Self-deployment of Mobile Agents in Manets for Military Applications

نویسندگان

  • Cem Şafak Şahin
  • Elkin Urrea
  • M. Umit Uyar
  • Michael Conner
  • Ibrahim Hokelek
  • Christian Pizzo
چکیده

We present bio-inspired computation techniques, such as genetic algorithms, for real-time self-deployment of mobile agents to carry out tasks similar to military applications. Under the harsh and bandwidth limited conditions imposed by military applications, self-spreading of autonomous mobile nodes becomes much more challenging. In our approach, each mobile agent exchanges its genetic information, which is composed of speed and direction encoded in its chromosome (genome), with the neighboring nodes located in its communication range. A genetic algorithm run at the application layer as a software agent is used by each node to decide its next speed and direction among a large number of choices so that the unknown geographical area can be covered uniformly under conditions such as hostile attacks, natural (i.e., mountain, trees, lakes etc.) and man-made obstacles. We implemented a simulation software to quantify the effectiveness of the genetic algorithms under different military operational conditions (e.g., losing assets during an operation, the remaining agents should reposition themselves to compensate the lost in coverage and network connectivity). Metrics including normalized area coverage, deployment time, avoidance from obstacles over an unknown geographical area are used to demonstrate the efficiency of the self-deployment algorithm. The results show that genetic algorithms can be applied to autonomous mobile nodes and be performed as an effective tool for providing a robust solution for network area coverage under restrained communication conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on multicast routing protocols for mobile ad-hoc networks

A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure in an ad-hoc fashion. The majority of applications of MANETs are in areas where rapid...

متن کامل

Modeling availability in tactical mobile ad hoc networks for situational awareness

Mobile ad hoc networks (MANETs) provide a powerful technology to create self-organizing networks of mobile computing devices without existing infrastructures. In tactical deployment scenarios (e.g., disaster area rescue missions or military deployment), significant protection demands arise. To defend MANETs against internal and external attacks on the availability of its internal resources, it ...

متن کامل

Disease Self-management Using Mobile Health Applications: An Overview of Several Diseases, Functions and Effects in Military Forces

Background and Aim: Telematics, or new electronic health media, is a growing topic that is becoming a major improvement in patients' lives, especially for the elderly, disabled, and chronically ill. In this context, mobile health provides healthcare services and overcomes geographical, time, and even organizational barriers. In this review, we examine the services and applications of mobile hea...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Data Confidentiality in Mobile Ad hoc Networks

Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy confi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009