasers are, in principle, able to de-orbit any kind of space debris object from the low Earth orbit (LEO) by remotely inducing laser-ablative momentum. However, the assessment of efficiency and operational safety depends on many factors, like atmospheric constraints or the risk of debris disintegration during irradiation. We analyze laser momentum for a great variety of target geometries and sizes and—for the first time in a large-scale simulation—include thermal constraints in the laser irradiation configuration. Using a coherently coupled 100 kJ laser system at 1030 nm wavelength and a 5 ns pulse duration in an optimized pointing elevation angle range, the pulse frequency should amount to less than 10 Hz to prevent fragment meltdown. For mechanically intact payloads or rocket bodies, repetition rates should be even lower. Small debris fragments sized between 10 and 40 cm can be de-orbited by employing around 100 to 400 station passes with head-on irradiation, while objects exceeding 2 m typically require far more than 1000 irradiations for de-orbit. Hence, laser-based debris removal cannot be considered a prime space sustainability measure to tackle the highest-risk large debris, yet it can provide the remediation of a multitude of small-sized debris using small networks of globally distributed laser sites. Full article
(This article belongs to the Special Issue Laser Propulsion Science and Technology)
Show Figures

Figure 1

23 pages, 11807 KiB  
Article
Performance Evaluation of Standard and Modified OLSR Protocols for Uncoordinated UAV Ad-Hoc Networks in Search and Rescue Environments
by Ali H. Wheeb, Rosdiadee Nordin, Asma’ Abu Samah and Dimitris Kanellopoulos
Electronics 2023, 12(6), 1334; https://doi.org/10.3390/electronics12061334 - 11 Mar 2023
Cited by 36 | Viewed by 4712
Abstract
Widespread usage of unmanned aerial vehicles (UAVs) in new and emerging applications needs dynamic and adaptive networking. The development of routing protocols for UAV ad hoc networks faces numerous issues because of the unique characteristics of UAVs, such as rapid mobility, frequent changes [...] Read more.
Widespread usage of unmanned aerial vehicles (UAVs) in new and emerging applications needs dynamic and adaptive networking. The development of routing protocols for UAV ad hoc networks faces numerous issues because of the unique characteristics of UAVs, such as rapid mobility, frequent changes in network topology, and limited energy consumption. The Optimized Link State Routing (OLSR) protocol seems to be a promising solution as it offers improved delay performance. It is expected that OLSR will satisfy the strict demands of real-time UAV applications such as “search and rescue” (SAR) missions as it involves the most recent update of routing information. The classical OLSR routing protocol and its enhanced versions, D-OLSR, ML-OLSR, and P-OLSR, use different techniques to make an appropriate decision for routing packets. These routing techniques consider the quality of a wireless link, type of antenna, load, and mobility-aware mechanism to select the best UAV to send the message to the destination. This study evaluates and examines the performance of the original and modified OLSR routing protocols in UAV ad hoc networks for three SAR scenarios: (1) increasing mobility, (2) increasing scalability, and (3) increasing the allowed space of UAVs. It analyzes and validates the performance of the four OLSR-based routing protocols. It determines the best OSLR routing protocol by taking into account the packet delivery ratio, latency, energy consumption, and throughput. The four routing protocols and the SAR scenarios were simulated using NS-3.32. Based on the simulation results, ML-OLSR outperforms OLSR, D-OLSR, and P-OLSR in the considered measures. Full article
(This article belongs to the Special Issue IoT Sensing and Networking with UAVs)
Show Figures

Figure 1

31 pages, 3553 KiB  
Article
A Q-Learning and Fuzzy Logic-Based Hierarchical Routing Scheme in the Intelligent Transportation System for Smart Cities
by Amir Masoud Rahmani, Rizwan Ali Naqvi, Efat Yousefpoor, Mohammad Sadegh Yousefpoor, Omed Hassan Ahmed, Mehdi Hosseinzadeh and Kamran Siddique
Mathematics 2022, 10(22), 4192; https://doi.org/10.3390/math10224192 - 9 Nov 2022
Cited by 25 | Viewed by 2751
Abstract
A vehicular ad hoc network (VANET) is the major element of the intelligent transportation system (ITS). The purpose of ITS is to increase road safety and manage the movement of vehicles. ITS is known as one of the main components of smart cities. [...] Read more.
A vehicular ad hoc network (VANET) is the major element of the intelligent transportation system (ITS). The purpose of ITS is to increase road safety and manage the movement of vehicles. ITS is known as one of the main components of smart cities. As a result, there are critical challenges such as routing in these networks. Recently, many scholars have worked on this challenge in VANET. They have used machine learning techniques to learn the routing proceeding in the networks adaptively and independently. In this paper, a Q-learning and fuzzy logic-based hierarchical routing protocol (QFHR) is proposed for VANETs. This hierarchical routing technique consists of three main phases: identifying traffic conditions, routing algorithm at the intersection level, and routing algorithm at the road level. In the first phase, each roadside unit (RSU) stores a traffic table, which includes information about the traffic conditions related to four road sections connected to the corresponding intersection. Then, RSUs use a Q-learning-based routing method to discover the best path between different intersections. Finally, vehicles in each road section use a fuzzy logic-based routing technique to choose the foremost relay node. The simulation of QFHR has been executed on the network simulator version 2 (NS2), and its results have been presented in comparison with IRQ, IV2XQ, QGrid, and GPSR in two scenarios. The first scenario analyzes the result based on the packet sending rate (PSR). In this scenario, QFHR gets better the packet delivery rate by 2.74%, 6.67%, 22.35%, and 29.98% and decreases delay by 16.19%, 22.82%, 34.15%, and 59.51%, and lowers the number of hops by 6.74%, 20.09%, 2.68%, and 12.22% compared to IRQ, IV2XQ, QGrid, and GPSR, respectively. However, it increases the overhead by approximately 9.36% and 11.34% compared to IRQ and IV2XQ, respectively. Moreover, the second scenario evaluates the results with regard to the signal transmission radius (STR). In this scenario, QFHR increases PDR by 3.45%, 8%, 23.29%, and 26.17% and decreases delay by 19.86%, 34.26%, 44.09%, and 68.39% and reduces the number of hops by 14.13%, 32.58%, 7.71%, and 21.39% compared to IRQ, IV2XQ, QGrid, and GPSR, respectively. However, it has higher overhead than IRQ (11.26%) and IV2XQ (25%). Full article
Show Figures

Figure 1

16 pages, 3616 KiB  
Article
Development of a Model for Spoofing Attacks in Internet of Things
by Faheem Khan, Abdullah A. Al-Atawi, Abdullah Alomari, Amjad Alsirhani, Mohammed Mujib Alshahrani, Jawad Khan and Youngmoon Lee
Mathematics 2022, 10(19), 3686; https://doi.org/10.3390/math10193686 - 8 Oct 2022
Cited by 23 | Viewed by 4562
Abstract
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of [...] Read more.
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of the network. It is a passive attack and can access the Medium Access Control address of some valid users in the network to continue malicious activities. In this paper, an algorithm is proposed for detecting spoofing attacks in IoT using Received Signal Strength (RSS) and Number of Connected Neighbors (NCN). Firstly, the spoofing attack is detected, located and eliminated through Received Signal Strength (RSS) in an inter-cluster network. However, the RSS is not useful against intra-cluster spoofing attacks and therefore the NCN is introduced to detect, identify and eliminate the intra-cluster spoofing attack. The proposed model is implemented in Network Simulator 2 (NS-2) to compare the performance of the proposed algorithm in the presence and absence of spoofing attacks. The result is that the proposed model increases the detection and prevention of spoofing. Full article
Show Figures

Figure 1

26 pages, 2813 KiB  
Article
Adaptive QoS-Aware Multi-Metrics Gateway Selection Scheme for Heterogenous Vehicular Network
by Mahmoud Alawi, Raed Alsaqour, Maha Abdelhaq, Reem Alkanhel, Baraa Sharef, Elankovan Sundararajan and Mahamod Ismail
Systems 2022, 10(5), 142; https://doi.org/10.3390/systems10050142 - 7 Sep 2022
Cited by 3 | Viewed by 2392
Abstract
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) [...] Read more.
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) to offload 4G long-term evolution (4G-LTE) networks. However, when using Wi-Fi APs, the vehicles must organize themselves and select an appropriate mobile gateway (MGW) to communicate to the cellular infrastructure. Researchers are facing the problem of selecting the best MGW vehicle to aggregate vehicle traffic and reduce LTE load in HetVNETs when the Wi-Fi APs are unavailable for offloading. The selection process utilizes extra network overhead and complexity due to the frequent formation of clusters in this highly dynamic environment. In this study, we proposed a non-cluster adaptive QoS-aware gateway selection (AQAGS) scheme that autonomously picks a limited number of vehicles to act as LTE gateways based on the LTE network’s load status and vehicular ad hoc network (VANET) application’s QoS requirements. The present AQAGS scheme focuses on highway scenarios. The proposed scheme was evaluated using simulation of Urban mobility (SUMO) and network simulator version 2 (NS2) simulators and benchmarked with the clustered and non-clustered schemes. A comparison was made based on the end-to-end delay, throughput, control packet overhead (CPO), and packet delivery ratio (PDR) performance metrics over Voice over Internet Protocol (VoIP) and File Transfer Protocol (FTP) applications. Using VoIP, the AQAGS scheme achieved a 26.7% higher PDR compared with the other schemes. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

14 pages, 2570 KiB  
Article
SDS: Scrumptious Dataflow Strategy for IoT Devices in Heterogeneous Network Environment
by Zeeshan Rasheed, Shahzad Ashraf, Naeem Ahmed Ibupoto, Pinial Khan Butt and Emad Hussen Sadiq
Smart Cities 2022, 5(3), 1115-1128; https://doi.org/10.3390/smartcities5030056 - 5 Sep 2022
Cited by 2 | Viewed by 3242
Abstract
Communication technologies have drastically increased the number of wireless networks. Heterogeneous networks have now become an indispensable fact while designing the new networks and the way the data packet moves from device to device opens new challenges for transmitting the packet speedily, with [...] Read more.
Communication technologies have drastically increased the number of wireless networks. Heterogeneous networks have now become an indispensable fact while designing the new networks and the way the data packet moves from device to device opens new challenges for transmitting the packet speedily, with maximum throughput and by consuming only confined energy. Therefore, the present study intends to provide a shrewd communication link among all IoT devices that becomes part of numerous heterogeneous networks. The scrumptious dataflow strategy (SDS) for IoT devices in the heterogeneous network environment is proposed and it would deal with all link selection and dataflow challenges. The SDS would accomplish the targeted output in five steps: Step 1 determines the utility rate of each heterogeneous link. Step 2 develops a link selection attribute (LSA) that gauges the loads of network features used for the link selection process. Step 3 calculates the scores of all heterogeneous networks. Step 4 takes the LSA table and computes the network preference for different scenarios, such as round trip time (RTTP), network throughput, and energy consumption. Step 5 sets the priority of heterogeneous networks based on the scores of network attributes. Performance of the proposed SDS mechanism with state of the art network protocols, such as high-speed packet access (HSPA), content-centric networking (CCN), and dynamic source routing (DSR), was determined by conducting a simulation with NS2 and, consequently, the SDS exhibited its shrewd performance. During comparative analysis, in terms of round trip time, the SDS proved that it utilized only 16.4 milliseconds to reach IoT device 50 and was first among all other protocols. Similarly, for network throughput, at IoT device 50, the throughputs of the SDS are recorded at 40% while the rest of other protocols were dead. Finally, while computing the energy consumption used to reach IoT device 50, the SDS was functional and possessed more than half of its energy compared to the other protocols. The SDS only utilized 302 joules while the rest of the protocols were about to die as they had consumed all of their energy. Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
Show Figures

Graphical abstract

18 pages, 4680 KiB  
Article
Cross-Layer and Energy-Aware AODV Routing Protocol for Flying Ad-Hoc Networks
by Hassnen Shakir Mansour, Mohammed Hasan Mutar, Izzatdin Abdul Aziz, Salama A. Mostafa, Hairulnizam Mahdin, Ali Hashim Abbas, Mustafa Hamid Hassan, Nejood Faisal Abdulsattar and Mohammed Ahmed Jubair
Sustainability 2022, 14(15), 8980; https://doi.org/10.3390/su14158980 - 22 Jul 2022
Cited by 102 | Viewed by 4144
Abstract
In recent years, unmanned aerial vehicles (UAVs) have become the trend for different types of research and applications. UAVs can accomplish some technical and risky tasks while still being safe, mobile, and inexpensive to operate. However, UAVs need flying ad-hoc networks (FANET) to [...] Read more.
In recent years, unmanned aerial vehicles (UAVs) have become the trend for different types of research and applications. UAVs can accomplish some technical and risky tasks while still being safe, mobile, and inexpensive to operate. However, UAVs need flying ad-hoc networks (FANET) to operate in inaccessible or infrastructure-less areas. Subsequently, in many military and civil applications, the UAVs are connected ad hoc. FANET-based UAV systems have been developed for search and rescue, wildlife surveys, real-time monitoring, and delivery services. Maintaining the reliability and connectivity among UAV nodes in FANET becomes challenging because of the UAV movement, environmental conditions, energy efficiency, etc. Energy-aware routing protocols have become essential for developing advanced and effective FANETs. This paper presents a proposed Cross-Layer and Energy-Aware Ad-hoc On-demand Distance Vector (CLEA-AODV) routing protocol for improving FANET performance. The CLEA-AODV protocol is mainly divided into three sections: routing with AODV protocol, Glow Swarm Optimization (GSO)-based Cluster Head Selection, and Cooperative Medium Access Control (MAC). The cross-layer approach is implemented on the network layer and the data layer. The major parameters considered to evaluate the performance of the FANET are Packet Success Rate (PSR), Throughput (TP), End-to-End (E2E) delay, and packet drop ratio (PDR). The Network Simulator version 2 (NS2) is used to implement the CLEA-AODV protocol and evaluate the network performance. The results are compared with the standard AODV, Self-Organization Clustering-GSO (SOC-GSO), and Energy Efficient Neuro-Fuzzy Cluster-based Topology Construction with Meta-Heuristic Route Planning (EENFC-MRP) protocols. The results show that the CLEA-AODV surpasses these protocols in terms of PSR, TP, E2E delay, and PDR. Full article
Show Figures

Figure 1

14 pages, 3735 KiB  
Article
A Microscopic Platoon Stability Model Using Vehicle-to-Vehicle Communication
by Mushtaq Ahmad, Zahid Khan, Anis Koubaa and Wadii Boulila
Electronics 2022, 11(13), 1994; https://doi.org/10.3390/electronics11131994 - 25 Jun 2022
Cited by 5 | Viewed by 2465
Abstract
With Vehicle-to-Vehicle (V2V) communication capability, vehicle platoon on the highway helps to reduce traffic congestion. However, the dynamic nature of vehicles imposes challenges on the V2V-based platoon management. In this paper, by considering the characteristics of a Vehicular Ad-hoc Network (VANET), a microscopic [...] Read more.
With Vehicle-to-Vehicle (V2V) communication capability, vehicle platoon on the highway helps to reduce traffic congestion. However, the dynamic nature of vehicles imposes challenges on the V2V-based platoon management. In this paper, by considering the characteristics of a Vehicular Ad-hoc Network (VANET), a microscopic platoon management scheme is proposed to deal with three basic dynamic platoon maneuvers, namely merging, splitting, and speed-change. The congestion detection feature of VANET is used as a scale for platoon merging, splitting, and speed selection. Real-time congestion is detected if the number of vehicles in a given road segment exceeds the occupancy rate or the time headway is less than the thresholds. In the proposed platoon management scheme, platoon maintenance is triggered in congestion detection. Finally, a VANET-based platoon platform is built by using Network Simulator Version 2 (NS2) network simulation to assess the performance over some real road traces generated by Simulation of Urban MObility (SUMO). It is shown that V2V-based dynamic vehicle platoon management provides an inexpensive technique to cope with the dynamic platoon management requirement. Full article
(This article belongs to the Special Issue Wireless Communication Technology in Intelligent Transport Systems)
Show Figures

Figure 1

30 pages, 873 KiB  
Article
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
by Philokypros P. Ioulianou, Vassilios G. Vassilakis and Siamak F. Shahandashti
J. Cybersecur. Priv. 2022, 2(1), 124-153; https://doi.org/10.3390/jcp2010009 - 9 Mar 2022
Cited by 38 | Viewed by 6767
Abstract
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In this work, we study the impact of the combination of [...] Read more.
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In this work, we study the impact of the combination of rank and blackhole attacks in the IPv6 routing protocol for low-power and lossy (RPL) networks, and we propose a new security framework for RPL-based IoT networks (SRF-IoT). The framework includes a trust-based mechanism that detects and isolates malicious attackers with the help of an external intrusion detection system (IDS). Both SRF-IoT and IDS are implemented in the Contiki-NG operating system. Evaluation of the proposed framework is based on simulations using the Whitefield framework that combines both the Contiki-NG and the NS-3 simulator. Analysis of the simulations of the scenarios under active attacks showed the effectiveness of deploying SRF-IoT with 92.8% packet delivery ratio (PDR), a five-fold reduction in the number of packets dropped, and a three-fold decrease in the number of parent switches in comparison with the scenario without SRF-IoT. Moreover, the packet overhead introduced by SRF-IoT in attack scenarios is minimal at less than 2%. Obtained results suggest that the SRF-IoT framework is an efficient and promising solution that combines trust-based and IDS-based approaches to protect IoT networks against routing attacks. In addition, our solution works by deploying a watchdog mechanism on detector nodes only, leaving unaffected the operation of existing smart devices. Full article
(This article belongs to the Special Issue Cyber-Physical Security for Critical Infrastructures)
Show Figures

Figure 1

24 pages, 842 KiB  
Article
Balancing the Electromagnetic Field Exposure in Wireless Multi-Hop Networks: An EMF-Aware Routing Scheme
by Voichiţa Iancu, Luis Diez, Emil Sluşanschi and Ramón Agüero
Mathematics 2022, 10(4), 668; https://doi.org/10.3390/math10040668 - 21 Feb 2022
Viewed by 1975
Abstract
This work is situated at the conjunction of the fields of distributed systems, telecommunications, and mathematical modeling, aiming to offer solutions to the problem of people’s overexposure to electro-magnetic fields (EMF) radiation. In this paper, we propose a new routing scheme for wireless [...] Read more.
This work is situated at the conjunction of the fields of distributed systems, telecommunications, and mathematical modeling, aiming to offer solutions to the problem of people’s overexposure to electro-magnetic fields (EMF) radiation. In this paper, we propose a new routing scheme for wireless multi-hop networks, which seeks a fairer distribution of the exposure to electromagnetic fields, by leveraging a combination of the transmitted power and the accumulated exposure as a routing metric. We carry out a holistic approach, including: (1) an algorithmic study, (2) an analytical model of the aforementioned novel routing metric, and (3) the specification of a routing protocol. We make a performance assessment of our novel routing protocol and the corresponding algorithm, by means of an extensive simulation campaign over the NS-3 simulator. The obtained results yield that the proposed novel solution is able to not only fairly distribute the exposure, but also to reduce its average value, thus enhancing the user experience. We also show that the power consumption using the EMF-aware proposed solution, based on Cycle Canceling Algorithm (CCA), and that observed with an approach seeking power reduction are alike. Indeed, even if there exist key-differences from the user experience’s point of view between both routing approaches, there is no statistically relevant power increase between them. Thus, our solution manages to keep the consumed power at a low level, and at the same time it reduces the overall nodes’ exposure to EMF. Full article
(This article belongs to the Special Issue Automatic Control and Soft Computing in Engineering)
Show Figures

Figure 1

Back to TopTop