scholarly journals Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange

Electronics ◽  
2019 ◽  
Vol 8 (10) ◽  
pp. 1172 ◽  
Author(s):  
Ariel Stulman ◽  
Alan Stulman

vanets, iot, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (manet) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of manets: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker’s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research.

Author(s):  
Nagaraj Telkar ◽  
Prof. Pavankumar Naik ◽  
Akash Mabali ◽  
Girish S H ◽  
Gurusiddeshwar S H ◽  
...  

Auto collisions have been taking a great many lives every year, dwarfing any savage ailments or cataclysmic events. Studies demonstrate that about 60% roadway crashes could be kept away from if the vehicle’s driver had been given cautioning at any rate one-half second before an impact. Human drivers experience the ill effects of recognition confinements on roadway crisis occasions, bringing about enormous postponement in spreading crisis alerts. Safety on the road is one of the key main impetuses behind the advancement, improvement, institutionalization and execution of ITS frameworks. Proposed system uses VANET Standards (VANET is a Mobile Ad-hoc Network (MANET)’s sibling which can organize its own communication model without any other infrastructure dependence). In this project, considering the different features and the cost, on a small scale a four- wheel vehicular robotic prototype has been designed that will follow the lane and avoid obstacles.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 217
Author(s):  
Dr S.SivaNageswara Rao ◽  
Orchu Aruna ◽  
Dr K.Lakshminadh

Now a day, every one using mobile devices for communicating with others. The development of new technologies, like Internet of Things (IoT) needs coverage, connectivity, scalability and QoS. In ubiquity networks, the major issues are coverage, connectivity, scalability and QoS. To solve these limitations, integrating wireless networks with ad hoc networks. This paper provides detail survey on how ad hoc networks are integrated with Cellular Network, Wireless Mesh Networks and Wireless Sensor Networks. This integration may resolve the problems of coverage, connectivity, scalability and QoS.


Mobile Ad hoc Network(MANET) provides wireless communication withoutany infrastructure. MANET generally uses a most popular and well-suited routing protocolthat is Ad hoc on Demand Distance Vector (AODV). Random topology and mobilityin MANET cause link break multiple times in network due to which poor link quality thatresults in packet losses in the network. In this paper, link quality improvement in AODV routing protocol is focused. Link quality issue can be resolved through Cross-layer design(CLD) interaction in the OSI communication model. This technique called as Reliable-AODV. CLD is implemented by interacting Physical firstlayer and network third layer of the OSI model, CLDinteraction help in strong route formation inAODV for Reliable-AODV. The result shows an improvement in the system Performance in terms of metricslike throughput, Packet Delivery Ratio(PDR) and reduction in the packet losses, delay ofthe network. Network simulator used for performance analysis is NS-2.a Simulation tool that shows improvement in results. Castadiva Emulator with Wi-Fi routers and laptop are used as test bed architecture for validating sample results of simulations. It is observed that some small variation in the


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


Sign in / Sign up

Export Citation Format

Share Document