You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/235941882

An overview of mobile ad hoc networks: Applications and challenges

Article  in  Journal- Communications Network · July 2004

CITATIONS READS

192 2,610

4 authors:

Jeroen Hoebeke Ingrid Moerman


Ghent University imec - Ghent University
143 PUBLICATIONS   996 CITATIONS    603 PUBLICATIONS   8,284 CITATIONS   

SEE PROFILE SEE PROFILE

Bart Dhoedt Piet Demeester


Ghent University Ghent University
472 PUBLICATIONS   4,902 CITATIONS    1,231 PUBLICATIONS   15,044 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Parallel Motif Discovery View project

MAGNET Beyond View project

All content following this page was uploaded by Piet Demeester on 05 June 2014.

The user has requested enhancement of the downloaded file.


Session 4

Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester

An Overview of Mobile Ad Hoc


Networks: Applications and
Challenges
In the past few years, we have seen a rapid expansion computers to surf the Internet from airports,
in the field of mobile computing due to the prolifera- railways, hotels and other public locations.
Broadband Internet access is driving
tion of inexpensive, widely available wireless devices. wireless LAN solutions in the home for
However, current devices, applications and protocols sharing access between computers. In the
meantime, 2G cellular networks are evolving
are solely focused on cellular or wireless local area
to 3G, offering higher data rates,
networks (WLANs), not taking into account the infotainment and location-based or person-
great potential offered by mobile ad hoc networking. alised services.
However, all these networks are
A mobile ad hoc network is an autonomous collec-
conventional wireless networks, conven-
tion of mobile devices (laptops, smart phones, tional in the sense that as prerequisites, a
sensors, etc.) that communicate with each other over fixed network infrastructure with centralised
administration is required for their opera-
wireless links and cooperate in a distributed manner tion, potentially consuming a lot of time and
in order to provide the necessary network functional- money for set-up and maintenance. Further-
ity in the absence of a fixed infrastructure. This type more, an increasing number of devices such
as laptops, personal digital assistants
of network, operating as a stand-alone network or (PDAs), pocket PCs, tablet PCs, smart
with one or multiple points of attachment to cellular phones, MP3 players, digital cameras, etc.
are provided with short-range wireless
networks or the Internet, paves the way for
interfaces. In addition, these devices are
numerous new and exciting applications. Application getting smaller, cheaper, more user friendly
scenarios include, but are not limited to: emergency and more powerful. This evolution is driving
a new alternative way for mobile communi-
and rescue operations, conference or campus
cation, in which mobile devices form a self-
settings, car networks, personal networking, etc. creating, self-organising and
This paper provides insight into the potential self-administering wireless network, called a
mobile ad hoc network. This paper discusses
applications of ad hoc networks and discusses the the characteristics, possible applications and
technological challenges that protocol designers and network layer challenges of this promising
network developers are faced with. These challenges type of network.

include routing, service and resource discovery,


History and Definition of
Internet connectivity, billing and security.
Mobile Ad Hoc Networks
Opposed to infrastructured wireless net-
works, where each user directly communi-
Introduction cates with an access point or base station, a
mobile ad hoc network, or MANET, does not
The field of wireless and mobile communi- rely on a fixed infrastructure for its opera-
cations has experienced an unprecedented tion (Figure 1)1. The network is an autono-
growth during the past decade. Current mous transitory association of mobile nodes
Authors second-generation (2G) cellular systems that communicate with each other over
Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt have reached a high penetration rate, wireless links. Nodes that lie within each
and Piet Demeester enabling worldwide mobile connectivity. other’s send range can communicate
Department of Information Technology Mobile users can use their cellular phone to directly and are responsible for dynamically
(INTEC), check their email and browse the Internet. discovering each other. In order to enable
Ghent University – IMEC vzw, Recently, an increasing number of wireless communication between nodes that are not
Sint Pietersnieuwstraat 41, B-9000 Ghent, local area network (LAN) hot spots is directly within each other’s send range,
Belgium emerging, allowing travellers with portable intermediate nodes act as routers that relay

60
Session 4

Figure 1 Cellular networks versus mobile ad hoc networks

need for detailed planning of base station


installation or wiring. Also, ad hoc networks
do not need to operate in a stand-alone
fashion, but can be attached to the Internet,
thereby integrating many different devices
and making their services available to other
users. Furthermore, capacity, range and
energy arguments promote their use in
tandem with existing cellular infrastructures
as they can extend coverage and
interconnectivity. As a consequence, mobile
ad hoc networks are expected to become an
important part of the future 4G architecture,
(a) Cellular network (b) Mobile ad hoc network which aims to provide pervasive computer
environments that support users in accom-
plishing their tasks, accessing information
packets generated by other nodes to their of their self-creating, self-organising and and communicating anytime, anywhere and
destination. These nodes are often energy- self-administering capabilities, ad hoc from any device. Table 2 provides an
constrained—that is, battery-powered— networks can be rapidly deployed with overview of present and future MANET
devices with a great diversity in their minimum user intervention. There is no applications, partially based on Reference 2.
capabilities. Furthermore, devices are free to
join or leave the network and they may
move randomly, possibly resulting in rapid
Table 2 Mobile ad hoc network applications
and unpredictable topology changes. In this
energy-constrained, dynamic, distributed Application Possible scenarios/services
multi-hop environment, nodes need to Tactical networks • Military communication and operations
organise themselves dynamically in order to • Automated battlefields
provide the necessary network functionality Emergency services • Search and rescue operations
in the absence of fixed infrastructure or • Disaster recovery
central administration. • Replacement of fixed infrastructure in case of environmental
The specific characteristics and com- disasters
plexities, which are summarised in Table 1, • Policing and fire fighting
impose many design challenges to the • Supporting doctors and nurses in hospitals
network protocols. In addition, these Commercial and civilian • E-commerce: electronic payments anytime and anywhere
networks are faced with the traditional environments • Business: dynamic database access, mobile offices
problems inherent to wireless communica- • Vehicular services: road or accident guidance, transmission of
tions such as lower reliability than wired road and weather conditions, taxi cab network, inter-vehicle
media, limited physical security, time- networks
varying channels, interference, etc. • Sports stadiums, trade fairs, shopping malls
Despite the many design constraints, • Networks of visitors at airports
mobile ad hoc networks offer numerous Home and enterprise • Home/office wireless networking
advantages. First of all, this type of network networking • Conferences, meeting rooms
is highly suited for use in situations where a • Personal area networks (PAN), Personal networks (PN)
fixed infrastructure is not available, not • Networks at construction sites
trusted, too expensive or unreliable. Because
Education • Universities and campus settings
• Virtual classrooms
• Ad hoc communications during meetings or lectures
Table 1 Characteristics and Entertainment • Multi-user games
complexities of mobile • Wireless P2P networking
ad hoc networks • Outdoor Internet access
• Robotic pets
Autonomous and infrastructureless • Theme parks
Multi-hop routing Sensor networks • Home applications: smart sensors and actuators embedded in
Dynamic network topology consumer electronics
• Body area networks (BAN)
Device heterogeneity • Data tracking of environmental conditions, animal
Energy constrained operation movements, chemical/biological detection

Bandwidth constrained variable capacity links Context aware services • Follow-on services: call-forwarding, mobile workspace
• Information services: location specific services, time
Limited physical security dependent services
Network scalability • Infotainment: touristic information

Self-creation, self-organization and self- Coverage extension • Extending cellular network access
administration • Linking up with the Internet, intranets, etc.

61
Session 4

The concept of mobile ad hoc network- Technological Challenges traffic overhead or computational burden on
ing is not a new one and its origins can be the power constrained devices6. A large
traced back to the DARPA Packet Radio As already stated, the specific characteristics number of solutions have already been
Network project in 19723. Then, the of MANETs impose many challenges to proposed, some of them being subject to
advantages such as flexibility, mobility, network protocol designs on all layers of the standardisation within the IETF. A number
resilience and independence of fixed protocol stack5. The physical layer must deal of proposed solutions attempts to have an
infrastructure, elicited immediate interest with rapid changes in link characteristics. up-to-date route to all other nodes at all
among military, police and rescue agencies The media access control (MAC) layer needs times. To this end, these protocols exchange
in the use of such networks under disor- to allow fair channel access, minimise packet routing control information periodically and
ganised or hostile environments. For a long collisions and deal with hidden and exposed on topological changes. These protocols,
time, ad hoc network research stayed in the terminals. At the network layer, nodes need which are called proactive routing protocols,
realm of the military, and only in the to cooperate to calculate paths. The transport are typically modified versions of traditional
middle of 1990, with the advent of com- layer must be capable of handling packet loss link state or distance vector routing
mercial radio technologies, did the wireless and delay characteristics that are very protocols encountered in wired networks,
research community become aware of the different from wired networks. Applications adapted to the specific requirements of the
great potential and advantages of mobile ad should be able to handle possible dynamic mobile ad hoc network environ-
hoc networks outside the military domain, disconnections and reconnections. Further- ment. Most of the time, it is not necessary to
witnessed by the creation of the Mobile Ad more, all network protocol developments have an up-to-date route to all other nodes.
Hoc Networking working group within the need to integrate smoothly with traditional Therefore, reactive routing protocols only set
IETF4. Currently, mobile ad hoc network networks and take into account possible up routes to nodes they communicate with
research is a very vibrant and active field security problems. In the following sections, and these routes are kept alive as long as
and the efforts of the research community, technological challenges and possible they are needed. Combinations of proactive
together with current and future MANET solutions related to unicast routing, resource and reactive protocols, where nearby routes
enabling radio technologies, which are and service discovery, addressing and (for example, maximum two hops) are kept
summarised in Table 3, will certainly pave Internet connectivity, security and node up-to-date proactively, while far-away routes
the way for commercially viable MANETs cooperation are covered in more detail. are set up reactively, are also possible and
and their new and exciting applications, fall in the category of hybrid routing
with some of these commercially oriented Routing protocols. A completely different approach
solutions already starting to appear (for As mobile ad hoc networks are character- is taken by the location-based routing
example MeshNetworks† and ised by a multi-hop network topology that protocols, where packet forwarding is based
SPANworks*). can change frequently due to mobility, on the location of a node’s communication
efficient routing protocols are needed to partner. Location information services
† http://www.meshnetworks.com establish communication paths between provide nodes with the location of the
* http://www.spanworks.com nodes, without causing excessive control others, so packets can be forwarded in the

Table 3 Mobile ad hoc network enabling technologies


Technology Theoretical bit rate Frequency Range Power consumption

IEEE 802.11b 1, 2, 5.5 and 11 Mbit/s 2.4 GHz 25–100 m (indoor) ~30 mW
100–500 m (outdoor)

IEEE 802.11g Up to 54 Mbit/s 2.4 GHz 25–50 m (indoor) ~79 mW

IEEE 802.11a 6, 9, 12, 24, 36, 5 GHz 10–40 m (indoor) 40 mW, 250 mW
49 and 54 Mbit/s or 1 W

Bluetooth 1 Mbit/s (v1.1) 2.4 GHz 10 m (up to 100 m) 1 mW


(IEEE 802.15.1) (up to 100 mW)

UWB (IEEE 802.15.3) 110 – 480 Mbit/s Mostly 3 – 10 GHz ~10 m 100 mW, 250 mW

IEEE 802.15.4 20, 40 or 250 kbit/s 868 MHz, 915 MHz 10–100 m 1 mW
(for example, Zigbee) or 2.4 GHz

HiperLAN2 Up to 54 Mbit/s 5 GHz 30–150 m 200 mW or 1 W

IrDA Up to 4 Mbit/s Infrared (850 nm) ~10 m (line of sight) Distance based

HomeRF 1 Mbit/s (v1.0) 2.4 GHz ~50 m 100 mW


10 Mbit/s (v2.0)

IEEE 802.16 32 – 134 Mbit/s 10–66 GHz 2–5 km Complex power


IEEE 802.16a up to 75 Mbit/s < 11 GHz 7–10 km (max 50 km) control
IEEE 802.16e up to 15 Mbit/s < 6 GHz 2–5 km
(Broadband Wireless)

62
Session 4

Figure 2 Overview of existing unicast routing techniques

implies that this functionality should be


statically or dynamically assigned to a
C subset of the nodes and kept up-to-date.
Existing directory-based service and
L
resource discovery mechanisms such as
UPnP† or Salutation* are unable to deal
K D with the dynamics in ad hoc networks.
A Currently, no mature solution exists, but it is
B clear that the design of these protocols
should be done in close cooperation with
I the routing protocols and should include
J context-awareness (location, neighbour-
hood, user profile, etc.) to improve perform-
E
ance. Also, when ad hoc networks are
connected to fixed infrastructure (for
example, Internet, cellular network, etc.),
H
protocols and methods are needed to inject
F the available external services offered by
service and content providers into the ad
G hoc network.

Addressing and Internet


Routing Type Routing knowledge of node A when it communicates with Protocols connectivity
nodes B, F and J
In order to enable communication between
Proactive A has route to B, C, D, E, F, G, H, I, J, K and L (all nodes) OLSR,TBRPF,WRP nodes within the ad hoc network, each node
Reactive A has only route to B, F and J AODV, DSR
needs an address. In stand-alone ad hoc
Hybrid A has route to B, C, D, E, F, I and L proactively and route to ZRP
networks, the use of IP addresses is not per
J reactively
Location Based A knows at least the location of its neighbours B, C, D DREAM, LAR se obligatory, as unique MAC addresses
and E and the location of F and J could be used to address nodes. However,
all current applications are based on TCP/IP
or UDP/IP. In addition, as future mobile ad
direction of the destination. Figure 2 approach for infrastructureless networks hoc networks will interact with IP-based
provides an overview in terms of routing (Figure 3(a)). The alternative scheme is
table content of the proposed solutions. directory-based and involves directory agents
Reference 7 provides an extensive overview where services are registered and service † http://www.upnp.org/
of routing protocol research. requests are handled (Figure 3(b)). This * http://www.salutation.org/
Simulation studies have revealed that
the performance of routing protocols in Figure 3 Logical overview of service and resource discovery
terms of throughput, packet loss, delay and architectures
control overhead strongly depends on the
network conditions such as traffic load,
mobility, density and the number of nodes8.
Ongoing research at Ghent University Service Request
therefore investigates the possibility of
Service Reply
developing protocols capable of dynamically
Users
adapting to the network9. REACTIVE
Servers
Service Advertisement
Service and resource discovery
MANET nodes may have little or no PROACTIVE
knowledge at all about the capabilities of, or
services offered by, each other. Therefore,
service and resource discovery mechanisms, (a) Directory-less architecture
which allow devices to automatically locate
network services and to advertise their own
capabilities to the rest of the network, are
an important aspect of self-configurable
networks10. Possible services or resources Service Request Service Registration
include storage, access to databases or files, DIRECTORY Servers
Users
printer, computing power, Internet access, AGENTS
etc. Service Reply Ack
Directory-less service and resource
discovery mechanisms, in which nodes
reactively request services when needed
and/or nodes proactively announce their (b) Directory-based architecture
services to others, seem an attractive

63
Session 4

networks and will run applications that use address will arrive at the node’s home agent address detection (DAD) techniques in order
existing Internet protocols such as transmis- (HA) (step 1). When the node in the ad hoc to impose address uniqueness within the
sion control protocol (TCP) and user network advertises to its home agent the IP MANET. Strong DAD techniques will always
datagram protocol (UDP), the use of IP address of the Internet gateway as its care- detect duplicates, but are difficult to scale in
addresses is inevitable. Unfortunately, an of-address (CoA), the home agent can large networks. Weak DAD approaches can
internal address organisation with prefixes tunnel all traffic to the ad hoc network tolerate duplicates as long as they do not
and ranges like in the fixed Internet is hard (step 2), on which it is delivered to the interfere with each other; that is, if packets
to maintain in mobile ad hoc networks due mobile node using an ad hoc routing always arrive at the intended destination. If
to node mobility and overhead reasons and protocol (step 3). For outgoing connections, interconnection to the Internet is desirable,
other solutions for address assignment are the mobile node has to route traffic to an outgoing connections could be realised
thus needed. Internet gateway, and for internal traffic an using network address translation (NAT),
One solution is based on the assumption ad hoc routing protocol can be used. The but incoming connections still remain a
(and restriction) that all MANET nodes main problem with this approach is that a problem if random, not globally routable,
already have a static, globally unique and MANET node needs an efficient way to addresses are used. Also, the use of NAT
pre-assigned IPv4 or IPv6 address. This figure out if a certain address is present in remains problematic when multiple Internet
solves the whole issue of assigning addresses, the MANET or if it is necessary to use an gateways are present. If a MANET node
but introduces new problems when Internet gateway, without flooding the entire switches to another gateway, a new IP
interworking with fixed networks. Connec- network. address is used and ongoing TCP connec-
tions coming from and going to the fixed Another solution is the assignment of tions will break (Figure 4(b)).
network can be handled using mobile IP random, internally unique addresses. This Another possible approach is the
(Figure 4(a))11, where the pre-assigned IP can be realised by having each node picking assignment of unique addresses that all lie
address serves as the mobile node’s home a more or less random address from a very within one subnet (comparable to the
address (HoA). All traffic sent to this IP large address space, followed by duplicate addresses assigned by a dynamic host
configuration protocol (DHCP) server).
When attached to the Internet, the ad hoc
network can be seen as a separate routable
Figure 4 Possible approaches to Internet connectivity and subnet (Figure 4(c)). This simplifies the
addressing decision if a node is inside or outside the ad
HoA Mobile Node Mobile Node hoc network. However, no efficient solutions
exist for choosing dynamically an appropri-
ate, externally routable and unique network
3
prefix (for example, special MANET prefixes
assigned to Internet gateways), handling the
162.191.250.0/24
merging or splitting of ad hoc networks,
handling multiple points of attachment to
the Internet, etc.
IP GW 1 = IP GW 1
IP GW 2 CoA Mobile Node The above discussion makes clear that,
although many solutions are being investi-
2
gated12, no common adopted solution for
Internet Internet
addressing and Internet connectivity is
available yet. New approaches using host
1 Corresponding Routing Table: identities, where the role of IP is limited to
Node 162.191.250.0/24 routing and not addressing, combined with
dynamic name spaces, could offer a
Home potential solution.
Network
Home Corresponding Security and node cooperation
Agent Node The wireless mobile ad hoc nature of
(a) Internet connectivity using mobile IP (c) Addressing using subnets MANETs brings new security challenges to
the network design13. As the wireless
medium is vulnerable to eavesdropping and
ad hoc network functionality is established
NAT through node cooperation, mobile ad hoc
IP CN, IP GW 2 Payload
networks are intrinsically exposed to
Mobile Node IP GW 2
numerous security attacks. During passive
IP MN attacks, an attacker just listens to the
channel in order to discover valuable
Internet information. This type of attack is usually
Corresponding impossible to detect, as it does not produce
NAT IP CN, IP GW 1 Payload Node any new traffic in the network. On the other
IP CN hand, during active attacks an attacker
IP GW 1
actively participates in disrupting normal
operation of the network. This type of attack
(b) Internet connectivity using network address translation (NAT) involves deletion, modification, replication,
redirection and fabrication of protocol

64
Session 4

control packets or data packets. Securing ad billing, to whom and for what, need to be made during the last years, a lot of challeng-
hoc networks against malicious attacks is answered and will lead to complex business ing technical issues remain unanswered.
difficult to achieve. Preventive mechanisms models. From an economical point of view, mobile
include among others authentication of We may conclude that in some ad hoc ad hoc networks open up new business
message sources, data integrity and protec- network scenarios, the network organisation opportunities for telecom operators and
tion of message sequencing, and are can completely or partially rely on a trust service providers. To this end, appropriate
typically based on key-based cryptography. relationship between participating nodes business scenarios, applications and
Incorporating cryptographic mechanisms is (for example, PANs). In many others, economical models need to be identified,
challenging, as there is no centralised key security mechanisms, mechanisms to together with technological advances,
distribution centre or trusted certification enforce cooperation between nodes or making a transition of ad hoc networks to
authority. These preventative mechanisms billing methods are needed and will the commercial world viable.
need to be sustained by detection tech- certainly be an important subject of future
niques that can discover attempts to research. References
penetrate or attack the network.
The previous problems were all related Conclusions 1 Basagni, S., Conti, M., Giordano S., and
to malicious nodes that intentionally Stojmenovic, I. (Eds.) Ad Hoc Networking.
damage or compromise network functional- The rapid evolution in the field of mobile IEEE Press Wiley, New York, 2003.
ity. However, selfish nodes, which use the computing is driving a new alternative way
network but do not cooperate to routing or for mobile communication, in which mobile 2 Chlamtac, I., Conti, M., and Liu, J. J.-N.
packet forwarding for others in order not to devices form a self-creating, self-organising Mobile ad hoc networking: imperatives and
spill battery life or network bandwidth, and self-administering wireless network, challenges. Ad Hoc Networks, 1(1), 2003,
constitute an important problem as network called a mobile ad hoc network. Its intrinsic pp. 13–64.
functioning entirely relies on the coopera- flexibility, lack of infrastructure, ease of
tion between nodes and their contribution deployment, auto-configuration, low cost 3 Freebersyser, J. A., and Leiner, B. A DoD
to basic network functions. To deal with and potential applications make it an perspective on mobile ad hoc networks.
these problems, the self-organising network essential part of future pervasive computing In: Perkins, C. (Ed.) Ad Hoc Networking,
concept must be based on an incentive for environments. As a consequence, the Addison Wesley, Reading, MA, 2001,
users to collaborate, thereby avoiding selfish seamless integration of mobile ad hoc pp. 29–51.
behaviour. Existing solutions aim at networks with other wireless networks and
detecting and isolating selfish nodes based fixed infrastructures will be an essential part 4 IETF MANET Working Group. http://
on watchdog mechanisms, which identify of the evolution towards future fourth- www.ietf.org/html.charters/manet-
misbehaving nodes, and reputation systems, generation communication networks. From charter.html
which allow nodes to isolate selfish nodes. a technological point of view, the realisation
Another promising approach is the introduc- of this vision still requires a large number of 5 Toh, C-K. Ad Hoc Mobile Wireless
tion of a billing system into the network challenges to be solved related to devices, Networks: Protocols and Systems.
based on economical models to enforce protocols, applications and services. The Prentice Hall, 2002.
cooperation14. Using virtual currencies or concise discussion in this paper shows that,
micro-payments, nodes pay for using other despite the large efforts of the MANET 6 Corson, S., and Macker, J. Mobile Ad hoc
nodes’ forwarding capabilities or services research community and the rapid progress Networking (MANET): Routing Protocol
and are remunerated for making theirs Performance Issues and Evaluation
available (Figure 5). Considerations. RFC 2501, IETF, Jan. 1999.
This approach certainly has potential in
scenarios in which part of the ad hoc Acknowledgements 7 Abolhasan, M., Wysocki, T., and
network and services is deployed by Dutkiewicz, E. A review of routing
companies or service providers (for exam- This research is partly funded by the protocols for mobile ad hoc networks. Ad
ple, location- or context-aware services, Belgian Science Policy through the IAP V/ Hoc Networks, 2(1), 2004, pp. 1–22.
sports stadium, taxi cab network, etc.). 11 contract, by The Institute for the
Also, when ad hoc networks are intercon- Promotion of Innovation by Science and 8 Royer, E., and Toh, C. A Review of
nected to fixed infrastructures by gateway Technology in Flanders (IWT) through the Current Routing Protocols for Ad Hoc
nodes, which are billed by a telecom contract No. 020152, by the Fund for Mobile Wireless Networks. IEEE Personal
operator (for example, UMTS, hot-spot Scientific Research - Flanders (F.W.O.-V., Communications, 6(2), Apr. 1999, pp. 46–55.
access, etc.), billing mechanisms are needed Belgium) and by the EC IST integrated
to remunerate these nodes for making these project MAGNET (Contract no. 507102). 9 Hoebeke, J., Moerman, I., Dhoedt, B., and
services available. Questions such as who is Demeester, P. Towards adaptive ad hoc
network routing. International Journal of
Figure 5 Enforcing cooperation by remunerating nodes for Wireless and Mobile Computing: Special
relaying packets Issue on ‘Wireless Ad Hoc Networking’,
to be published.
Initiator Correspondent
10 Kozat, U. C., and Tassiulas, L. Service
discovery in mobile ad hoc networks: an
overall perspective on architectural
€ € € choices and network layer support
€ issues. Ad Hoc Networks, 2(1), 2004,
pp. 23–44.

65
Session 4

Biographies

11 Jönsson, U., Alriksson, F., Larsson, T.,


Johansson, P., and Maguire, G. Q.
MIPMANET: Mobile IP for mobile ad hoc
networks. Proceedings of the First Annual
Workshop on Mobile Ad Hoc Networking
and Computing (MobiHOC), Aug. 2000. Jeroen Hoebeke Bart Dhoedt
Ghent University Ghent University
12 Perkins, C. E., Malinen, J. T., Wakikawa, R.,
Nilsson, A., and Tuominen, A. J. Internet Jeroen Hoebeke graduated in Computer Bart Dhoedt received a degree in Engineering
Connectivity for Mobile Ad Hoc Net- Science at the University of Ghent in 2002. from the Ghent University in 1990. In
works. Wireless Communications and Mobile In August 2002, he joined the Broadband September 1990, he joined the Department of
Computing, 2(5), Aug. 2002, pp. 465–482. Communications Networks Group, where Information Technology of the Faculty of
he is currently working as a research Applied Sciences, University of Ghent. His
13 Gupte, S., and Singhal, M. Secure routing in assistant of the Fund for Scientific Research research, addressing the use of micro-optics to
mobile wireless ad hoc networks. Ad Hoc Flanders. His Ph.D. research includes the realise parallel free space optical interconnects,
Networks, 1(1), 2003, pp. 151–174. development of adaptive routing protocol resulted in a Ph.D. degree in 1995. After a two
techniques for mobile ad hoc networks. His year post-doc in opto-electronics, he became
14 Buttyan, L., and Hubaux, J. P. Stimulating main research interests are in ad hoc professor at the Faculty of Applied Sciences,
cooperation in self-organizing mobile ad networks and broadband wireless communi- Department of Information Technology. Since
hoc networks. Mobile Networks and cations and currently involve routing, then, he has been responsible for several
Applications: Special Issue on Mobile Ad monitoring, resource discovery and mobility courses on algorithms, programming and
Hoc Networks, 8(5), 2003. modelling of mobile ad hoc networks. software development. His research interests
are software engineering and mobile and
wireless communications. He is author or co-
author of approximately 70 papers published in
international journals or in the proceedings of
international conferences. His current
research addresses software technologies for
Ingrid Moerman communication networks, peer-to-peer
Ghent University networks, mobile networks and active
networks.
Ingrid Moerman received the degree in
Electro-technical Engineering and the Ph.D.
degree from the Ghent University, Ghent,
Belgium, in 1987 and 1992, respectively.
Since 1987, she has been with the
Interuniversity Micro-Electronics Centre
(IMEC) at the Department of Information Piet Demeester
Technology (INTEC) of the Ghent Univer- Ghent University
sity, where she conducted research in the
field of optoelectronics. In 1997, she Piet Demeester received the Masters degree
became a permanent member of the in Electro-technical Engineering and the Ph.D.
Research Staff at IMEC. Since 2000, she has degree from Ghent University, Ghent,
been part-time professor at Ghent Univer- Belgium, in 1984 and 1988, respectively. In
sity. Since 2001, she has switched her 1992, he started a new research activity on
research domain to broadband communica- broadband communication networks resulting
tion networks. She is currently involved in in the IBCN-group (INTEC Broadband
research and education on broadband communications network research group).
mobile and wireless communication Since 1993, he has been a professor at Ghent
networks and on multimedia over IP. The University, where he is responsible for
main research topics related to mobile and research and education on communication
wireless communication networks are: networks. The research activities cover
wireless access to vehicles (high bandwidth various communication networks (IP, ATM,
and driving speed), adaptive QoS routing in SDH, WDM, access, active, mobile), including
wireless ad hoc networks, body area network planning, network and service
networks, protocol boosting on wireless management, telecom software,
links, design of fixed access/metro part, internetworking, network protocols for QoS
traffic engineering and QoS support in the support, etc. He is author of more than 300
wireless access network. She is author or publications in the area of network design,
co-author of more than 300 publications in optimisation and management. He is member
the field of optoelectronics and communica- of the editorial board of several international
tion networks. journals and has been member of several
technical programme committees (ECOC,
OFC, DRCN, ICCCN, IZS, etc.).

66
View publication stats

You might also like