Fuzzy Logic Based Stable On-Demand Multipath Routing Protocol for Mobile Ad Hoc Network

Author(s):  
Ayushi Singhal ◽  
A.K. Daniel
2013 ◽  
Vol 6 (1) ◽  
pp. 705-710
Author(s):  
Kavita Kundlik Bondre ◽  
Prof. Ajitsinh.N. Jadhav

Mobile ad hoc network is a collection of wireless nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. The network topology dynamically changes frequently in an unpredictable manner since nodes are free to move. Support for multicasting is essential in such environment as it is considered to be an efficient way to deliver information from source nodes to many client nodes. On-Demand Multicast Routing Protocol is a protocol for routing multicast and unicast traffic throughout adhoc wireless mesh networks. ODMRP creates routes on demand so they suffer from a route acquisition delay,although it helps reduce network traffic in general. In future this  results will be compared with AODV and FSR protocol and ODMRP performs better as compared with AODV and FSR protocol.


2015 ◽  
Vol 40 (4) ◽  
pp. 267-298 ◽  
Author(s):  
Himadri Nath Saha ◽  
Rohit Singh ◽  
Debika Bhattacharyya ◽  
P.K. Banerjee

Abstract With advent of technology MANET is becoming more and more ubiquitous, and so is the vulnerability of such networks to attacks. In this paper, we propose a secure, lightweight, on-demand routing protocol for MANETs. It uses the concept of fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that neighbor or not. To combat attacks efficiently new packets like report and recommendation are used. After receiving a few of these packets a node can conclude about the behavior of a node, thereby identifying and blacklisting the malicious nodes. We try to impose bounds for the fidelity with reference to the battery of the node, which restricts a node to increase its fidelity to infinity and become dominant in the network. This protocol not only finds a secure route to transmit data, but also identifies the malicious nodes in the network. Our protocol exhibits high packet delivery fraction, with low normalized routing load and low end to end delay; which has been observed while simulating in GloMoSim platform. We have observed that our protocol performs not only better than other existing secure routing protocol in a malicious environment, but also combats, many attacks which have not been dealt with these protocols.


Informatica ◽  
2006 ◽  
Vol 17 (4) ◽  
pp. 481-502
Author(s):  
Chinnappan Jayakumar ◽  
Chenniappan Chellappan

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Mohammad Sirajuddin ◽  
Ch. Rupa ◽  
Celestine Iwendi ◽  
Cresantus Biamba

Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document