Tag Archive: 'ns3 example'

A design of contract-oriented sensor application platform

As miniaturized and high functional sensor devices like smartphones have spread, we can utilize large amounts of sensing data gathered from these devices. Participatory sensing is one of modern sensor-based application models in which users provide their sensing data including their personal data as well as get services. Current models, however, have limitations on flexible data flow based […]

Online Social Networks Privacy Study Through TAPE Framework

While personal information privacy is threatened by online social networks, researchers are seeking for privacy protection tools and methods to assist online social network users. In this paper, we propose a Trust-Aware Privacy Evaluation framework, called TAPE, aiming to address this problem. Under the TAPE framework we investigate how to quantitatively evaluate the privacy risk, as a function of people’s […]

Bayesian social learning in linear networks of agents with random behavior

In this paper, we consider the problem of social learning in a network of agents where the agents make decisions onK hypotheses sequentially and broadcast their decisions to others. Each agent in the system has a private observation that is generated by one of the hypotheses. All the observations are independently generated from the same hypothesis. We study a […]

Crowd-Sensing Meets Situation Awareness: A Research Roadmap for Crisis Management

When disaster strikes, human lives may depend upon emergency organizations’ rapid establishment of Situation Awareness (SAW) to take the appropriate decisions and actions. Recently, systems emerged, enabling humans to act as crowd sensors contributing valuable crisis information via mobile devices through social media channels. This should allow enhancing situational pictures gained through traditional SAW systems, as employed in control […]

Privacy-preserving relative location based services for mobile users

Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS, AGPS, etc. However, all the existing applications gather users’ geographical data and transfer them into the pertinent information to give meaning and value. For this kind of solutions, the user’s privacy and security issues might […]

Wireless sensor network: Routing protocols and attacks- a survey

Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though […]

OPEED: Optimal energy-efficient neighbor discovery scheme in opportunistic networks

In opportunistic networks, it is difficult to predict when a node encounters others and how long it keeps in contact with another. Nodes continually attempt to explore neighbor nodes in the vicinity to transmit data. In battery-operated devices, this persistent exploration consumes a great deal of energy. In this paper, we propose an optimal energy-efficient […]

A Quasigroup based cipher algorithm for Ad-Hoc wireless networks

Security is the main concern in today’s wireless network environment. However, cipher algorithms consume a lot of resources to provide the required confidentiality. Ad-Hoc wireless networks are one area where the devices are extremely resource constrained. Therefore computationally simple yet cryptographically strong cipher algorithms are required for such kind of networks. In this paper a […]

Efficient dynamic caching for geocast routing in VANETs

Virtual warning system which is an integral component of Intelligent Transportation System (ITS) can be realized through geocasting in vehicular ad-hoc networks (VANETs). It enhances road safety and security by targeting a group of vehicles within a specified geospatial region, called Zone of Interest (ZOI) rather than an individual vehicle. Velocity of the node and […]

On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks

This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of ns multicast sessions. Each multicast session has one source and p destinations. Each source sends identical information to the p destinations in its multicast session, and the information is required to be delivered to […]