Abstract

Ad Hoc networks are a type of mobile wireless networks composed of mobile and stationary nodes which are moving freely and independently or they are stable. Setting up Ad Hoc networks is very simple and as these networks do not need a standard fixed infrastructure and central legal license, their setting up cost is very low. So, in specials, temporary or short-term situations such as flood, earthquake and fire as well as in military environments where all telecommunication platforms are destroyed, these networks are used as a new solution for creating communications between network elements. As Ad Hoc networks have a limited energy and nodes are continuously displacing, consequently, the accuracy of these networks is important. Nodes can be easily added to the network at any time or leave the network. It not only leads to easy creation of a network and its fast, easy and low-cost expansion, but also makes it possible for an enemy to enter the network. Therefore, the security of these networks must also be considered. In this paper, using a new method and imposing limitations on some network nodes, we created a more reliable network with higher accuracy and security.

Highlights

  • IntroductionThe first Ad Hoc network was created by DARPA [1]

  • Ad Hoc networks were created for military reasons more than 70 years ago

  • The rest of the paper is organized as follows: In section 2, we will propose a concept called forwarding a virtual package by which the relative accuracy and security of some new nodes can be evaluated with no problem

Read more

Summary

Introduction

The first Ad Hoc network was created by DARPA [1]. Ad Hoc means “only purpose for this” This term is usually used where the solution of a special problem or taking a special responsibility is considered. Because all networks in the area under the coverage of the Ad Hoc network are aware of each other’s existence and can communicate with each other [4], [5]. It is like implementing a physical network based on the mesh topology.

Forwarding a virtual package
Backbone
Reliability of backbone nodes
Accuracy
Backbone nodes connections
Different types of messages received by the destination node
F: Signal frequency D
Imposing limitations for enhancing the network’s accuracy and security
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call