Lou et al., 2015 - Google Patents
An anti-jamming routing selection criteria based on the cross-layer constraints of channel state information for MANETsLou et al., 2015
- Document ID
- 14800408242195227779
- Author
- Lou L
- Fan J
- Publication year
- Publication venue
- 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
External Links
Snippet
MANETs are a high adaptable solution to military and emergency services scenarios, where the schemes are of rapid deployment and maintaining connectivity even in complex radio propagation and jamming environments. To apply it in the tactical or emergency services …
- 230000005540 biological transmission 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
- H04W40/14—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/023—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/025—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chakchouk | A survey on opportunistic routing in wireless communication networks | |
KR101143654B1 (en) | Method and system for routing traffic in ad hoc networks | |
US6973039B2 (en) | Mechanism for performing energy-based routing in wireless networks | |
Hong et al. | DAG-based multipath routing for mobile sensor networks | |
Zhu et al. | Achieving efficient flooding by utilizing link correlation in wireless sensor networks | |
Van Phuong et al. | Transmission time-based mechanism to detect wormhole attacks | |
Rajakumari et al. | Improvising packet delivery and reducing delay ratio in mobile ad hoc network using neighbor coverage‐based topology control algorithm | |
Hayajneh et al. | Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks | |
Zhao et al. | Modeling link correlation in low-power wireless networks | |
Benzerbadj et al. | Cross-layer greedy position-based routing for multihop wireless sensor networks in a real environment | |
Biswas | Redundancy-based Approaches in Wireless Multihop Network Design | |
Zhao et al. | Caor: Context-aware adaptive opportunistic routing in mobile ad-hoc networks | |
Hossain et al. | Neighbour-disjoint multipath for low-power and lossy networks | |
Koneri Chandrasekaran et al. | Primary path reservation using enhanced slot assignment in TDMA for session admission | |
Lou et al. | An anti-jamming routing selection criteria based on the cross-layer constraints of channel state information for MANETs | |
Son et al. | Self‐adaptive proactive routing scheme for mobile ad‐hoc networks | |
Manjula et al. | An energy-efficient routing technique for privacy preservation of assets monitored with WSN | |
Katiravan et al. | Energy efficient link aware routing with power control in wireless ad hoc networks | |
Lee et al. | Solicitation-based forwarding for sensor networks | |
Padyal et al. | Continuous neighbour discovery approach for improvement of routing performance in WSN | |
Lohith et al. | Link peek: A link outage resilient ip packet forwarding mechanism for 6lowpan/rpl based low-power and lossy networks (llns) | |
Azer et al. | Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme | |
Dutta et al. | Specification based IDS for camouflaging wormhole attack in OLSR | |
Aijaz et al. | Enhancing RPL for cognitive radio enabled machine-to-machine networks | |
Lou et al. | High Reliable Routing Protocol Based on the Cross-Layer Constraints of Channel State Association Information for MHWNs |