2014
DOI: 10.3745/jips.2014.10.1.036
|View full text |Cite
|
Sign up to set email alerts
|

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

Abstract: Abstract-Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Research on mobile ad hoc networks (MANETs) directly embraces node and edge dynamics, modeling wireless communication links that form and fail as nodes move in and out of each other's transmission radii. Mutual exclusion has been exhaustively studied under MANET models [4,6,7,15,45,50], and many of those ideas inspired recent work on mutual exclusion for intersection traffic control for autonomous vehicles [46,52]. Mutual exclusion for MANETs is almost always solved using a token-based approach, sometimes combined with the imposition of a logical structure like a ring or tree.…”
Section: Related Workmentioning
confidence: 99%
“…Research on mobile ad hoc networks (MANETs) directly embraces node and edge dynamics, modeling wireless communication links that form and fail as nodes move in and out of each other's transmission radii. Mutual exclusion has been exhaustively studied under MANET models [4,6,7,15,45,50], and many of those ideas inspired recent work on mutual exclusion for intersection traffic control for autonomous vehicles [46,52]. Mutual exclusion for MANETs is almost always solved using a token-based approach, sometimes combined with the imposition of a logical structure like a ring or tree.…”
Section: Related Workmentioning
confidence: 99%
“…The latest security systems proposed for VANETs are broke down underneath as they can be utilized in the structure of a VANET secure directing convention. These security procedures incorporate steering bundle trades and move 15 . Any security strategy proposed for information packets are adjusted to the particular steering bundle move.…”
Section: Security Mechanismsmentioning
confidence: 99%
“…This paper proposed a network-based handover scheme for Host Identity Protocol in the mobile networks, in which the access routers of the mobile node will establish a handover tunnel and will perform the route optimization for data transmission [7]. Recently, this paper proposed the security based algorithmic approach in the mobile ad hoc networks [8,9].…”
Section: Introductionmentioning
confidence: 99%