Abstract

Recent developments in mobile and wireless networks have paved the way for them to become a fabric of society and the economy. The ever-increasing penetration rate of mobile telephony and wireless broadband data access, and the ubiquity of WiFi are just a few examples of this phenomenon. While multihop wireless networks (e.g., WiMax, LTE-A, ad hoc, sensor, and mesh networks) offer many advantages, such as enhanced capacity, extended communication range, deployment, and operational flexibility, they usually lack provisioning for network robustness and do not, in general, withstand network equipment failures. Network failures may have drastic effects on network performance and hinder network operation. The capability of a network to deliver data successfully in a timely manner and continue its services despite the presence of failures and attacks is referred to as survivability, which is an important system design and operational characteristic that must be provisioned.

Highlights

  • Recent developments in mobile and wireless networks have paved the way for them to become a fabric of society and the economy

  • While multihop wireless networks (e.g., WiMax, LTE-A, ad hoc, sensor, and mesh networks) offer many advantages, such as enhanced capacity, extended communication range, deployment, and operational flexibility, they usually lack provisioning for network robustness and do not, in general, withstand network equipment failures

  • The invited article ‘‘MDBV: Monitoring data batch verification for survivability of Internet of Vehicles,’’ authored by Liu et al, proposed a monitoring data batch verification scheme based on an improved certificate less aggregate signature for the Internet of Vehicles (IoV)

Read more

Summary

Introduction

Recent developments in mobile and wireless networks have paved the way for them to become a fabric of society and the economy. IEEE ACCESS SPECIAL SECTION EDITORIAL: SURVIVABILITY STRATEGIES FOR EMERGING WIRELESS NETWORKS The articles address wireless network design, architecture, algorithms, and protocols for existing and prospective applications that require a survivable operation.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.