Abstract
The question of whether mobility is a blessing (Burleigh et al., IEEE Communications Magazine, 41:128–136, 2003; Capkun et al., Proc. of ACM MobiHoc, 2003) or a curse (Zhang et al., Proc. of ACM MobiHoc, 2005) to ad hoc networks has attracted a significant amount of research interest. Some researchers argue that mobility is a hurdle, as it makes the routing, naming and addressing, and location services more challenging. Some new mechanisms such as Zhang et al. (Proc. of ACM MobiHoc, 2005) have been proposed to tackle the problems caused by node mobility in MANETs. Others argue that far?from being a hurdle, mobility can be exploited to increase the system performance. Carefully designed protocols may exploit the mobility to obtain advantages in many important aspects of ad hoc networks, such as network capacity, security, and information dissemination.
This chapter surveys the impact of mobility in ad hoc networks from a wide perspective. We refrain from going into minute details of mobility, and instead?head for giving a broader picture. The goal of this chapter is to endorse new approaches to employ mobility in ad hoc networks based on the current situation and show why mobility can help in many different aspects (Cooper et?al., Proc. of IEEE MASCOTS, 2005; Camp et al., Wireless Communications and Mobile Computing, 2(5):483–502, 2002).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Agarwal and P. R. Kumar. Capacity bounds for ad-hoc and hybrid wireless networks. In Proc. of ACM SIGCOMM, 2004.
A. Vahdat and D. Becker, Epidemic routing for partially-connected ad hoc networks, Technical Report, Duke University, 2002.
B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley. Mobility improves coverage of sensor networks. In Proc. of ACM MobiHoc, 2005.
C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing. In Proc. of IEEE WMCSA, 1999.
D. Austin, W. Bowen, and J. McMillan. Intraspecific variation in movement patterns: modeling individual behaviour in a large marine predator. In Proc. of ACM SIGCOMM, 2004.
D. B. Johnson. Routing in ad hoc networks of mobile hosts. In Proc. of the Workshop on Mobile Computing Systems and Applications, 1994.
D. Cooper, P. Ezhilchelvan, I. Mitrani, and E. Vollset. Optimization of encounter gossip propagation in mobile ad-hoc networks. In Proc. of IEEE MASCOTS, 2005.
DTN research group. In http://www.dtnrg.org/.
F. Bai, N. Sadagopan, and A. Helmy. Important: a framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks. In Proc. of IEEE INFOCOM, 2003.
F. Bai, N. Sadagopan, and A. Helmy. Brics: a building-block approach for analyzing routing protocols in ad hoc networks – a case study of reactive routing protocols. In Proc. of IEEE ICC, 2004.
F. Li and J. Wu. Mobility reduces uncertainty in manets. In Proc. of IEEE INFOCOM, 2007.
Garmin website. In http://www.garmin.com/.
J. Chiang and Y. Hu. Extended abstract: cross-layer jamming detection in wireless broadcast networks. In Proc. of ACM MobiCom, 2007.
J. Haas. A new routing protocol for the reconfigurable wireless networks. In Proc. of IEEE 6th International Conference on Universal Personal Communications, 1997.
J. Wu, S. Yang, and F. Dai. Logarithmic store-carry-forward routing in mobile Ad Hoc networks. IEEE Transactions on Parallel and Distributed Systems, 18(6):735–748, 2007.
M. Grossglauser and M. Vetterli. Locating nodes with EASE: Mobility diffusion of last encounters in Ad Hoc networks, In Proc. of IEEE Infocom, 2003.
M. Grossglauser and D. Tse. Mobility increases the capacity of ad-hoc wireless networks. In Proc. of IEEE INFOCOM, 2001.
Mit trace. In http://nms.lcs.mit.edu/mbalazin/wireless/.
P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, 2000.
Q. Li and D. Rus, Sending messages to mobile users in disconnected ad-hoc wireless networks. In Proc. ACM MobiCom, 2000.
R. Atkinson, C. Rhodes, D. Macdonald, and R. Anderson. Scale-free dynamics in the movement patterns of jackals. In OIKIS, 98:134–140, 2002.
S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss. Delay-tolerant networking: an approach to interplanetary internet. In IEEE Communications Magazine, 41:128–136, 2003.
S. Capkun, J. Hubaux, and L. Buttyán. Mobility helps security in ad hoc networks. In Proc. of ACM MobiHoc, 2003.
S. Capkun, M. Cagalj, and M. Srivastava. Securing localization with hidden and mobile base stations. In Proc. of IEEE INFOCOM, 2006.
T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2(5):483–502, 2002.
W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In Proc. of ACM MobiHoc, 2005.
W. Zhao, M. Ammar, and E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, In Proc. ACM MobiHoc, 2004.
W. Zhao, M. Ammar, and E. Zegura, Controlling the mobility of multiple data transport ferries in a delay-tolerant network, In Proc. IEEE INFOCOM, 2005.
X. Hong, M. Gerla, G. Pei, and C. Chiang. A group mobility model for ad hoc wireless networks. In Proc. of ACM/IEEE MSWiM, 1999.
Zebranet website. In http://www.princeton.edu/mrm/zebranet.html.
Acknowledgments
This work was supported in part by NSF grants CCR 0329741, CNS 0422762, CNS 0434533, CNS 0531410, and CNS 0626240. Contact information: Jie Wu, (561)297-3855, Fax: (561)297-2800, jie@cse.fau.edu.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Li, F., Yang, Y., Wu, J. (2009). Mobility Management in MANETs: Exploit the Positive Impacts of Mobility. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_9
Download citation
DOI: https://doi.org/10.1007/978-1-84800-328-6_9
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84800-327-9
Online ISBN: 978-1-84800-328-6
eBook Packages: Computer ScienceComputer Science (R0)