scholarly journals ANALISA PENGARUH DATA RATE PADA MANET DENGAN MENGGUNAKAN ROUTING PROTOCOL AODV (REAKTIF)

2019 ◽  
Vol 6 (1) ◽  
pp. 68
Author(s):  
Anisa Widayanti ◽  
I Gusti Agung Komang Diafari Djuni ◽  
N.M.A.E Dewi Wirastuti

Mobile Ad hoc Network (MANET) is a dynamic wireless mobile node network, without using network infrastructure such as limited power (because it uses batteries). Mobility of each node that is able to move in all directions, and autonomy of each node in determining its own route to forward the data plan. Therefore, in this study we will see the performance of MANET on IEEE 802.11 g WLAN with a data rate that is different from an AODV routing protocol. This simulation observes changes in data rates ranging from 1, 2.5 Mbps, using WLAN 802.11 g. For parameters used in the data rate starting from 1, 2, 5, Mbps using WLAN 802.11 g obtained the Package Loss value at a data rate of 5 Mbps by 0.98%, the highest value of the highest throughput was generated at a data rate of 1 Mbps of 313,715 bps, and the delay for the data rate of 5 Mbps was 0.0008 second.

2018 ◽  
Vol 33 (4) ◽  
pp. 357-378 ◽  
Author(s):  
Luong Thai Ngoc ◽  
Vo Thanh Tu

Ad hoc On-demand Distance Vector (AODV) routing protocol is one of the most popular reactive protocol used for Mobile Ad hoc Network, is target of many attack types. Some research works published related to improve of AODV based on digital signature, typical as SAODV and ARAN. However, they have some weakness, malicious can pass over security wall of SAODV by using fake keys, both of SAODV and ARAN can't detect wormhole nodes in hide mode. In additions, detection solutions based on characteristics of attack types have proposed, they only bring about efficiency for each independent type of attack and malicious nodes can join to the discovered route by deliberately giving fake information concerning. This article proposes a trust authentication mechanisms (TAM) using public-key cryptograms RSA and digital certificates (DC) based on X509 standard. TAM allows a mobile node authenticates preceding nodes by checking control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. Analysis results confirm that TAM can detect and prevent almost current routing protocol attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and participation mode Wormhole attacks. Specially, the simulation results in NS2 show that TAM can detect and prevent successful to 100\% malicious nodes using fake keys for all scenarios based on the number of UDP connections, 100% hide mode wormhole nodes for immobility scenarios and above 99% (the mistaken rate below 1.0%) for all mobility scenarios with 30m/s of maximum speeds and 1hop minimum tunnel length.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2013 ◽  
Vol 6 (1) ◽  
pp. 705-710
Author(s):  
Kavita Kundlik Bondre ◽  
Prof. Ajitsinh.N. Jadhav

Mobile ad hoc network is a collection of wireless nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. The network topology dynamically changes frequently in an unpredictable manner since nodes are free to move. Support for multicasting is essential in such environment as it is considered to be an efficient way to deliver information from source nodes to many client nodes. On-Demand Multicast Routing Protocol is a protocol for routing multicast and unicast traffic throughout adhoc wireless mesh networks. ODMRP creates routes on demand so they suffer from a route acquisition delay,although it helps reduce network traffic in general. In future this  results will be compared with AODV and FSR protocol and ODMRP performs better as compared with AODV and FSR protocol.


Sign in / Sign up

Export Citation Format

Share Document