scholarly journals A Comprehensive Analysis of Mobile Ad-Hoc Routing Protocols Under Varying Node Densities

2012 ◽  
Vol 3 (2) ◽  
pp. 317-323
Author(s):  
Manpreet Kaur Kaler ◽  
Sonia Malhotra

Mobile ad-hoc network (MANET) is a well known wireless technology being used in present wireless systems and it influences the development of new structures and theories for the communication. The mobile communication in wireless field consists of various nodes communicating with each other through the relay nodes using multi-hope network system or directly. The MANET consists of many routing protocols. Dynamic communication field is mainly dealing area for these routing protocols of MANET. Now-a-days as mobile applications are increasing frequently, It is primary need to analyze these routing protocols to work with high node density and more data load. It motivates the use of various performance comparisons of AODV, DSR and OLSR protocols in mobile ad-hoc network. The comparison represents justified, more effective and reliable protocol for required mobile application. We can analyze these protocols performance on the basis of various matrices like End to End delay, Network load, Re-Transmission attempts and Throughput Using OPNET simulator software tool. The graphical representations are presented here to support the results carried out in this paper.

Author(s):  
Prashant Rewagad ◽  
Nisha A. Lodha

Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently and thus, routing become challenging task to transfer the data from source to destination. A variety of routing protocols with varying network conditions are analyzed to find an optimized route from a source to some destination. This paper is based on performance comparison of two popular mobile ad-hoc network routing protocols using simulator i.e. DSR, ADOV. On the network simulation platform, a systematically simulation and research has been carried out on the performance of two routing protocols, and how the network environments impact on the performance of routing protocol.


Author(s):  
K. Vinayakan ◽  
M. V. Srinath

There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.


Mobile Ad hoc network is a temporary network. It helps to communicate two or more devices for short range. Routing Protocols are use to establish a communication in MANET. As it is a open network , it has many vulnerabilities from security point. Black hole Attack is one of the major concern in MANET. In this paper, we have implemented Black hole Attack in random mobility environment and analyse its impact on MANET using various parameters for single and multiple connection in MANET. Black hole attack disturbs one of the connection in the network while remaining connection are unaffected. During our analysis, we found that performance result of black hole attack in multiple connection network give a similar kind of output mentioned in various research paper related to gray hole attack, which will make difficult to analysis the type of attack in the network.


Sign in / Sign up

Export Citation Format

Share Document