The State of Simulation Tools for P2P Networks on Mobile Ad-Hoc and Opportunistic Networks

被引:0
|
作者
Cheraghi, Ahmad [1 ]
Amft, Tobias [1 ]
Sati, Salem [1 ]
Hagemeister, Philipp [1 ]
Graffi, Kalman [1 ]
机构
[1] Heinrich Heine Univ Dusseldorf, Technol Social Networks, Dusseldorf, Germany
来源
2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN) | 2016年
关键词
FRAMEWORK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During the Arab spring and other states of political turbulences, the access to selected servers of large communication sites and even the country-wide internet infrastructure has often been affected by enforced censorship and limited the possible communication tools. In order to overcome this censorship a full mobile decentralized network seems to be a viable option. Even though, through the strong dynamism in this decentralized mobile network, future threats, namely intermittent connectivity, changing topologies, and unreliable end nodes may occur. To handle these threats and to provide the desired functionality, self-organized protocols are necessary. This paper presents a survey on the current status of simulation tools for peer-to-peer (P2P), Opportunistic Networks (OppNet), and Mobile Ad Hoc Networks (MANET) with the aim to identify a suitable evaluation tool that is capable for combining these three networks and for simulating decentralized mobile networks. This combination will allow us to create a fully decentralized and self-organized system which cannot be blocked e.g. through the influences of political parties.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Trust-based minimum cost opportunistic routing for Ad hoc networks
    Wang Bo
    Huang Chuanhe
    Li Layuan
    Yang Wenzhong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2107 - 2122
  • [22] Cooperative Distributed UDDI (dUDDI) Architecture for P2P Service Networks
    Paul, P. Victer
    Shankar, Achyut
    Jayakumar, L.
    Khapre, Shailesh
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (04) : 2793 - 2821
  • [23] A New Incentive Policy for Improving Data Service in P2P Networks
    Zhang, Qicong
    Zhu, Ligu
    Yang, Xiaoshan
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (01) : 231 - 245
  • [24] A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
    Xenakis, Christos
    Panos, Christoforos
    Stavrakakis, Ioannis
    COMPUTERS & SECURITY, 2011, 30 (01) : 63 - 80
  • [25] A critical review of quality of service models in mobile ad hoc networks
    Bouchama, Nadir
    Aissani, Djamil
    Djellab, Natalia
    Nouali-Taboudjemat, Nadia
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (01) : 49 - 70
  • [26] Regression-based trust model for mobile ad hoc networks
    Venkataraman, R.
    Pushpalatha, M.
    Rao, T. Rama
    IET INFORMATION SECURITY, 2012, 6 (03) : 131 - 140
  • [27] Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach
    Zheng, Dong
    Ge, Weiyan
    Zhang, Junshan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (01) : 205 - 222
  • [28] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
    Manivannan, D.
    Moni, Shafika Showkat
    Zeadally, Sherali
    VEHICULAR COMMUNICATIONS, 2020, 25
  • [29] XML based Wireless Patient Monitoring System using Vehicular Ad-Hoc Networks
    Malhi, Avleen Kaur
    Batra, Shalini
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1088 - 1095
  • [30] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296