Distributed lifetime coverage optimization protocol in wireless sensor networks

AK Idrees, K Deschinkel, M Salomon… - The journal of …, 2015 - Springer
One of the main research challenges faced in Wireless Sensor Networks (WSNs) is to
preserve continuously and effectively the coverage of an area (or region) of interest to be …

Dispersed computing for tactical edge in future wars: vision, architecture, and challenges

H Yang, G Li, GY Sun, JX Chen, X Meng… - Wireless …, 2021 - Wiley Online Library
In the future, the tactical edge is far away from the command center, the resources of
communication and computing are limited, and the battlefield situation is changing rapidly …

[PDF][PDF] Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET.

J Shanthini, P Punitha, S Karthik - Computer Systems Science & …, 2023 - cdn.techscience.cn
In today's Internet routing infrastructure, designers have addressed scaling concerns in
routing constrained multiobjective optimization problems examining latency and mobility …

[PDF][PDF] An improved hybrid technique for energy and delay routing in mobile ad-hoc networks

MH Hassan, RC Muniyandi - International Journal of Applied …, 2017 - researchgate.net
A mobile ad-hoc network (MANET) comprises wireless mobile nodes that dynamically
establish a temporary network without needing a central administration or an infrastructure …

Vehicular fog computing: challenges applications and future directions

VG Menon, J Prathap - International Journal of Vehicular Telematics …, 2017 - igi-global.com
Abstract In recent years Vehicular Ad Hoc Networks (VANETs) have received increased
attention due to its numerous applications in cooperative collision warning and traffic alert …

Identity attack detection system for 802.11-based ad hoc networks

M Faisal, S Abbas, H Ur Rahman - EURASIP Journal on Wireless …, 2018 - Springer
Due to the lack of centralized identity management and the broadcast nature of wireless ad
hoc networks, identity attacks are always tempting. The attackers can create multiple …

A self organising aerial ad hoc network mobility model for disaster scenarios

J Sánchez-García, JM García-Campos… - … on developments of …, 2015 - ieeexplore.ieee.org
Mobile Ad Hoc Networks have been envisioned as an appealing networking approach to be
applied in disaster scenarios. The main reason is that they can be rapidly deployed over …

Implementing a broadcast storm attack on a mission-critical wireless sensor network

I Krivtsova, I Lebedev, M Sukhoparov… - Wired/Wireless Internet …, 2016 - Springer
In this work, we emphasize the practical importance of mission-critical wireless sensor
networks (WSNs) for structural health monitoring of industrial constructions. Due to its …

Connected vehicular transportation: Data analytics and traffic-dependent networking

C Chen, TH Luan, X Guan, N Lu… - IEEE vehicular …, 2017 - ieeexplore.ieee.org
With onboard operating systems becoming increasingly common in vehicles, the realtime
broadband infotainment and intelligent transportation system (ITS) service applications in …

[PDF][PDF] 融合MEC 的星地协同网络: 架构, 关键技术与挑战

唐琴琴, 谢人超, 刘旭, 张亚生, 何辞… - Journal on …, 2020 - infocomm-journal.com
在星地协同网络中引入移动边缘计算(MEC) 技术可有效提高用户体验质量和减少网络冗余流量,
同时也带来了一些挑战. 首先介绍了星地协同网络和MEC 技术的基本架构, 并讨论了在星地协同 …