Disjoint categories in low delay and on-demand multipath dynamic source routing adhoc networks

Author(s):  
Fahimeh Rookhosh ◽  
Abolfazl Toroghi Haghighat ◽  
Saeed Nickmanesh
2018 ◽  
Vol 7 (3.6) ◽  
pp. 358
Author(s):  
S Madhurikkha ◽  
R Sabitha

Ad-hoc networks are highly vulnerable to the attacks due to the dynamic nature of the network topology, lack of centralized management and cooperative algorithm. Nodes in the ad-hoc network are responsible to transmit packets to other nodes. One of many different kinds of attacks, a node may experience the exhaustion of power by consuming its batter power. Routing protocol controls the packet transmission over the network and calculates the routing path for transmission. The predefined static routed path is limited in ad-hoc network, and nodes have limited energy that is depleted due to transmission. Sleep deprivation attack constantly drops the power source on a particular node until the node gets shutdown. We have proposed an effective model named Honey-bee model to enhance Ad-hoc On-Demand Distance Vector Routing algorithm. Hierarchical clustering method is used for the formation of the cluster of nodes. Based on this approach, each node is assigned with a cluster that prevents the attack. We have simulated in ns2 tool compared results with other on-demand routing protocol such as Power Aware Routing Protocol, Dynamic Source Routing, Flow-State extensions to Dynamic Source Routing and AODV.  


Author(s):  
Niranjan Panda ◽  
Binod Kumar Pattanayak

<p class="western" style="margin-top: 0.21cm; margin-bottom: 0cm; line-height: 100%;" lang="en-US" align="justify"><span>Mo</span><strong><span>b</span></strong><span>ile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further to the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.</span></p>


2013 ◽  
Vol 24 (5) ◽  
pp. 1098-1110
Author(s):  
Yu-Xing SUN ◽  
Li XIE ◽  
Yi-Fei CHEN

Sign in / Sign up

Export Citation Format

Share Document