We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,992 results
  1. Game Theory-Based Efficient Message Forwarding Scheme for Opportunistic Networks

    In order to efficiently transmit data packets, this paper proposes a method known as GT-EMFT for game-theoretic efficient message forwarding in...
    Vinesh Kumar, Jagdeep Singh, ... Isaac Woungang in Advanced Information Networking and Applications
    Conference paper 2024
  2. An online approach for cooperative cache updating and forwarding in mobile edge network

    The proliferation of technological advancement in the Internet of Things (IoT) and mobile devices accelerates the need for latency-sensitive...

    Manoj Kumar Somesula, Banalaxmi Brahma, ... Sai Krishna Mothku in Wireless Networks
    Article 06 May 2024
  3. Node Authentication and Trust-Aware Secure Routing in NDN-IoT Empowered Savvy City Applications

    The emergence of the Internet of Things (IoT) technology leads to significant growth in the development of smart urban regions. IoT connects the...

    Bharati Patil, D. Vydeki in Wireless Personal Communications
    Article 01 August 2023
  4. Probabilistic cooperative coded forwarding for broadcast transmissions in industrial mobile edge communications

    Mobile edge computing (MEC) is considered as a key enabler for the industrial internet of things (IIoT) to cope with the ever-increasing...

    Wenjun Huang, Xu Li, Yanan Liang in EURASIP Journal on Wireless Communications and Networking
    Article Open access 13 June 2022
  5. Efficient time-delay attack detection based on node pruning and model fusion in IoT networks

    IoT devices are vulnerable to various attacks because they are resource-limited. This paper introduces a novel type of attack called time-delay...

    Wenjie Zhao, Yu Wang, ... Yulei Liu in Peer-to-Peer Networking and Applications
    Article 30 March 2023
  6. A Comprehensive Confirmation-based Selfish Node Detection Algorithm for Socially Aware Networks

    Data transmission in socially aware networks is usually accomplished through opportunistic peer-to-peer links in a storage-carry-forward way. This...

    Zenggang **ong, **ang Li, ... Mingyang Zeng in Journal of Signal Processing Systems
    Article 29 April 2023
  7. Routing protocols based on node selection for freely floating underwater wireless sensor networks: a survey

    Recently, there has been an increasing interest in monitoring and exploring the underwater environment for scientific applications such as...

    Ghida Jubran Alqahtani, Fatma Bouabdallah in EURASIP Journal on Wireless Communications and Networking
    Article Open access 29 November 2023
  8. DTN-Balance: A Forwarding-Capacity and Forwarding-Queue Aware Routing for Self-organizing DTNs

    In delay-tolerant networks (DTNs), intermittent network connectivity and lack of global system information pose serious challenges to achieve...

    Weitao Wang, Yuebin Bai, ... Jianpei Tantai in Wireless Personal Communications
    Article 13 February 2021
  9. Energy Efficient Lightweight Scheme to Identify Selective Forwarding Attack on Wireless Sensor Networks

    To protect wireless sensor networks from selective forwarding attacks, a lightweight WSN selective forwarding attack detection technique (LSFAD) is...
    Malik Jawarneh, M. Jayakrishna, ... J. Armstrong Joseph in Intelligent Computing and Networking
    Conference paper 2023
  10. Time-Based Ray Tracing Forwarding in Dense Nanonetworks

    Wireless nanonetworks, consisting of nodes of nanometric size, are an emerging technology with various applications, such as in medicine,...
    Eugen Dedu, Masoud Asghari in Advanced Information Networking and Applications
    Conference paper 2023
  11. Metric-Oriented Comparison of Selective Forwarding Attack Detection Techniques in IoT-Based Systems

    The Internet of Things (IoT) is an innovative technology nowadays due to its broad variety of applications in industrial and consumer markets. Secure...
    Nidhi Sinha, Alekha Kumar Mishra in Advances in Distributed Computing and Machine Learning
    Conference paper 2023
  12. RAPAR: Routing algorithm based on node relationship mining in opportunistic network

    Information-assisted routing algorithms improve the performance of mobile opportunistic networks (MONs), where node utility and packet redundancy are...

    Peiyan Yuan, Saike Shao, **aoyan Huang in Peer-to-Peer Networking and Applications
    Article 18 May 2022
  13. A Local Betweenness Centrality Based Forwarding Technique for Social Opportunistic IoT Networks

    Social Opportunistic IoT (Social OppIoT) networks is a subclass of Social Internet of Things (SIoT) networks. In social OppIoT, users perform...

    Ritu Nigam, Deepak Kumar Sharma, ... Gautam Srivastava in Mobile Networks and Applications
    Article 09 September 2021
  14. Location-Based Clustering Approach for Next-Hop Selection in Opportunistic Networks

    Opportunistic network (OppNet) is a subset of Mobile Ad hoc Networks (MANETs) and a kind of Delay Tolerant Network (DTN), formed by wirelessly...
    Conference paper 2024
  15. WBNN: a weight-based next neighbor selection algorithm for wireless body area network

    Wireless body area networks (WBANs) play a pivotal role in monitoring body movements and collecting crucial health metrics such as blood pressure,...

    Yuejuan **g, Han Peng, Zhouzhou Liu in Soft Computing
    Article 27 December 2023
  16. Comparative analysis of probabilistic forwarding strategies in ICN for edge computing

    Named data networking (NDN) is a promising future network architecture in 5G edge computing scenarios because it supports multicast, mobility,...

    Meimei Zhang, Jun Luo, ... Kai Lei in Peer-to-Peer Networking and Applications
    Article 20 August 2021
  17. Probabilistic Forwarding in Named Data Networks for Internet of Things

    Named Data Networking (NDN) is a promising networking architecture for the emergent Internet of Things (IoT). Nevertheless, NDN mechanisms, such as...
    Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey in Modelling and Implementation of Complex Systems
    Conference paper 2023
  18. LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks

    Named Data Networking (NDN) is a data-driven networking model that proposes to fetch data using names instead of source addresses. This new...

    Adel Djama, Badis Djamaa, ... Nabil Khemache in Annals of Telecommunications
    Article 14 July 2021
  19. A Planar Checkpoints-Based Approach for Geographic Forwarding on Always-on Sensors

    This chapter addresses the problem of energy-efficient data forwarding in wireless sensor networks. It presents our solution to this problem for...
    Chapter 2023
  20. Node importance Evaluation Model of Opportunistic Network Based on Improved Graph Neural Network

    In order to improve the node importance evaluation effect of the opportunistic network, this paper applies the improved graph neural network to the...

    Article 29 August 2023
Did you find what you were looking for? Share feedback.