Academic literature on the topic 'FLOODING CONTROL PROTOCOL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FLOODING CONTROL PROTOCOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "FLOODING CONTROL PROTOCOL"

1

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol
APA, Harvard, Vancouver, ISO, and other styles
2

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads,
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Full text
Abstract:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results,
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Full text
Abstract:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between n
APA, Harvard, Vancouver, ISO, and other styles
5

Prabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Full text
Abstract:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless se
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Full text
Abstract:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper
APA, Harvard, Vancouver, ISO, and other styles
7

Shams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Full text
Abstract:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmen
APA, Harvard, Vancouver, ISO, and other styles
8

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prov
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, et al. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Full text
Abstract:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of eac
APA, Harvard, Vancouver, ISO, and other styles
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (2022): 6150. http://dx.doi.org/10.3390/app12126150.

Full text
Abstract:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DD
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "FLOODING CONTROL PROTOCOL"

1

Hussein, Abedellatif Mohammed. "Flooding control in route discovery for reactive routing in mobile ad hoc networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KUMAR, S. P. AJITH. "ROUTING AND CONGESTION CONTROL IN OPPORTUNISTIC NETWORKS." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14606.

Full text
Abstract:
ABSTRACT Opportunistic networks are one of the most interesting evolutions of MANETs. Mobile nodes are enabled to communicate with each other in opportunistic networks even if there is no route to connect them. Also, nodes are not having knowledge about the network topology, which (instead) is necessary in MANET routing protocols. In this network routes are building dynamically, whenever messages are en route between the sender and the destination(s), and any potential node can be opportunistically used as the next hop, provided it is bringing the message nearer to the destination. Th
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "FLOODING CONTROL PROTOCOL"

1

Al-Na'amneh, Qais, Walid Dhifallah, Rahaf Hazaymih, et al. "DIS Flooding Attack Impact in RPL-Based 6LowPAN Network." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7540-2.ch004.

Full text
Abstract:
Networks that use RPL are vulnerable to security concerns called RPL flood attacks. The IPv6 Routing Protocol for Low-Power and Lossy Networks mitigation technique Secure-RPL is proposed in this study to effectively identify and prevent DIS flooding attacks with minimal overhead. Malicious nodes overload available resources, obstruct communication, and impede data transfer, which may result in performance issues and service outages. It is essential to use countermeasures like message filtering and intrusion detection systems. This chapter shows that the DIS flooding assault increases the netwo
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Bahadili, Hussein, Abdel Rahman Alzoubaidi, and Ali Al-Khalidi. "Comparing Various Route Discovery Algorithms in Ad Hoc Wireless Networks." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch010.

Full text
Abstract:
Dynamic (reactive or on-demand) routing protocols used in wireless ad hoc networks suffer from transmitting a huge number of control packets during the route discovery phase of the protocols, which increases the overhead significantly. Therefore, a number of optimization protocols have been developed throughout the years. This chapter compares the performance of various route discovery algorithms in ad hoc wireless networks, namely, pure flooding, probabilistic, Location-Aided Routing scheme 1 (LAR-1), LAR-1-Probabilsitic (LAR-1P), and Optimal Multipoint Relying (OMPR). The results obtained th
APA, Harvard, Vancouver, ISO, and other styles
3

Afzal, Saad. "Implementation of Flooding Free Routing in Smart Grid." In Smart Grid as a Solution for Renewable and Efficient Energy. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0072-8.ch013.

Full text
Abstract:
Smart Grid is a communication and automatic control capabilities in electric power grid system for improving efficiency, reliability, management, capabilities and security of electric power grid. Routing is important in Smart Grid to send data from one point to another point. Routing in Smart Grid is necessary to search /identify destination point/node for communication and to computer the best available route in the network topology among which the data to be sent during communication. Smart Grid can be a combination of fixed nodes (home appliances, smart meter, control centre, etc.) but the
APA, Harvard, Vancouver, ISO, and other styles
4

Mnif, Kais, and Michel Kadoch. "Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks." In Innovations in Mobile Multimedia Communications and Applications. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-563-6.ch004.

Full text
Abstract:
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks. This structure is effective in reducing the overhead of disseminating control information. In the first part, the approach to build the virtual backbone on the setup phase is presented. The construction of backbone is based on the Minimum Connected Dominating Set (MCDS). The novelty is in the way on finding the MCDS. A Linear Programming approach is used to build a Minimum Dominating Set (MDS). Then, a spanning tree algorithm is applied to provide the MCDS. A theoretical analysis based on proba
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "FLOODING CONTROL PROTOCOL"

1

McInnes, Allan I. "Model-checking the Flooding Time Synchronization Protocol." In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Terada, Shinsuke, Takumi Miyoshi, Hiroaki Morino, Masakatsu Ogawa, and Kaoru Sezaki. "AD HOC Routing Protocol with Flooding Control using Unidirectional Links." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yamamura, Natsuru, and Takuo Nakashima. "Flooding Features for the AODV Protocol under the Different Communication Distances." In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sawant, Khushboo, Manoj Kumar Rawat, and Aakansha Jain. "Implementation of energy aware secure routing protocol over flooding environment in MANET." In 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015. http://dx.doi.org/10.1109/ic4.2015.7375560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mkuzangwe, Nenekazi N. P., Andre McDonald, and Fulufhelo V. Nelwamondo. "Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacks." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elamsy, Tarik, and Randa El-Marakby. "Flooding Zone Control Protocol (FZCP): enhancing the reliability of real-time multimedia delivery in WSNs." In 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2009. http://dx.doi.org/10.1109/isspit.2009.5407585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sha, Y., W. Xiong, L. C. Zhu, L. L. Zhang, Z. W. Zhang, and Q. W. Fan. "Research of a flooding control routing protocol based on location prediction in an Ad Hoc network." In International Conference on Computer Science and Technology. WIT Press, 2014. http://dx.doi.org/10.2495/iccst140991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rekha, S. Nithya, and C. Chandrasekar. "A comparative analysis of probabilistic broadcasting to reduce flooding with FSR (Fisheye State Routing) protocol and grid FSR using MANET." In PROCEEDINGS OF THE SIXTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION. AIP, 2012. http://dx.doi.org/10.1063/1.4769018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Murayri, Mohammed Taha, Hadeel Faisal Abdulraheem, Faisal Ahmed Qureshi, et al. "Significant Oil Uplift from Field Implementation of the First High Salinity Polymer-Flood Targeting a Sour Heavy Oil Reservoir Worldwide." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216595-ms.

Full text
Abstract:
Abstract A regular 5-spot pattern has been used to evaluate the techno-economic feasibility of polymerflooding after water-flooding using high salinity effluent water (up to 200,000 ppm TDS) for the Umm Niqa Lower Fars (UNLF) reservoir using a sulfonated synthetic polymer (Polymer A) that was selected based on extensive lab evaluation followed by a one-spot EOR pilot (Al-Murayri et al., 2020). Upon acquiring positive one-spot EOR pilot results, it was decided to proceed with a regular 5spot water-flooding/polymer-flooding pilot composed of 4 injectors, one producer, and one disposal well. Wate
APA, Harvard, Vancouver, ISO, and other styles
10

Nnaji, David, and Jeremy Daily. "Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2805.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Automotive researchers and industry experts have extensively documented vulnerabilities arising from unauthorized in-vehicle communication through academic research, industry investigations, sponsored events, and learnings from real-world attacks. While current cybersecurity endeavors in the heavy-duty (HD) vehicle space focus on securing conventional communication technologies such as the controller area network (CAN), there is a notable deficiency in defensive research concerning legacy technologies, particularly those
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!