scholarly journals Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

2014 ◽  
Vol 8 (1) ◽  
pp. 777-781
Author(s):  
Xiangju Liu

To analyze the privacy and reliability of Ad Hoc Network-based algorithms used in agricultural wireless data transmission, the paper introduces the routing protocols including DSDV, AODV and DSR, based on which a farmland model is built to simulate the speed and density of mobile node, and regards the success rate of data transmission (R/S Rate), average latency of end-to-end (E2E Delay) and average hops as the evaluation indicator of farmland information transfer system. As a result of the analysis, the privacy and reliability are influenced by the speed and density of mobile nodes; the higher the speed is and the lower the density is, the lower the R/S Rate is; AODV routing protocol is better in R/S Rate while DSDV routing protocol does better in both E2E Delay and average hops. It is concluded that DSDV routing protocol suits most the Ad Hoc network-based farmland information transfer system.

Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


2019 ◽  
Vol 6 (1) ◽  
pp. 68
Author(s):  
Anisa Widayanti ◽  
I Gusti Agung Komang Diafari Djuni ◽  
N.M.A.E Dewi Wirastuti

Mobile Ad hoc Network (MANET) is a dynamic wireless mobile node network, without using network infrastructure such as limited power (because it uses batteries). Mobility of each node that is able to move in all directions, and autonomy of each node in determining its own route to forward the data plan. Therefore, in this study we will see the performance of MANET on IEEE 802.11 g WLAN with a data rate that is different from an AODV routing protocol. This simulation observes changes in data rates ranging from 1, 2.5 Mbps, using WLAN 802.11 g. For parameters used in the data rate starting from 1, 2, 5, Mbps using WLAN 802.11 g obtained the Package Loss value at a data rate of 5 Mbps by 0.98%, the highest value of the highest throughput was generated at a data rate of 1 Mbps of 313,715 bps, and the delay for the data rate of 5 Mbps was 0.0008 second.


Ad-hoc network is a network of moving wireless nodes which do not have a central or permanent influence over their connections. It is a mobile node device that is auto configured and connected to an arbitrary infrastructure through wireless connections. Therefore, due to the highly complex environment, MANET routing is acrucial activity. Various protocols are used to enhance the routing process, such that a network route is found between every transmitter and the host receiver. In this post, we modified the AODV protocol to increase the rate of throughput, end-to-end delays, and packet distribution, etc. We used ns3 simulator to compare the protocols AODV, DSDV, OLSR and Enhanced AODV. It is noteworthy that EAODV routing protocols perform much better than OLSR that the DSDV routing protocol provides high throughput, a lower latency and high delivery ratio of packages. In addition, our proposed energy efficient model has changed conventional AODV. Our improved EAODV protocol's overall performance is 3% superior to other conventional protocols.


Ad hoc network paved way to various researches and application due to its wide acceptance over wired network. The advance has also led to various drawbacks or problems that can result in unauthorized usage of data or in data loss. So secured data transfer has become an important requirement in any Ad hoc network. Various issues exist in Ad hoc network while data transmission and hence it has become a major requirement to develop an efficient routing protocol that can transmit the data securely over the network. So, this paper provides a solution, intend to develop an approach for making the data transmission more secured and feasible. This paper incorporates double encryption scheme to secure the data where we use Hybrid DNA based cryptosystem and blow fish algorithm for authentication of users. Also, we design an efficient optimal routing protocol that makes the transmission secured by reducing various attacks that occur in the network. It provides the security for image transmission over internet effectively. This technique also can be extended in multimedia security over the internet. The network parameters will be approximately judged in order to demonstrate the performance of the scheme we develop.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


Author(s):  
Khalid Kandali ◽  
◽  
Hamid Bennis ◽  

The high mobility and frequent changes in the network topology remain a great divergence between Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET). This makes existing routing protocols for MANET imperfect for a VANET environment. In order to ensure good data transmission between vehicles, it is mandatory to improve these protocols to this new environment. Ad-hoc On-demand Distance Vector (AODV) is one of the most proposed reactive protocols in the literature for MANET, but its direct application in VANET returns poor performance results. In this paper, we propose an Efficient Routing Protocol using an improved Distance-Based Broadcasting and Fuzzy Logic System (ERPFL), which is an extension of the AODV routing protocol. In the first, the proposed scheme uses an improved Distance-Based Broadcasting method in route discovery process. Each vehicle selects the most suitable neighbours to send a route request, using different mobility parameters such as distance, velocity and direction. Then, the destination vehicle selects the best route from the most reliable routes received, using the Fuzzy Logic System. Link Expiration Time and Link Reliability Model are considered input metrics for this system. The simulation results show that ERPFL saves network bandwidth resources which contributes to a higher data transmission ratio. In addition, our proposed protocol efficiently distributes data packets, decreases the hop count and reduces network routing time.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Mohammad Sirajuddin ◽  
Ch. Rupa ◽  
Celestine Iwendi ◽  
Cresantus Biamba

Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.


2013 ◽  
Vol 11 (10) ◽  
pp. 3065-3070
Author(s):  
Roopali Garg ◽  
Guneet Kaur

Mobile ad hoc network is an assembly of mobile nodes with no centralized server. Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from source to destination.  QoS can be defined in terms of various metrics like delay, bandwidth, packet loss, routing overhead, jitter. Routing can be unicast, multicast or multipath.  This paper presents the description about the QoS multipath routing algorithm.


2014 ◽  
pp. 6-11
Author(s):  
Kazuhiro MIZOGUCHI ◽  
Shinichi FURUSHO ◽  
Teruaki KITASUKA ◽  
Tsuneo NAKANISHI ◽  
Akira FUKUDA

An ad-hoc network works without any infrastructures. It consists of wireless mobile nodes .In this paper, we propose an ad-hoc network routing protocol, called FR-DSR(Fast Reconnect Dynamic Source Routing), which is an improved DSR. When a route is disconnected, FR-DSR can reconnect fast by using prepared spare routes. During communication, spare routes are prepared by sending route check packets through routes in a cache, and an additional route request packet is sent if a spare route is broken. We show that FR-DSR gives better performance than DSR through simulation experiments.


2018 ◽  
Vol 33 (4) ◽  
pp. 357-378 ◽  
Author(s):  
Luong Thai Ngoc ◽  
Vo Thanh Tu

Ad hoc On-demand Distance Vector (AODV) routing protocol is one of the most popular reactive protocol used for Mobile Ad hoc Network, is target of many attack types. Some research works published related to improve of AODV based on digital signature, typical as SAODV and ARAN. However, they have some weakness, malicious can pass over security wall of SAODV by using fake keys, both of SAODV and ARAN can't detect wormhole nodes in hide mode. In additions, detection solutions based on characteristics of attack types have proposed, they only bring about efficiency for each independent type of attack and malicious nodes can join to the discovered route by deliberately giving fake information concerning. This article proposes a trust authentication mechanisms (TAM) using public-key cryptograms RSA and digital certificates (DC) based on X509 standard. TAM allows a mobile node authenticates preceding nodes by checking control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. Analysis results confirm that TAM can detect and prevent almost current routing protocol attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and participation mode Wormhole attacks. Specially, the simulation results in NS2 show that TAM can detect and prevent successful to 100\% malicious nodes using fake keys for all scenarios based on the number of UDP connections, 100% hide mode wormhole nodes for immobility scenarios and above 99% (the mistaken rate below 1.0%) for all mobility scenarios with 30m/s of maximum speeds and 1hop minimum tunnel length.


Sign in / Sign up

Export Citation Format

Share Document