scholarly journals A Preliminary Study of Routing Protocols in a Tactical Data Link Ad Hoc Network in Colombian Maritime Scenario

2020 ◽  
Vol 14 (27) ◽  
pp. 75-92
Author(s):  
Arturo Arenas Castro ◽  
Geovanny D. Sánchez Marín ◽  
Guefry L. Agredo Méndez ◽  
Camilo E. Segovia Forero

Tactical Data Link (TDL) systems are a kind of Mobile Ad Hoc NETwork (MANET) used in diverse maritime operational environments such as natural disasters, surveillance, maritime search, and rescue. A TDL network is usually composed of nodes or units representing surface ships, submarines, and aircrafts able to participate in maritime operations. A routing protocol is required to establish communication between nodes, which guarantees the route from the source node to the destination node. A TDL has been developed in the Colombian Caribbean Sea (CTDL). However, no efficient routing protocol has been implemented. This works to perform a preliminary study to implement an appropriate routing protocol for the CTDL. Local environment constraints, in addition to the chosen protocols' performance analysis, will provide preliminary alternatives for a routing protocol with acceptable efficiency. This article provides a background of ad-hoc networks routing protocols, a description of the Colombian Caribbean maritime operational environment, a comparative analysis of routing protocols, and a discussion of conclusions and future developments regarding CTDL.

Author(s):  
Prashant Rewagad ◽  
Nisha A. Lodha

Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently and thus, routing become challenging task to transfer the data from source to destination. A variety of routing protocols with varying network conditions are analyzed to find an optimized route from a source to some destination. This paper is based on performance comparison of two popular mobile ad-hoc network routing protocols using simulator i.e. DSR, ADOV. On the network simulation platform, a systematically simulation and research has been carried out on the performance of two routing protocols, and how the network environments impact on the performance of routing protocol.


2017 ◽  
Vol 10 (1) ◽  
pp. 174-179 ◽  
Author(s):  
Sachin Lalar ◽  
Arun Yadav

Routing protocol is the essential and vital performance factor in the Mobile Ad-hoc Network. The routing protocols in MANET are accomplished to handle a lot number of nodes with restricted resources. There is a variety of routing protocol exist in MANET. The routing protocol which is chosen may have an effect on the performance of network. In this paper, We perform a comparative study of DSDV, CSGR, WRP, AODV, OLSR, DSR, TORA, ZRP, ZHLS, DYMO routing protocol with respect to Routing Approaches, Routing structure, Route selection, Route, Routing table, Route maintenance, Operation of protocols, Strength, Weakness.


Author(s):  
K. Vinayakan ◽  
M. V. Srinath

There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.


Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


Author(s):  
Navneet Kaur ◽  
Amandeep Verma

The network in which the nodes can enter or leave the network as per their need is known as mobile ad-hoc network. This is a self-configuring type of network and so the routing in this type of network is very difficult. Numerous routing protocols are involved here which are classified on the basis of their properties into reactive, proactive and hybrid protocols. There are several important parameters such as delay, packet loss and throughput. These parameters are utilized for checking the performance of three routing protocols namely AODV, DSR and DSDV within this research. In comparison to the other protocols, the AODV routing protocol provides better results. In order to provide efficient path establishment from source to destination, enhancement has been proposed here within the AODV protocol which includes the utilization of cuckoo search and bee colony named bio-inspired techniques in it. The nodes that are found to be common in the selected paths are chosen to be the best nodes for the path. The NS2 tool is used for performing the simulations. As per the results achieved it can be seen that the AODV protocol provides better results in terms of the above mentioned parameters.


2018 ◽  
Vol 7 (3) ◽  
pp. 1453 ◽  
Author(s):  
Shibu K.R ◽  
Suji Pramila R

Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.  


2019 ◽  
Vol 3 (2) ◽  
pp. 64-69
Author(s):  
Mohamad T. Sultan ◽  
Khaled N. Yasen ◽  
Ali Q. Saeed

Mobile ad hoc network (MANET) is an infrastructure-less and decentralized network without any physical connections. Nodes are mobile, free to move, and independent of each other which makes routing a difficult task. Hence, a dynamic routing protocol is needed to make MANET reliable and function properly. Several routing protocols have been proposed with different working mechanisms and performance levels. Therefore, the performance study of those protocols is needed. This paper evaluates the performance of MANET routing protocols using simulation based experiments to observe the behavior of the network as the density of the nodes increases. The paper evaluates the performance of proactive (fisheye state routing), reactive (ad hoc on-demand distance vector), and hybrid (zone routing protocol) routing protocols in terms of the packet delivery fraction, average throughput, and average end-to-end delay. The simulations of protocols to analyze their performance in different conditions were performed using the network simulator 2 (NS 2).


Author(s):  
Rahul M Desai ◽  
B P Patil ◽  
Davinder Pal Sharma

<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols.  In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>


2012 ◽  
Vol 11 (4) ◽  
pp. 65-76
Author(s):  
Arunangshu Pal ◽  
Prasenjit Choudhury

With the advancement of wireless technologies, Mobile Ad hoc NETwork (MANET) has been an important field of study. MANETs find useful applications in the real world, for example in military battlefield and disaster management. Since MANET is dynamic in nature, it must be represented by dynamic graph. Evolving graph, a form of dynamic graph, may be used for the purpose. When we talk about a network, a routing protocol comes into the question, and one of the most popular routing protocols is AODV. However, since AODV suffers from a drawback that it may be a victim of black hole attack, we need to find a technique to eliminate the possibility of the phenomenon. This paper makes a study of MANET and an efficient way of representing MANET by dynamic graph. It explains the AODV routing technique and the black hole attack. It then extends the idea of dynamic graph to propose a technique to solve the problem of black hole attack in AODV.


Sign in / Sign up

Export Citation Format

Share Document