Learn More
— Existing routing and broadcasting protocols for ad hoc networks assume an ideal physical layer model. We apply the log normal shadow fading model to represent a realistic physical layer and use the probability p(x) for receiving a packet successfully as a function of distance x between two nodes. We define the transmission radius R as the distance at(More)
FID (radio frequency identification) is a means of storing and retrieving data through electromagnetic transmission using a radio frequency (RF)-compatible integrated circuit. Today, RFID is applied widely in supply-chain tracking, retail stock management, parking access control, library book tracking, marathon races, airline luggage tracking, electronic(More)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization(More)
The designers of network layer protocols for ad hoc and sensor networks assume the unit disk graph (UDG) communication model, where two nodes communicate if and only if they are within distance R, where R is the transmission radius, equal for all nodes. Almost all articles even use R as the independent variable in their simulations. While the protocols at(More)
—Recently proposed beaconless georouting algorithms are fully reactive, with nodes forwarding packets without prior knowledge of their neighbors. However, existing approaches for recovery from local minima can either not guarantee delivery or they require the exchange of complete neighborhood information. We describe two general methods that enable(More)
Beaconless georouting algorithms are fully reactive and work without prior knowledge of their neighbors. However, existing approaches can either not guarantee delivery or they require the exchange of complete neighborhood information. We describe two general methods for completely reactive face routing with guaranteed delivery. The Beaconless Forwarder(More)
—We propose a new decentralized access control scheme for secure data storage in clouds, that supports anonymous authenti-cation. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt(More)
A wireless sensor network (WSN) is a large-scale ad hoc multi-hop network deployed (usually, at random) in a region of interest for surveillance purpose. One of its fundamental tasks is to gather sensor readings from the sensory field at data sinks. Research has shown that sensors near a sink deplete their battery power faster than those far apart due to(More)
Vehicular networks are envisioned for large scale deployment, and standardization bodies, car manufacturers and academic researchers are solving a variety of related challenges. After a brief description of intelligent transportation system architectures and the main already-established low-level standards, this tutorial elaborates on four particular(More)