Localization and Non-Localization Node Identification Using Dream in MANET

2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Amit Singh ◽  
Nitin Mishra ◽  
Angad Singh

 A Wireless Mobile Ad-hoc Network consists of variety of mobile nodes that temporally kind a dynamic infrastructure less network. To modify communication between nodes that don’t have direct radio contact, every node should operate as a wireless router and potential forward knowledge traffic of behalf of the opposite node. In MANET Localization is a fundamental problem. Current localization algorithm mainly focuses on checking the localizability of a network and/or how to localize as many nodes as possible. It could provide accurate position information foe kind of expanding application. Localization provide information about coverage, deployment, routing, location, services, target tracking and rescue If high mobility among the mobile nodes occurs path failure breaks. Hence the location information cannot be predicted. Here we have proposed a localization based algorithm which will help to provide information about the localized and non-localized nodes in a network. In the proposed approach DREAM protocol and AODV protocol are used to find the localizability of a node in a network. DREAM protocol is a location protocol which helps to find the location of a node in a network whereas AODV is a routing protocol it discover route as and when necessary it does not maintain route from every node to every other. To locate the mobile nodes in a n/w an node identification algorithm is used. With the help of this algorithm localized and non-localized node can be easily detected in respect of radio range. This method helps to improve the performance of a module and minimize the location error and achieves improved performance in the form of UDP packet loss, received packet and transmitted packets, throughput, routing overhead, packet delivery fraction. All the simulation done through the NS-2 module and tested the mobile ad-hoc network.

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


Mobile Ad hoc Network is a decentralized network which can be deployed instantly. Routing is a very challenging task in this network due to dynamic movement of mobile nodes. Various routing protocols such as OLSR, DYMO and ZRP are proposed to establish the route for the data packets in MANET’s. As deploying of the protocols into real environment is a cost expensive process, the protocols are initially evaluated through a simulated arena. Many of the mobile devices are battery equipped and each protocol consumes energy in different manner. In this paper, energy consumption evaluation is carried out on OLSR, DYMO and ZRP protocols in a grid environment. The experiments have shown that DYMO protocol has less energy consumption when compared to OLSR and ZRP protocols.


2021 ◽  
Author(s):  
Md. Moinuddin Bhuiyan

Advances in wireless technology and mobile computing have provided a major impetus towards development of P2P network over MANET. Both peer-to-peer overlays and mobile ad-hoc network share the key characteristics of self-organizing and decentralization; both need to solve same fundamental problem, that is, how to route queries or packets efficiently. Congestion affecting the performance of P2P overlay on wireless ad-hoc network occurs not only due to buffer overflow but also due to error prone nature of the wireless medium used and the mobility of users. When paths of multiple downloading sessions intersect with each other, they mutually cause congestion for each other that result in packet drops. We identified that P2P MANET suffers query performance primarily due to significant congestion during download session. The unawareness of congestion in P2P MANET system may lead to the longer user response time, high overhead and many packet losses. In order to alleviate the congestion problem, we propose a modification to RAON, CANON, which includes congestion awareness for improving the RAON performance. We evaluated our system through simulation, which shows that CAON improves the performance of query success rate, query delay, packet losses significantly. We also evaluated the impact of mobility model on our system by simulating under both Random way point mobility model and Manhattan mobility model.


Author(s):  
Josh Kumar ◽  
A. Kathirvel

Mobile Ad hoc NETwork is a collection of mobile nodes connected with each other without any centralized infrastructure support. In MANET, every node acts as a router, thereby forwards the packet to other nodes through the best route possible. The cooperation of all other nodes is very essential for a node to transfer data to its desired destination. Throughput is a major factor that determines the health of any network including MANET and there can be many reasons that can disrupt the throughput. In this paper we deal with two prime reasons that may reduce the throughput in a MANET. The first reason is that, if a node behaves selfishly and utilizes the path only for forwarding its own packet, then the packets from other nodes will be dropped and the throughput will gradually get reduced. The second reason for reduction in throughput is the phenomenon called fading, which causes signal attenuation. This phenomenon creates path loss temporarily, during which the packet loss increases and the throughput takes a major hit. Removing such nodes from the network on the basis of doubt about its packet forwarding nature and ability will eventually weaken the network strength. Neglecting the original best route will also reduce the quality of the network. Both the cases of selfishness and fading can be normalized by switching over to an alternate path and coming back to the same route after a short period of time. Thereby the quality as well as the quantity of nodes involved in the network can be maintained. In this paper we have also introduced an innovation called helper nodes which will also help in the formation of alternate path and will very well neutralize the ill effects caused due to selfishness and fading.


2019 ◽  
Vol 16 (9) ◽  
pp. 3906-3911
Author(s):  
Karan Singh ◽  
Rajeev Gupta

Recent progression in the field of information and communication cause increase of packet count over the World Wide Web network. These communicated packets should deliver on time from origin node to destination node using a reliable and shortest route. In this way routing plays an important part in dispatching the packets to destination form the source. This routing becomes more crucial when packets delivery is done in independent mobile nodes which dynamically form a temporary network. This network named as Mobile Ad-Hoc Network and therefore it is said to be particular reason-specific, self-ruling and dynamic. In this paper we analyzed 3 protocols and for a quality of service (i.e., Packet Delivery Ratio) and achieved comparative study of various protocols of routing with respect to Operation of protocols, Route maintenance, Routing table, Route, Route selection, Routing structure, Routing Approaches, Protocol types, Merits and Demerits.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


Author(s):  
A. S. M. Muntaheen ◽  
Milton Chandro Bhowmick ◽  
Md. Raqibul Hasan Rumman ◽  
Nayeem Al-Tamzid Bhuiyan ◽  
Md. Taslim Mahmud Bhuyain ◽  
...  

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.


2021 ◽  
Vol 23 (05) ◽  
pp. 670-678
Author(s):  
R Anitha ◽  
◽  
B R Tapas Bapu ◽  
S Sundararajan ◽  
M Vengadapathiraj ◽  
...  

MANET is a mobile ad-hoc network that is made of several mobile nodes that can communicate in a multi-way without any fixed or regular infrastructure. Due to its special features such as its self-organization, easy deployment it has been preferred for many military and civil applications. MANET has also gained popularity in the multimedia field. MANET has certain levels of requirements such as QoS (Quality of Service), jitter and energy, bandwidth, and end-2-end delay. MANET’s one of the basic requirements is having QoS and should have efficient routing to support other applications. In this research paper, a special Genetic Algorithm known as the GA algorithm based on routing on a Mobile Ad-hoc network is designed and termed as GAMAN. The proposed model uses a 2 QoS system for routing. The outcome of this paper showed that the GAMAN method is a significant one for QoS in MANET.


Sign in / Sign up

Export Citation Format

Share Document