A High-Gain and Broadband Sector-Shaped Double-Sided Printed Dipole Array Antenna for Ad-Hoc Network Nodes

Author(s):  
Kun Bi ◽  
Jianguo Yu ◽  
Zhifang Wang ◽  
Weizhi Zhu ◽  
Lan Wang
2013 ◽  
Vol 11 (9) ◽  
pp. 2994-3003
Author(s):  
Reeta Mishra

Now a day, security in Mobile Ad hoc Network is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Therefore attacks in this are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping.This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behaviour during the process of route discovery. For any received REQ, the black hole claims having a route and propagates a faked REP. The source node responds to these faked REPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination.The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; REP is overloaded with an extra field to indicate the reliability of the replying node. 


Author(s):  
E.V. Tonkikh ◽  
A.I. Paramonov ◽  
A.E. Koucheryavy

This article presents the results of IoT network modeling as an ad hoc network. The main attention is paid to the features of the functioning of such a network in highdensity conditions (up to 1 device per square meter). The paper presents the results of evaluations of the basic operating conditions, namely, the level of interference from neighboring network nodes and the signal-noise ratio (SNR). The developed models make it possible to express the dependence of the noise level and SNR on the network density, produced traffic, and transmitter power. Представлены результаты моделирования сети интернета вещей как ad hoc сети. Основное внимание уделяется особенностям функционирования такой сети в условиях высокой плотности (до 1 устройства на 1 м2). Приводятся результаты оценок главных условий функционирования: помех от соседних узлов сети и отношений сигнал/шум (SNR). Показано, что подобная сеть может сохранять связность, но только при построении относительно длинных маршрутов. Установлено, что разработанные модели позволяют определить зависимость уровня помех и SNR от плотности сети, производимого трафика и мощности передатчиков.


2012 ◽  
Vol 197 ◽  
pp. 643-648
Author(s):  
Khushboo Tripathi ◽  
S.D. Dixit

In this paper the application spectrum of wireless ad hoc network is a typical battle field monitoring system for the public safety purpose and military sector where the sensor network simulator architecture is used to provide support for sensing capabilities in network nodes for different mobility conditions. Rayleigh and Rician fading (K=3) model is used for the effect of channel fading in the network scenario. The channel fading incurs extra network overhead in the PHY, MAC and Network layer. A comprehensive study on the performance of ad hoc network routing protocols under realistic network scenarios with the effect of channel fading models is presented.


2013 ◽  
Vol 9 (3) ◽  
pp. 261-280 ◽  
Author(s):  
Federico Mari ◽  
Igor Melatti ◽  
Enrico Tronci ◽  
Alberto Finzi

A Mobile Ad-hoc NETwork (MANET) is Multi Administrative Domain (MAD) if each network node belongs to an independent authority, that is each node owns its resources and there is no central authority owning all network nodes. One of the main obstructions in designing Service Advertising, Discovery and Delivery (SADD) protocol for MAD MANETs is the fact that, in an attempt to increase their own visibility, network nodes tend to flood the network with their advertisements. In this paper, we present a SADD protocol for MAD MANET, based on Bloom filters, that effectively prevents advertising floods due to such misbehaving nodes. Our results with the ns-2 simulator show that our SADD protocol is effective in counteracting advertising floods, it keeps low the collision rate as well as the energy consumption while ensuring that each peer receives all messages broadcasted by other peers.


Author(s):  
Andrew Makhorin ◽  
Maxim Terentiev

This article considers a problem to choose parameters of a procedure for changing node roles in a multi-gateway wireless ad hoc network used in aerospace systems. Mathematical formulation of a mixed-integer programming (MIP) model to optimize the changing-node-role-procedure parameters is proposed, where the attention is focused on appropriate parameterization in order to make it possible to include additional constraints, if necessary. A practical two-stage technique used by the authors to solve the considered problem is briey discussed. On the first stage, the branch-and-bound algorithm, provided with cutting plane constraints of some classes, is applied to choose optimal roles of the network nodes. On the second stage, the network simulator developed by the authors is used to estimate main characteristics of the resulting network. Workability of the proposed approach is demonstrated by results of computational experiments.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


Sign in / Sign up

Export Citation Format

Share Document