scholarly journals A survery on platform of secured routing algorithm

2018 ◽  
Vol 7 (2.26) ◽  
pp. 35
Author(s):  
Miss Divya ◽  
Dr R. Gobinath

This paper describes the characteristics and techniques of Ad Hoc network. Ad Hoc networks are temporary network, set anywhere with-out any need of external infrastructure like wires. The essential premise of this paper is to exchange confidential message over wireless medium without route break and unauthorized eavesdroppers. In recent years, the research of routing protocol for AdHoc network has caused public concern widely. The multi hopping routing protocol has failed to meet the needs of network topology and route restructure. It must also consider the bandwidth and high error rate. The new routing protocol suitable for solving these problems in Ad Hoc network is AODV. 

2018 ◽  
Vol 9 (1) ◽  
pp. 51-65
Author(s):  
Soumen Saha ◽  
Utpal Roy ◽  
D.D. Sinha

Vehicular ad-hoc networks or VANETs are a new method of training an ad-hoc network in traffic. The authors have numbers of routing algorithms on a MANET. But none of them works efficiently in a VANET with respect to being a safe and secure transport system. The authors have proposed a modification on an AODV routing algorithm for VANET with the introduction of the double-ended queue or dqAODV in a request packet header. A comparable good result was found in the throughput. In the present work, the authors introduce a modification of an original AODV by applying a partial re-broadcast of the request packet (RREQ) of an AODV. They found a comparable result in the throughput of the packet delivery aspect for this work with the original algorithm and dqAODV. This is compared to the complexity in the original AODV algorithm.


Author(s):  
Neelam Chauhan ◽  
Paramjeet Singh

An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises its view of the interconnection topology with other Mobile Hosts within the network. This amounts to a new sort of routing protocol. This paper is practically applied using the specifications that are defined through Highly Dynamic Destination Sequenced Distance Vector Routing Algorithm.


Mobile ad hoc networks (MANETs) are collection of nodes connected through wireless medium and do not require infrastructure for operation. Network Topology keeps on changing because mobility of nodes are high. Therefore, it is important for MANETs to provide excellent routing and security features. Since MANETs do not require any pre-existing infrastructure, they are extensively used in emergency and rescue and military applications. MANETs thus will form essentially an important part in wireless networks. In this paper, Ad hoc On-Demand Distance Vector (AODV) and Greedy Perimeter Stateless Routing (GPSR) routing protocol performance is compared with respect to Throughput and E2ED and observed that there is an improvement in throughput by 11% in case of GPSR. Simulation is performed using NS3.


2018 ◽  
Vol 7 (3) ◽  
pp. 1674
Author(s):  
Dania Mohammed ◽  
Ahmed Ghanim Wadday

the successful solutions used to manage traffic at intersections is the Vehicular ad hoc Network (VANET). The main problems in VANET are the preparation of the blocked route, repeated topology differences, and continuous vehicle movement. These problems are difficult to route data towards destinations. To work around this problem, use the Position-Based Routing Protocol (MDORA) name. One of the objectives of this protocol is to choose the best way to rely on the jump by the jump and on the footing of the farthest dis-tance of the interface from the source, thus ensuring the full transfer of data. This protocol reduces frequent connections by detecting the following packets and sending packets without first discovering the path. The environment is simulated by the Matlab program to show protocol results. The random distribution of nodes generation in the simulation environment has been changed in order to change con-tract locations compared to the first state of simulation and to show new result in second state of the protocol. as well The time unit value is also changed to reach the ratio of the number of dropped packets.  


Author(s):  
Jhum Swain

A mobile ad hoc network (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the node partake in acting as both router and host and is in charge for accelerating packets to other nodes. This chapter discusses the various attacks on different layers and on various security protocols. So, designing a secure routing protocol is a main challenge in MANET. As we all know, this is a mobile ad hoc network so nodes in the network dynamically establish paths among each other so it is vulnerable to different kinds of threats. So, in this case, we need secured communication among the nodes present in the network.


Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.


Author(s):  
Sudesh Kumar ◽  
Abhishek Bansal ◽  
Ram Shringar Raw

Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a wireless network through unmanned aerial vehicles (UAVs). In this network, the UAV nodes work as intermediate nodes that communicate with each other to transmit data packets over the network, in the absence of fixed an infrastructure. Due to high mobility degree of UAV nodes, network formation and deformation among the UAVs are very frequent. Therefore, effective routing is a more challenging issue in FANETs. This paper presents performance evaluations and comparisons of the popular topology-based routing protocol namely AODV and position-based routing protocol, namely LAR for high speed mobility as well as a verity of the density of UAV nodes in the FANETs environment through NS-2 simulator. The extensive simulation results have shown that LAR gives better performance than AODV significantly in terms of the packet delivery ratio, normalized routing overhead, end-to-end delay, and average throughput, which make it a more effective routing protocol for the highly dynamic nature of FANETs.


2013 ◽  
Vol 834-836 ◽  
pp. 1087-1090
Author(s):  
Ping Zong ◽  
Jun Qin

With the expansion of the network, especially in the case of the nodes frequently moving, clustering routing protocol can reduce the impact of the changed topology on routing protocols, and improve the network scalability and reduce routing overhead. Based on the analysis of the problems of CBRP clustering routing protocol, this paper presents a CRBAC clustering routing algorithm based on ant colony algorithm. The simulation results show that, in the circumstance that the algorithm doesnt significantly increase the routing overhead, improved clustering routing protocol CRBAC get better performance than CBRP. They reflect on the clusters structure more reasonable and stable, the average end-to-end delay and network lifetime significantly improved.


2013 ◽  
Vol 756-759 ◽  
pp. 1059-1062 ◽  
Author(s):  
Xue Bing Wang

By making small adjustment to general ad hoc network architecture, we build a network topology with short average path length and high clustering coefficient, which are two important metrics of ad hoc networks. Furthermore, an efficient probabilistic flooding routing algorithm is proposed based on this network model. Simulation results show that this architecture behaves better performance than its ordinary counterpart.


2017 ◽  
Vol 11 (5) ◽  
pp. 30 ◽  
Author(s):  
Zaid A. Abdulkader ◽  
Azizol Abdullah ◽  
Mohd Taufik Abdullah ◽  
Zuriati Ahmad Zukarnain

Vehicular ad hoc network (VANET) technologies are evolving networked communications advances that incorporate mobile-based routing protocol sets for inter-vehicular exchanges of information in support of smart transportation networks. Privacy and security difficulties are primary concerns in VANET research as a result of the repeated vehicular movements, time-critical responses, and hybrid VANET architectures that differentiate these from other ad hoc networking types. Therefore, the design of secure mechanisms for authenticating and validating message transmissions between vehicles and eliminating adversarial elements from networks are of considerable importance in VANET research. This report offers a review of VANET features and security difficulties. The paper also summarizes certain chief threats to the authentication, confidentiality, and availability of secure services.


Sign in / Sign up

Export Citation Format

Share Document