Learn More
Few techniques for guaranteeing a network lifetime have been proposed despite its great impact on network management. Moreover, since the existing schemes are mostly dependent on the combination of disparate parameters, they do not provide additional services, such as real-time communications and balanced energy consumption among sensor nodes; thus, the(More)
Typical mobile P2P protocols largely relied on inflexible techniques such as, flooding, replicating, random walks and selective forwarding to route queries and discover objects of interest, which incur a relatively high search time due to remarkable network traffic, multiple copies and duplication of query messages. Recently proposed P2P protocols are able(More)
Due to the stringent energy constraint wireless "s, network management cost for lifetime becomes" "sensor node" "one of the crucial issues in designing wireless sensor networks (WSNs). In such situation, guaranteed network lifetime is more preferred than unpredictable pro-long one. However, despite of its importance and necessity in real world deployment,(More)
Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products or smart things connected to the internet. It is a new and fast developing market which not only connects objects and people but also billions of gadgets and smart devices. With the rapid growth of IoT, there is also a steady increase in security vulnerabilities of(More)
Due to the disparity between the peer-to-peer (P2P) and the physical networks, we study the challenging problems of mobile routing in unstructured P2P networks over mobile ad hoc networks (MANETs). To route queries and objects of interest, the existing mobile P2P protocols widely adopted an inflexible techniques which experience a relatively high delivery(More)
Routing in previous research works for bounded delay in Delay-Tolerant Networks (DTNs) tried their best to impose bounded delay on the message delivery. However, the existing routing protocols had a lot of issues due to the infinite buffer size and bandwidth assumption, where these resources are limited in realistic environment. In this paper, we modify and(More)