Connection times in large ad-hoc mobile networks

被引:8
|
作者
Doering, Hanna [1 ]
Faraud, Gabriel [2 ]
Koenig, Wolfgang [3 ,4 ]
机构
[1] Univ Osnabruck, Inst Math, Albrechtstr 28a, D-49076 Osnabruck, Germany
[2] Univ Paris 10 Nanterre La Def, Lab Modalx, 200 Av Republ, F-92000 Nanterre, France
[3] Weierstrass Inst Berlin, Mohrenstr 39, D-10117 Berlin, Germany
[4] Tech Univ Berlin, Inst Math, Str 17 Juni 136, D-10623 Berlin, Germany
关键词
ad-hoc networks; connectivity; dynamic continuum percolation; large deviations; random waypoint model; PERCOLATION; MODELS;
D O I
10.3150/15-BEJ724
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
We study connectivity properties in a probabilistic model for a large mobile ad-hoc network. We consider a large number of participants of the system moving randomly, independently and identically distributed in a large domain, with a space-dependent population density of finite, positive order and with a fixed time horizon. Messages are instantly transmitted according to a relay principle, that is, they are iteratively forwarded from participant to participant over distances smaller than the communication radius until they reach the recipient. In mathematical terms, this is a dynamic continuum percolation model. We consider the connection time of two sample participants, the amount of time over which these two are connected with each other. In the above thermodynamic limit, we find that the connectivity induced by the system can be described in terms of the counterplay of a local, random and a global, deterministic mechanism, and we give a formula for the limiting behaviour. A prime example of the movement schemes that we consider is the well-known random waypoint model. Here, we give a negative upper bound for the decay rate, in the limit of large time horizons, of the probability of the event that the portion of the connection time is less than the expectation.
引用
收藏
页码:2143 / 2176
页数:34
相关论文
共 50 条
  • [21] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [22] Reliability Evaluation of Mobile Ad-hoc Networks
    Choudhary, Anil
    Roy, O. P.
    Tuithung, T.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (05): : 207 - 220
  • [23] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [24] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [25] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [26] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [27] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    Cluster Computing, 2005, 8 : 111 - 118
  • [28] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [29] Interference Criteria for Mobile Ad-Hoc Networks
    Boksiner, Jeffrey
    Posherstnik, Yuriy
    Yeager, Richard O.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432
  • [30] An Optimization Strategy for Mobile Ad-hoc Networks
    Luo, Jianlu
    Yang, Juan
    Cheng, Fang
    Fu, Dandan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 921 - 925