scholarly journals An Optimized Utilization of Battery Backup in MANET Using Modified Firefly Algorithm

Author(s):  
Manoj Kumar, Et. al.

Temporary connection failures and route changes happen in a Mobile Ad Hoc Network (MANET). MANET enjoys extensive variety of applications like in tactical networks, Sensor networks. Much battery backup is required while tuning a node that is far from the sender node While compared to the node which is near in respect to sender, In this paper we are proposing an approach of optimized utilization of battery backup in MANET Battery Backup is a main constraint in mobile ad hoc networks Most of the battery is wasted in tuning to the networks repeatedly there by making the mobile node vulnerable to Jail. This paper emphasize on proper utilization of battery backup by varying the signal strength according the distance of the nodes. Modified FireFly Algorithm (MFFA) is greatly utilized in this research for boosting up of battery backup. The cluster head should maintain a table for battery backup and decision of task distribution will be based on this table.

Author(s):  
Koushik Majumder ◽  
Debashis De ◽  
Senjuti Kar ◽  
Rani Singh

Mobile Ad hoc Networks (MANET) are wireless infrastructure less networks that are formed spontaneously and are highly dynamic in nature. Clustering is done in MANETs to address issues related to scalability, heterogeneity and to reduce network overhead. In clustering the entire network is divided into clusters or groups with one Cluster Head (CH) per cluster. The process of CH selection and route optimization is extremely crucial in clustering. Genetic Algorithm (GA) can be implemented to optimize the process of clustering in MANETs. GA is the most recently used advanced bio-inspired optimization technique which implements techniques of genetics like selection, crossover, mutation etc. to find out an improved solution to a problem similar to the next generation that inherits the positive traits and features of the previous one. In this chapter several genetic algorithm based optimization techniques for clustering has been discussed. A comparative analysis of the different approaches has also been presented. This chapter concludes with future research directions in this domain.


Mobile Ad hoc network (MANETs) is a selforganizing multi-hop wireless network with dynamic topologies. Due to the absence of Control Authority in MANET, the network seems to be vulnerable that can be easily destroyed by the entry of malicious nodes. The presence of malicious nodes can destroy the data transmission of the network. So, finding and removing the malicious nodes is one of the critical issues in the MANET. With the help of the proposed Coherence Key Based Node Authentication for Routing (CKR) Algorithm, each and every mobile node are authenticated while updating the routing table by using the authentication key value that is generated with the help of random number with the secret key. Only the authenticated nodes (non-Malicious Nodes) are updated in the routing table and the remaining nodes which are not authenticated (malicious nodes) will be eliminated from the routing table. So that, the malicious node will not participated and could not destroy the data transmission. Thus, it makes this Multi-hop network as more trustful network.


Author(s):  
Wen-Jung Hsin ◽  
Lein Harn

Mobile ad hoc network is a network comprised of mobile nodes quickly forming an autonomous network for a particular purpose such as emergency search and rescue. One of the most prominent security challenges for such a network is the limited capacity in the mobile nodes, thereby preventing costly computation operations. However, this limitation on a mobile node manifests itself only when the mobile node is dispatched on an active duty (i.e., online). One can prepare the mobile nodes as much as possible offline in anticipation of an upcoming deployment. In this chapter, the authors present three offline/online authentication and key agreement schemes and one offline/online non-repudiation scheme, all aiming at fast online computation for mobile nodes in mobile ad hoc networks.


Author(s):  
Zulfekar Ahmad ◽  
Akhilesh Bansiya

Mobile Ad-hoc Network is a collection of wireless mobile node, consists of each wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node. IDS can be well-defined as the protector system which self-detects malicious activities within a network, and thus generates an alarm to alert the security device at a locality if intrusions are considered to be illegal on that network or host. There me many approach to classify IDS. In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Khalid Hussain ◽  
Abdul Hanan Abdullah ◽  
Saleem Iqbal ◽  
Khalid M. Awan ◽  
Faraz Ahsan

In mobile ad hoc network (MANET) cluster head selection is considered a gigantic challenge. In wireless sensor network LEACH protocol can be used to select cluster head on the bases of energy, but it is still a dispute in mobil ad hoc networks and especially when nodes are itinerant. In this paper we proposed an efficient cluster head selection algorithm (ECHSA), for selection of the cluster head efficiently in Mobile ad hoc networks. We evaluate our proposed algorithm through simulation in OMNet++ as well as on test bed; we experience the result according to our assumption. For further evaluation we also compare our proposed protocol with several other protocols like LEACH-C and consequences show perfection.


2017 ◽  
Vol 2 (7) ◽  
pp. 5-8
Author(s):  
Neeraj Verma ◽  
Kuber Mohan

Energy is a critical issue in Mobile Ad-hoc Network. Nodes in Network are working in presence of limited or less energy due to dynamic nature of nodes or infrastructure less network. MANET has no infrastructure so nodes in MANET work on dynamic routing. In this way, energy proficient routing is required for reducing energy utilization. Energy proficient routing plans can extraordinarily reduce energy utilization and augments the lifetime of the networks. Scalability of Ad Hoc Networks can be enhanced by using land data, for example, in LAR, GPSR etc. They utilize physical area data; regularly from GPS (Global Positioning System).GPS empowers a gadget to decide their position as in longitude, Latitude and Altitude by getting this data from the satellites. There has been significant effort in proposing energy efficient routing protocols with the help of GAGAN (GPS Aided GEO Augmented Navigation) which have accuracy to approx One meter in India or its neighbor countries. GAGAN is a route framework which is helped by both GPS and nearby telemetry information to possibly give quicker and more exact situating and navigational information.


2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


2021 ◽  
Author(s):  
Altaf Hussain ◽  
Muhammad Rafiq Khan

Abstract Mobile Ad-hoc Network (MANET) is the most emerging and fast expanding technology since the last two decades. One of the major issue and challenging area in MANET is the process of routing due to dynamic topologies and high mobility of mobile nodes. The exchange of information from source to a destination is known as the process of routing. Spectacular amount of attention has been paid by researchers to reliable routing in ad-hoc networks. Efficiency and accuracy of a protocol depends on many parameters in these networks. In addition to other parameters node velocity and propagation models are among them. Calculating signal strength at receiver is the responsibility of a propagation model while mobility of nodes is responsible for topology of the network. A huge amount of loss in performance is occurred due to variation of signal strength at receiver and obstacles between transmissions. Simulation tools are developed to analyze the weakness and strength of protocols along with different parameters that may impact the performance. The choice of a propagation models have an abundant effect on performance on routing protocols in MANET. In this research, it has been analyzed to check the impact of different propagation models on the performance of Optimized Link State Routing (OLSR) in Sparse and Dense scenarios in MANET. The simulation has been carried out in NS-2 by using performance metrics as average Throughput, average packet drop and average latency. The results predicted that propagation models and mobility has a strong impact on the performance of OLSR in considered scenarios.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 16
Author(s):  
T Dheepak ◽  
S Neduncheliyan

Mobile Ad Hoc Network is the centralized communication system which is used for transferring information through a secured mode from one end to another end. However, there is an energy loss that has been noticed in MANET. In this work, an efficient energy based Link Failure State Neighbor Detection Effective Efficient Protocol (LFSNDEEP) is to enhance the energy efficiency of the mobile node, and optimal transmission ratio computes Data, Audio, and Video packets. The proposed research on LFSNDEEP protocol is compared to Effective Efficient Neighbor Detection Protocol (EENDP) and which assigns the channel utilization. In this technique, the hello packet exchanges transmit based height and wavelength of the transmitter with particular distance. The computation of channel utility factor is the best method at link failure without data loss. The vitality utilization mathematical model is illustrated to show the nodes of least consumption by the broad recreation of utilization. The results observed from the proposed scheme shows that the energy level is minimized regarding the packet that loss is improved efficiently. In further, there are two results which can be gained in comparing with EENDP; firstly, packet delivery ratio and throughput get increased. And secondly, the end to end delay is decreased.


Sign in / Sign up

Export Citation Format

Share Document