Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
A Macro model of frequently changing mobile networks to perform flow and access control
Mobile Networks and Applications
Hi-index | 0.00 |
Adapting up-to-date positioning technology, location-aware clustering enables some attractive new applications on ad hoc networks. In this paper, we propose a novel traffic analysis approach for ad hoc networks partitioned using location-aware clustering criterion. Based on the cluster model, the proposed approach is able to calculate the average traffic load for cluster heads, gateway nodes and ordinary cluster members respectively. Given anticipate input traffic input rate, the ad hoc network load can be analyzed without actually testing withclustering protocol. Our analytical results show how the two basic parameters for traffic flow between various nodes such as the intra and inter cluster average distances that affect the traffic load distribution among different types of nodes in the clustered Ad-hoc network.