scholarly journals Power-saving Asynchronous Quorum-based Protocols for Maximal Neighbour Discovery

2020 ◽  
Vol 4 (3) ◽  
pp. 42-60
Author(s):  
Mehdi Imani ◽  
Maaruf Ali ◽  
Hamid R. Arabnia

The discovery of neighbouring active nodes is one of the most challenging problems in asynchronous ad hoc networks. Since time synchronization is extremely costly in these networks, application of asynchronous methods like quorum-based protocols have attracted increased interest for their suitability. This is because Quorum-based protocols can guarantee that two nodes with differing clock times have an intersection within at least one timeslot. A higher neighbour discovery rate of active nodes is desired, but it also results in a higher active ratio and consequently and adversely more overall power consumption of the nodes and a shorter network lifetime. There must be a trade-off between extensive neighbour discovery and active ratio in order to design high-performance and efficient protocols. In this paper, two novel asynchronous quorum-based protocols to maximize the neighbour discovery and minimize the active ratio have been designed and presented. A new metric (Quorum Efficiency Ratio: QER) has also been designed to evaluate and compare the performance of quorum-based protocols in terms of their neighbour discovery (the Expected Quorum Overlap Size: EQOS) and the active ratio. The EQOS has been theoretically derived, along with the Active Ratio and the QER values for the proposed novel protocols and the other contemporary protocols. Finally, the proposed methods have been evaluated and compared against the other methods based on the current metrics and the new metric.

2012 ◽  
Vol 6-7 ◽  
pp. 913-918 ◽  
Author(s):  
Ji Zhi Wang ◽  
Ying Long Wang ◽  
Shu Jiang Xu

Many authentication protocols in ad hoc networks are identity based, which means that in order for one node to trust another, it needs to know the other node’s identity. Hence there exists an inherent trade-off between trust and anonymity. We propose an anonymous authentication scheme, where each node, instead of using its real identity, generates a dynamic pseudonym using a one-way hash function. With the help of a CA offline, the scheme can realize the authentication procedure based on discrete logarithms problem. We analyze the security and the anonymity in the scheme, which shows that it is very valid.


2016 ◽  
Vol 2 (9) ◽  
Author(s):  
Ravi Prakash Malviya ◽  
Achint Chugh

The time synchronization procedure is very important for power saving in wireless ad hoc network and  method used by the synchronization that method chooses a particular node and gives priority for transmitting a signal to that node. All the Other nodes synchronize to the selected node according to Time Synchronization Function. Here increasing research focus on designing synchronization algorithms specifically for sensor networks. This paper look for reviews of  time synchronization problem and the need for synchronization in sensor networks, then presents in detail time synchronization methods explicitly designed and proposed for sensor networks and AD-HOC networks.


2013 ◽  
Vol 3 (1) ◽  
pp. 20 ◽  
Author(s):  
Dalia Elewely ◽  
Marwa Areed ◽  
Hesham Ali

Ad-hoc networks consist of a set of mobile nodes with a restricted power supply resources that can communicate with each other without any established infrastructure or centralized administration. The loss of some nodes may cause significant topological changes, undermine the network operation, and affect the lifetime of the network. This paper discusses the energy consumption problem and summaries the existing power saving techniques in ad-hoc wireless networks. The main objective of this paper is to introduce a new power aware multi-path node disjoint routing scheme based on the Dynamic Source Routing protocol (DSR), which can prolong MANETs lifetime, reduce routing delay and increase the reliability of the packets reaching its destination. Therefore, a comprehensive study of DSR protocol has been drawn using NS-2 simulator, to evaluate the performance of DSR as a routing strategy and investigate its efficiency in saving wireless networks resources, as a prelude to avoid its performance shortcomings in our proposed routing scheme. Keywords: Power aware protocol, node disjoint, network simulation 2, multipath routing, Dsr protocol, ad-hoc network.


2020 ◽  
Vol 1 (1) ◽  
pp. 7-14
Author(s):  
Chen Chao ◽  
Liang Jun ◽  
Sun Xin

Mobile ad hoc networks use the wireless network and have wider applications especially in emergency situation, military combat zones, and the mobility vehicles. The mobile ad hoc network especially poses the problem of security and efficiency as the network is often subject to internal and external attacks. To overcome such problems, different protocols are proposed. In this study, an improved protocol is proposed which makes use of hexacol cluster method and thus provide greater efficiency and security to the network. For validating the proposed method, a stimulation was performed and results were compared with other protocols. The results indicate that the proposed method showed improved performance compare to the other protocol.


Sign in / Sign up

Export Citation Format

Share Document