scholarly journals Condensation-Based Routing in Mobile Ad-Hoc Networks

2012 ◽  
Vol 8 (3) ◽  
pp. 199-211 ◽  
Author(s):  
Francesco Palmieri ◽  
Aniello Castiglione

The provision of efficient broadcast containment schemes that can dynamically cope with frequent topology changes and limited shared channel bandwidth, is one of the most challenging research topics in MANETs, and is crucial to the basic operations of networks serving fully mobile devices within areas having no fixed communication infrastructure. This problem particularly impacts the design of dynamic routing protocol that can efficiently establish routes to deliver data packets among mobile nodes with minimum communication overhead, and at the same time, ensure high throughput and low end-to-end delay. Accordingly, this work exploits and analyzes an adaptive probabilistic broadcast containment technique based on a particular condensation phenomenon borrowed from Quantum Mechanics and transposed in self-organizing random networks, that has the potential to effectively drive the on-demand route discovery process. Simulation-based performance analysis has shown that the proposed technique can introduce significant benefits on the general performance of broadcast-based reactive routing protocols in MANETs.

Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


2018 ◽  
Vol 7 (3) ◽  
pp. 1626
Author(s):  
M V. Narayana ◽  
Aparnarajesh Atmakuri

The routing protocols in MANET are mainly classified into two type’s i.e. pro-active and reactive based protocol based on its problems in the network. One of the prime and foremost issues, which have gained a lot of scope, is its dynamic nature of the networks i.e. the stability of nodes is not guaranteed in the network. Hence, this leads to loss of data packets that needs for its retransmission. Many advancements and Novel protocols have been devised in recent years for efficiency and effectiveness in the ad hoc networks. However, hybrid routing proto-cols that inculcates the nature of reactive and proactive has gained a lot of importance. ZHLS is one of the Hybrid routing protocol, and is a two tier hierarchal routing that divides the area into zones in which mobile nodes move randomly. The process of promoting ZHLS protocol is purely based on homogeneous scenarios which mean the nodes in the network are statistically identical, but there is lack of studies for heterogeneous set-up where mobile nodes act in a different way in an identical network. In this paper, we try to propose a novel approach known as “Adaptive-ZHLS: AZHLS” that can be suitable for heterogeneous scenarios. Experimental set up and simulated results will show that AZHLS provides higher packet delivery fraction as compared with the traditional one. 


Author(s):  
Sunita Prasad ◽  
Rakesh Chouhan

Pervasive computing has wide application in military, medical and smart home domain. In pervasive computing, a large number of smart objects interact with one another without the user intervention. Although the technology is promising but security needs to be addressed before the technology is widely deployed. Pervasive networks are formed spontaneously and the devices communicate via radio. Thus, mobile ad hoc networking is an essential technology for pervasive computing. An ad hoc network is a collection of wireless mobile nodes, which acts as a host as well as a router. The communication between the nodes is multihop without any centralized administration. AODV (Ad Hoc On demand Distance Vector) is a prominent on-demand reactive routing protocol for mobile ad hoc networks. But in existing AODV, there is no security provision against well-known attack known as “Black hole attack”. Black hole nodes are those malicious nodes that agree to forward the packets to destination but do not forward the packets intentionally. Thischapter extends the watchdog mechanism for the AODV routing protocol to detect such misbehavior based on promiscuous listening. The proposed method first detects a black hole node and then gives a new route bypassing this node. The experimental results show that in a lightly loaded, hostile environment, the proposed scheme improves the throughput compared to an unprotected AODV protocol.


2018 ◽  
Vol 2018 ◽  
pp. 1-23 ◽  
Author(s):  
Alamgir Naushad ◽  
Ghulam Abbas ◽  
Ziaul Haq Abbas ◽  
Lei Jiao ◽  
Fazal Muhammad

Maintaining link stability among randomly deployed network nodes is one of the key challenges for effective communication in mobile ad hoc networks (MANETs). Under uniform speed and random trajectory of mobile nodes, there must be a unified model to determine an adequate strategy that addresses the issue of link stability in MANETs. We present a novel dynamic link connectivity (DLC) strategy that maintains link stability through efficient link connectivity among the neighboring nodes using Hello messaging. We also perform stochastic analysis of the proposed strategy, which predicts the future link status among the neighboring nodes at different time steps of a Markov process. We find that the link stability is affected by the received signal strength, signal-to-noise ratio, transition rates between the connection and disconnection states, and probabilities of link connectivity and disconnectivity at steady state. Analytical and simulation results indicate efficacy of the proposed strategy in terms of reduced communication overhead, lower propagation delay, and better energy efficiency of the network. The results also demonstrate that the proposed strategy minimizes the average response time, increases the throughput, and reduces the packet loss ratio, thereby, maintaining efficient link stability among the neighboring nodes.


Author(s):  
Hanadi Yahya Darwisho

    Due to the increased use of mobile devices with the high demand for applications such as video application, most companies have tended to pay attention to Mobile Ad hoc Networks. This type of network is characterized by multi-hop wireless networks where data packets are sent in a "store and forward" manner from the source to an arbitrary destination via intermediate nodes. The mobile nodes are connected by multi-routes routing as the nodes in this network not only serve as hosts but also as routers where data is routed to and from other nodes in the network and therefore the mobile node not only sends its data packets but also sends data packets of other mobile nodes. The network architecture changes dynamically, mainly because of Mobility of nodes, so we need routing protocols to establish the connection. Routing protocols are categorized into proactive routing protocols, reactive routing protocols and hybrid routing protocols. So in this research, we has been studied Geographical Routing Protocol (GRP ), Optimized Link State Routing Protocol (OLSR) routing protocols which is one of proactive routing protocols and hybrid routing protocols respectively on the basis of Throughput, Delay and Load..etc and evaluated the performance in a large mobile ad hoc network and in a small mobile ad hoc network as well as for different video resolutions, the OPNET 14.5 network simulator was used to obtain research results. It was found that the GRP protocol performs better for a small number of nodes whether the video resolution is low or high while its performance decreases when the number of nodes increases in the network but the OLSR protocol improves when the number of nodes is increased.    


Mobile Ad hoc Networks (MANET) comprises a collection of numerous mobile nodes that communicates with one other with no dependence on any predefined infrastructure in the network. The characteristics of MANET such as independent, wireless, and self-configuration of MANETs allows the suitability of various application scenarios. Cluster based Flooding is an important issue in the design of MANET where it is an order to manage data traffic as it utilizes a set of chosen nodes to transmit data between two nodes. MANET networks frequently structured with mobile devices for enabling data transmission. An essential process of selecting forwarding set in the inter-cluster flooding. The routing protocol employ in the network often defines the energy efficiency and network performance in ad hoc networks. This paper presents a new deterministic directed flooding scheme (D2FS) for effectively choose the forwarding set for effective inter-cluster flooding. In addition, a Cluster Based Flooding utilizing Fuzzy Logic Scheme (CBF2S) to effectively transmit data is also presented. The devised D2FS model is tested using NS2 tool with respect to the existence of diverse hop counts. An extensive experimentation takes place to prove the superiority of the D2FS with respect to overhead, communication overhead, traffic load, packet delivery ratio and end to end delay.


2013 ◽  
Vol 8 (1) ◽  
pp. 692-697
Author(s):  
Priyanka Sharma ◽  
PK Gaur ◽  
Lal Pratap Verma

The highly dynamic nature of MANETs results in frequent and unpredictable changes in the network topology, which add to the difficulty and complexity to routing among the mobile nodes within the network. Thus, establishing communication among mobile nodes is a great challenge in itself, resulting in network overloading & discarding of data packets. Nodes can change position quite frequently, which means we need a routing protocol that quickly adapts to the topology changes which is our objective.  In this paper focus has been put on the strategy to address the packet drop ratio which is an integral and important factor of communication in MANETs by minimizing the request zone. In Mobile Ad-Hoc Networks, as the coverage area increases the packet drop ratio also increases which degrades the network performance and Quality of Service (QOS).Location Aware Routing  will be used as a base protocol for the proposed work which is a class of Reactive protocol to design optimized routing algorithm.


Author(s):  
Abdul Shabbir ◽  
Anasuri Sunil Kumar

Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines of defense. This paper discusses a fool proof key exchange mechanism and a network model to protect the network containing malicious nodes. The reputation of a node increases as long as the node transfers the message properly and decreases otherwise. Moreover, it has minimum computation and communication overhead which makes it viable.


2019 ◽  
Vol 8 (3) ◽  
pp. 8192-8198

Mobile Ad hoc Networks is configured by itself using the Mobile nodes in the Network, the maintenance also done by the wireless nodes itself. Dynamic topology, hop-to-hop communication and open-to-all are the features of MANETS, but these features made security of network highly challengeable. From security concern, routing protocols are highly vulnerable to many security threats like black hole attack. In black hole attack malicious node generates false routing information to the path requests about the route it asked for, which results all data packets forward toward it-self by the source and the black hole node manipulate its data. The cooperative black hole nodes in the other hand cooperate within the malicious nodes to fool the single black hole attack prevention algorithms. Here an approach is proposed to detecting the cooperative black holes nodes and eliminate them by broad casting there information into the network.


2021 ◽  
Vol 50 (1) ◽  
pp. 45-54
Author(s):  
CR Rathish ◽  
K Karpagavadivu ◽  
P Sindhuja ◽  
A Kousalya

MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection System (IDS). The power utilization is more in MANET as the IDS needs to be active for the whole time on each node. Considering this, we have designed a clustering-based proposal for Ad-hoc networks. To lower the communication overhead, the CH detection is called upon for establishing the path Weighted Clustering Algorithm (DCA) that is utilized to construct path. The proposed Distributed Clustering Algorithm dependent Invader Detection System (DCAIDS) is designed such that it reduces the overall delay during transmission in a network. The intruder attacks are identified by IDS and that particular nodes are detached from the cluster. When the particular target node receives the packets, it acknowledges its reception by sending RREP message so that the sender can send the intended data packets thereafter. Thus, an efficient and delay tolerant path is established which in turn intensifies the certainty of MANET.     


Sign in / Sign up

Export Citation Format

Share Document