Mobile ad-hoc networks: a new stochastic second-order cone programming approach
نویسندگان
چکیده
Mobile ad-hoc networks: a new stochastic second-order cone programming approach Serie Ricerca Mobile ad-hoc networks: a new stochastic second-order cone programming approach Abstract. We study the semidefinite stochastic location-aided routing (SLAR) model described in Ariyawansa and Zhu (2006) [2] and in Zhu, Zhang, and Patel (2007) [16]. We propose a modification of their model to exploit the stochasticity inherent in the destination node movements. We formulate the problem as a two-stage stochastic second-order cone programming (SSOCP), see Alizadeh and Goldfarb (2003) [1], where the first-stage decision variables include both the position of the destination node and its distance from the sender node. Destination node movements are represented by ellipsoid scenarios defined in a neighborhood of the starting position and generated by uniform and normal disturbances. The MOSEK solver (under GAMS environment) allows to solve problems with a large number of scenarios (say 20250) versus the DSDP (under MATLAB framework) solver, see Benson, Ye and Zhang (2000) [4], adapted to stochastic programming framework with 500 scenarios. Stability results for the optimal first-stage solutions and for the optimal function value are obtained.
منابع مشابه
Stochastic Second-Order Cone Programming in Mobile Ad Hoc Networks
We propose a two-stage stochastic second-order cone programming formulation of the semidefinite stochastic location-aided routing (SLAR) model, described in Ariyawansa and Zhu (Q. J. Oper. Res. 4(3), 239–253, 2006). The aim is to provide a sender node S with an algorithm for optimally determining a region that is expected to contain a destination node D (the expected zone). The movements of the...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملEstimating Reliability in Mobile ad-hoc Networks Based on Monte Carlo Simulation (TECHNICAL NOTE)
Each system has its own definition of reliability. Reliability in mobile ad-hoc networks (MANET) could be interpreted as, the probability of reaching a message from a source node to destination, successfully. The variability and volatility of the MANET configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate. It is because, no single structure or configurat...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009