scholarly journals Efficient data transfer in mobile ad-hoc network using OPSM for disaster response applications

2015 ◽  
Vol 13 (3) ◽  
pp. 392-401 ◽  
Author(s):  
V. Bhanumathi ◽  
R. Dhanasekaran
2017 ◽  
Vol 10 (1) ◽  
pp. 82-85
Author(s):  
Vikram Agrawal

MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.


Author(s):  
Shirina Samreen

The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.


Author(s):  
Layth A. Khalil Al Dulaimi ◽  
R. Badlishah Ahmad ◽  
Naimah Yaakob ◽  
Mohd Hafiz Yusoff ◽  
Mohamed Elshaikh

<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span><table class="MsoTableGrid" style="width: 444.85pt; border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;" width="593" border="1" cellspacing="0" cellpadding="0"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes; mso-yfti-lastrow: yes; height: 63.4pt;"><td style="width: 290.6pt; border: none; border-top: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; height: 63.4pt;" valign="top" width="387"><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;"><span style="mso-spacerun: yes;"> </span>A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span></p><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;">.</span></p></td></tr></tbody></table>


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Ahmad Sabiq

A communication system without network supporting is needed to resolve the paralyzed network and communication infrastucture caused by natural disaster. MANET (Mobile Ad-Hoc Network) is a network consisting of several mobile devices that communicates through wireless network without router. Mobile devices are not only used for voice and data transfer, but also as a router. This research develops a mobile application based on MANET that can communicate without network infrastructure. It can be used when the natural disaster damages the network infrastructure. The testing result shows the application, that runs under android platform, can communicate well in MANET network.Key Word: Ad-hoc network, manet, disaster recoveryPada kondisi bencana alam yang menyebabkan infrastruktur jaringan dan komunikasi lumpuh, dibutuhkan sebuah sistem komunikasi yang mampu digunakan tanpa adanya infrastruktur jaringan. Jaringan MANET (Mobile Ad-Hoc Network) merupakan jaringan yang terdiri dari beberapa perangkat bergerak yang berkomunikasi melalui jaringan nirkabel tanpa router yang secara khusus disediakan, sehingga semua perangkat bergerak yang digunakan selain berfungsi sebagai alat untuk komunikasi dan pertukaran data, juga berfungsi sebagai perantara komunikasi atau router. Pada penelitian ini, dibuat sebuah aplikasi untuk melakukan komunikasi pada perangkat android melalui jaringan tanpa infrastruktur berbasis MANET yang dapat digunakan pada penanggulangan bencana yang mengakibatkan lumpuhnya sarana jaringan dan komunikasi. Dari hasil pengujian, aplikasi yang telah dibuat dapat digunakan untuk berkomunikasi pada perangkat android berbasis jaringan MANET.Kata Kunci: Jaringan ad-hoc, manet, penanggulangan bencana


Author(s):  
Salman Ali Syed ◽  
Shahzad Ali

Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.


2019 ◽  
Vol 16 (9) ◽  
pp. 3835-3839
Author(s):  
Nippun Kamboj ◽  
Dalip ◽  
Munishwar Rai

In modern era, MANET i.e., Mobile Ad-hoc Network is a very powerful, interactive tool and useful resource for transmission/communication in computer networks. About composition of MANET, a collection of mobile nodes have the potential of creating self-maintaining and self-configurable network without having any centralized infrastructure i.e., MANET is a self-organized network without any infrastructure. Nodes in the network require energy for transmission of data after collapse of energy a node become inactive and it can’t participate in the communication. Due to exhaustation of energy the network becomes unstable. An unstable network requires extra routing process for coin out a route. In future security of MANET is a major challenge for smooth and efficient data communication. There are many protocols in MANET but in this paper, we discussed AODV routing protocol for data communication. In this paper a new algorithm is designed i.e., modified AODV with security constraint. This paper also gives the comparative study of original AODV and modified AODV.


Sign in / Sign up

Export Citation Format

Share Document