Conference Paper

An obstacle-aware human mobility model for ad hoc networks

Dept. of Electr. & Comput. Eng., Univ. of Patras, Patras, Greece
DOI: 10.1109/MASCOT.2009.5366135 Conference: Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS '09. IEEE International Symposium on
Source: IEEE Xplore

ABSTRACT In this work we present an obstacle-aware human mobility model for ad hoc networks. Typical examples where the nodes of mobile ad hoc networks are human-operated are natural or man-made disasters, military activities or healthcare services. In these scenarios, obstacles are an integral part of the areas where such networks are deployed in order to facilitate communication among the firemen, policemen, medics, soldiers, etc. In the proposed mobility model, the nodes of the network move around the obstacles in a natural and realistic way. A recursive procedure is followed by each node according to which every time an obstacle is encountered between the node's current position and the final destination point, the node moves to the obstacle's vertex that is closest to the destination. This process is repeated until the destination is reached. The obstacles are also taken into account in modeling the signal propagation. When a packet is transmitted through an obstacle, the power at which it is received is attenuated by a certain value representing the physical layer phenomena suffered by the signal. The model is implemented as an add-on module in Network Simulator NS-2. A thorough simulation study conducted highlights the differences of the proposed model with other mobility models, by investigating the properties of the resulting network topologies and their impact on network performance.

0 Bookmarks
 · 
146 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The importance of emergency services has lead to an indispensable need for lightweight technologies that will support emergency rescue missions. Due to their nature and the non-infrastructure characteristics Mobile Ad-hoc Networks (MANETs) are characterised as autonomous networks that have the potential to be exploited when wireless communications should be established in an ad-hoc manner in cases that traditional telecommunications infrastructures such as 3G have failed. A critical issue within the context of MANETs is the routing protocol that has to be followed by the nodes in order to set up communication “bridges” among each other. On the other hand, malicious entities may try to disrupt the conventional functionality of any routing protocol by (i) modifying routing information, (ii) fabricating false routing information and (iii) impersonating other nodes. In this paper we apply the IPSec protocol over well known routing protocols for MANETs and we evaluate their performance along with the lines of choosing an appropriate secure routing mechanism that can be applicable in emergency MANETs (eMANETs). These are MANETs that are established during an emergency scenario to provide communication links among the rescuers. To simulate the mobility of the rescuers during an emergency mission an appropriate mobility model has been utilised and acknowledged.
    Future Network and Mobile Summit, 2010; 01/2010
  • Source
    Man-Machine Interactions 3, 01/2014: pages 567-577; Springer International Publishing.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: n disaster situations, where ad hoc mobile networks are normally used, the location and quantity of existing obstacles is random. Most existing mobility models have not been developed with consideration of the obstacles that exist in a disaster environment. This paper proposes two methods of mobility that realistically represent movement in an environment with obstacles. Unmarked Point Model (UPM) uses a high granularity strategy and Adjacency Vertex Model (AVM) uses a method that selects the shortest pathway. UPM consumes more resources than AVM to generate node mobility patterns in an ad hoc network, on a real map area of an urban area, where obstacles have been placed to simulate an emergency and rescue scenario. In addition, a comparative analysis of both models in its routing performance is done using AODV.
    Ad Hoc & Sensor Wireless Networks 10/2014; 23(3-4):211-233. · 0.41 Impact Factor

Full-text

Download
2 Downloads
Available from
Nov 10, 2014