scholarly journals Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network

Author(s):  
Veeresh Poola ◽  
Praveen Sam R ◽  
Shoba Bindu C

<p><span lang="EN-US">A Due to the rapid development of smart processing mobile devices, Mobile applications are exploring the use of web services in MANETs to satisfy the user needs. Complex user needs are satisfied by the service composition where a complex service is created by combining one or more atomic services. Service composition has a significant challenge in MANETs due to its limited bandwidth, constrained energy sources, dynamic node movement and often suffers from node failures. These constraints increase the failure rate of service composition. To overcome these, we propose Reliable Fault Tolerant System for Service Composition in MANETs (RFTSC) which makes use of the checkpointing technique for service composition in MANETs. We propose fault policies for each fault in service composition when the faults occur. Failure of services in the service composition process is recovered locally by making use of Checkpointing system and by using discovered services which satisfies the QoS constraints. A Multi-Service Tree (MST) is proposed to recover failed services with O(1) time complexity. Simulation result shows that the proposed approach is efficient when compared to existing approaches.</span></p>

2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Elham Zamani ◽  
Mohammadreza Soltanaghaei

Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable routing is one of the research aspects of MANET. In this paper, a proposed method, called M-AODV, which is a type of overhearing backup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the improvement of packet delivery rate and reduction of overhead and delay. Moreover, to assess the security of the proposed protocol, we simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results showed that M-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount of overhead had been increased.


2013 ◽  
Vol 798-799 ◽  
pp. 407-410
Author(s):  
Hong Song Chen ◽  
Xue Wei Shang ◽  
Fei Ye

With the rapid development of mobile ad hoc network, energy and trust are important to the network. Energy consumption and trust routing scheme are the main issues in mobile ad hoc network. Trust routing is related to many factors such as hop numbernode residual energy and node behavior. To use the multi-source information, multi-agent information fusion method is used to design trust routing scheme. The definition of trust routing is proposed. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme, Route Reply (RREP) Message is extended to record node residual energy and behavior information. NS-2 simulator is used to simulate different network scenarios. Simulation results show that low power trust routing scheme can improve the security and efficiency of network, the scheme is sensitive to node residual energy, so it extends the service lifetime of the network.


2021 ◽  
Vol 15 (1) ◽  
pp. 44-64
Author(s):  
Hatem Mahmoud Salama ◽  
Mohamed Zaki Abd El Mageed ◽  
Gouda Ismail Mohamed Salama ◽  
Khaled Mahmoud Badran

Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.


2018 ◽  
Vol 7 (2) ◽  
pp. 92-96
Author(s):  
V. Manju ◽  
R. Vadivel

In Mobile Ad hoc Network (MANET), the single path QoS routing is disadvantageous as it may cause interference, fading, collision and link failures. For QoS routing, the load balancing is necessary, because it allows a router to take advantage of best of multiple shortest paths to a given destination. It also avoids congestion within the network using multipath. While using the MQRLB, the Load balancing may cause some of the major issues such as Link failure, Out of range, Limited Bandwidth, due to this the load balancing in multipath function is not efficient.To overcome these issues, in this paper, MMQRLBMultipath Mobility Aware QoS Routing Load Balancingwith AODV(Ad-hoc on demand distance vector)protocol is proposed to improve the QoS in Load balancing.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


Sign in / Sign up

Export Citation Format

Share Document