VRSense: Validity region sensitive query processing strategies for static and mobile point-of-interests in MANETs

نویسندگان

  • Byungkwan Jung
  • Sunho Lim
  • Jinseok Chae
  • Cong Pu
چکیده

Querying any point-of-interest (POI) in anywhere is a major part of location-based services (LBS) and has been applied to diverse wireless and/or mobile networks for realizing seamless services and mobile and ubiquitous computing. In particular, designing an efficient query processing scheme is admittedly challenging in mobile ad hoc networks (MANETs) because of the lack of centralized coordination, limited computing and communication capabilities, and time-varying network topologies. In this talk, we explore a set of query processing strategies based on a validity region to efficiently update the freshness of the queried POI and reduce the query traffic in MANETs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Advanced Query Processing in Mobile Ad Hoc Networks

At the early stage of mobile ad hoc networks (MANETs) research, most studies focused on routing protocols to support communications among mobile nodes connected to each other by one-hop/multi-hop links. However, in many MANET applications, mobile nodes share data with each other and access data held by other mobile nodes. Typical examples are collaborative rescue operations at a disaster site, ...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 116  شماره 

صفحات  -

تاریخ انتشار 2018