نتایج جستجو برای: mobile anchor node
تعداد نتایج: 343616 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) usually employ different ranging techniques to measure the distance between an unknown node and its neighboring anchor nodes, and based on the measured distance to estimate the location of the unknown node. In its operation, a range-based localization scheme uses either trilateration or multilateration algorithms to obtain such range information. To trim down the...
This paper presents a secure authentication method for Mobile IPv6. As a default IPsec is used for secure signaling messages between the Mobile Node and other agents in Mobile IPv6 networks. Mobile IPv6 message transactions include the Binding Updates and Acknowledgement messages as well. We propose a new mechanism for securing Mobile IPv6 signaling between Mobile Node and other agents. The pro...
A coalitional game is residential to study the actions of the rational mobile nodes for supportive packet delivery. We consider the problem of supportive packet delivery to mobile nodes in a cross wireless mobile network, where both wired and wireless network communications are used. A group of mobile nodes makes a conclusion to join or to leave a coalition based on their creature payoffs . The...
The interactions of Received Signal Strength Indicator (RSSI) with the environment are very difficult to be modeled, inducing significant errors in RSSI-range models and highly disturbing target localization and tracking methods. Some techniques adopt a training-based approach in which they off-line learn the RSSI-range characteristics of the environment in a prior training phase. However, the ...
Fast Mobile IPv6 requires that a Fast Binding Update is secured using a security association shared between an Access Router and a Mobile Node in order to avoid certain attacks. In this document, a method for provisioning a shared key from the Access Router to the Mobile Node is defined to protect this signaling. The Mobile Node generates a public/private key pair using the same public key algo...
Technology can play a significant role in the management and coordination activities of special operations such as emergency response, military combat missions, forest firefighting, etc. Mobile ad hoc networks (MANETs) can be used quite effectively to manage resource sharing in such operations due to their flexibility and ease of establishment. The concept of service discovery has some appealin...
We propose Otiy, a node-centric location service that limits the impact of location updates generate by mobile nodes in IEEE 802.11-based wireless mesh networks. Existing location services use node identifiers to determine the locator (aka anchor) that is responsible for keeping track of a node’s location. Such a strategy can be inefficient because: (i) identifiers give no clue on the node’s mo...
Localization is a mandatory requirement in almost all sensor network applications. In order to avoid power-hungry GNSS solutions like GPS, alternative localization algorithms based on anchor nodes are developed. Unfortunately, many proposed solutions focus on static networks and do not account for mobility. An often cited and further improved approach is Monte Carlo Localization (MCL), which is...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید