scholarly journals Improving fairness among TCP flows crossing wireless ad hoc and wired networks

Author(s):  
Luqing Yang ◽  
Winston K.G. Seah ◽  
Qinghe Yin
Keyword(s):  
Ad Hoc ◽  
2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


Author(s):  
Sukant Kishoro Bisoy ◽  
Prasant Kumar Pattnaik

The Transmission Control Protocol (TCP) is a reliable protocol of transport layer which delivers data over unreliable networks. It was designed in the context of wired networks. Due to popularity of wireless communication it is made to extend TCP protocol to wireless environments where wired and wireless network can work smoothly. Although TCP work in wireless and wired-cum-wireless network, the performance is not up to the mark. In literature lot of protocols has been proposed to adopt TCP in wireless mobile ad hoc network. In this, we present an overall view on this issue and detailed discussion of the major factors involved. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. Specifically, we show how TCP can be affected by mobility and its interaction with routing protocol in static and dynamic wireless ad hoc network.


Author(s):  
Shaik Shakeel Ahamad ◽  
V. N. Sastry ◽  
Siba K. Udgata

In this chapter, the authors propose a secure payment framework in mobile ad hoc network for disaster areas. In order to enable transactions in a disaster area using existing payment systems, we need infrastructure to communicate such as wired networks and base stations for cellular networks which are damaged by natural disasters. The authors propose to use mobile agent technology and digital signature with message recovery (DSMR) mechanism based on ECDSA mechanism to enable transactions in a disaster area using ad hoc networks.


Author(s):  
Sarra Cherbal ◽  
Abdellah Boukerram ◽  
Abdelhak Boubetra

Structured peer-to-peer (P2P) systems have shown over time a high performance to P2P users. They are typically applied on Internet and wired networks. On the other hand, the evolution of mobile devices and the popularity of infrastructure-less wireless networks as mobile ad-hoc networks (MANET), make of them an interesting underlay for P2P overlays. However, their energy consumption stills a critical element with limited-energy batteries, and the most principal cause of energy consumption is the immense overhead. The aim of this work is to apply the Chord protocol on MANET underlay, in order to benefit from the efficient content-sharing process and the infrastructure-less mobility. At the same time, this work aims to conserve a good level of energy consumption and network lifetime. Therefore, it proposes a novel mechanism of locality awareness and replication of data that attempts to improve the lookup efficiency and reduce the traffic overhead.


2014 ◽  
Vol 10 (4) ◽  
pp. 407-425 ◽  
Author(s):  
Kai He ◽  
Min-Rong Chen ◽  
Yijun Mao ◽  
Xi Zhang ◽  
Yiju Zhan

A Mobile Ad-hoc Network (MANET) is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Such networks are more vulnerable to security attacks than conventional wired networks, and hence cryptographic schemes are usually used to ensure security for them. It is worth noting that the nodes in MANETs are with low computational power and communicate over relatively bandwidth constrained wireless links, and thus the deployed cryptographic schemes should usually be highly efficient in term of both computational cost and communication overhead. To ensure the data confidentiality for MANETs, in this paper, we present a new hierarchical identity-based encryption (HIBE) scheme, which enjoys the advantages of low computational cost and light communication overhead. We further propose a new hierarchical identity-based key encapsulation mechanism (HIBKEM) based on our HIBE scheme. The proposed HIBKEM scheme is fully secure against adaptive chosen-ciphertext attack, and has a tight security reduction in the standard model.


Author(s):  
Phat Nguyen Huu

Wireless sensor network (WSN) is a network through radio waves to link a large number of unevenly distributed nodes on a wide range of areas for the purpose of sensing, processing and collecting data.The data transmitted in WSNs is usually sensitive that needs to be protected. WSNs are more vulnerable to attacks due to network characteristics such as wireless transmission, changing network topologies, computing power, limited memory and power of nodes comparing to wired networks. There are many types of attacks on WSNs such as sinkhole attacks, data integrity attacks, wormhole attacks, Black hole attacks, etc. In this article, we will evaluate the impact of Black-hole attacks in the WSN network when using the AODV routing protocol (Ad-hoc On-demand Distance Vector routing). The Black hole attack model will be simulated by Network Simulator 2 (NS-2) by the number of lost packets by counting the number of packets sent by the sending node, receiving packets to destination, and rest energy of the nodes in two cases.


2018 ◽  
Vol 2 (3) ◽  
pp. 11-18 ◽  
Author(s):  
Junaid Chaudhry ◽  
Kashif Saleem ◽  
Paul Haskell-Dowland ◽  
Mahdi H. Miraz

A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security


Security is one of the most vital aspect for implementing FANETs in adverse environments. Hence, research in this area has emerged as an important FANETs field in the recent past. Compared to wired networks, FANETs are more vulnerable to security attacks due to lack of a trusted centralized authority and easy eavesdropping. Further, as nodes in flying ad-hoc networks are susceptible to attacks, a trust model based on direct, as well as indirect trust degrees from similar trusted neighbors is integrated in order to overcome the vulnerability due to attacks by malicious/selfish nodes and to provide reliable packet transmissions. Fading away of trust is incorporated with a perspective to ensure the uncertainty of trust with time until it is updated. Also, AODV algorithm is used for routing in combination with calculated trust values so that efficient transmission of messages can take place.


2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Robert A. Sowah ◽  
Kwadwo B. Ofori-Amanfo ◽  
Godfrey A. Mills ◽  
Koudjo M. Koumadi

A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges. These networks are more susceptible to attacks such as black hole and man-in-the-middle (MITM) than their corresponding wired networks. This is due to the decentralized nature of their overall architecture. In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for control of nodes attacked. The ANN classification algorithm for intrusion detection was evaluated using several metrics. The performance of the ANN as a predictive technique for attack detection, isolation, and reconfiguration was measured on a dataset with network-varied traffic conditions and mobility patterns for multiple attacks. With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. This work is intended to be an opening for future malicious software time signature creation, identification, isolation, and reconfiguration to supplement existing Intrusion Detection Systems (IDSs).


Author(s):  
Muhammad Mahmudul Islam ◽  
Ronald Pose ◽  
Carlo Kopp

Ad-hoc networks have been the focus of research interest in wireless networks since 1990. Nodes in an ad-hoc network can connect to each other dynamically in an arbitrary manner. The dynamic features of ad-hoc networks demand a new set of routing protocols that are different from the routing schemes used in traditional wired networks. A wide range of routing protocols has been proposed to overcome the limitations of wired routing protocols. This chapter outlines the working mechanisms of state-ofthe- art ad-hoc routing protocols. These protocols are evaluated by comparing their functionalities and characteristics. Related research challenges are also discussed.


Sign in / Sign up

Export Citation Format

Share Document