scholarly journals Improvement of AODV Routing on MANETs Using Fuzzy Systems

2011 ◽  
Vol 7 (2) ◽  
pp. 102-106
Author(s):  
Taqwa Fahad ◽  
Abduladhim Ali

Most of routing protocols used for Mobile Ad hoc Network {MANET}, such as Ad hoc on demand distance vector {AODV} routing, uses minimum hops as the only metric for choosing a route. This decision might lead to cause some nodes become congested which will degrade the network performance. This paper proposes an improvement of AODV routing algorithm by making routing decisions depend on fuzzy cost based on the delay in conjunction with number of hops in each path. Our simulation was carried out using OMNeT++ 4.0 simulator and the evaluation results show that the proposed Fuzzy Multi-Constraint AODV routing performs better than the original AODV in terms of average end-to-end delay and packet delivery.

2017 ◽  
Vol 7 (1.2) ◽  
pp. 110
Author(s):  
Uzma Shaikh ◽  
Arokia Paul Rajan

Mobile Ad-hoc Network (MANET) is a mobile network which has a large scale of self-directed nodes which is powerful to form a short-term means of communication network, without any use of prior communications. Due to its uniqueness like partial resources, varying loops and shortfall of controlling the networks, these networks are exposed to diverse network layer issues. The “Ad hoc on demand distance vector” is a self-starting directing procedure whose security is compromised with the distinct form of attack named as “Black-Hole” and “Grey Hole” attacks. This “malicious node” publicize as such, it contains the supreme track to the target during the route discovery process and thus interrupt the real communication and corrupt network performance. This paper introduces a new method in which a base node is introduced in the network that increases the probability of detecting multiple malicious nodes in the network and further separate them from taking part in any communication. It detects the corrupted nodes and prevent it by causing an effect for the communication. The proposed method has been experimented using NS2 and the results found to be efficient.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


2006 ◽  
Vol 1 (4) ◽  
pp. 368-378 ◽  
Author(s):  
Sanjeev Sharma . ◽  
R.C. Jain . ◽  
Sarita S. Bhadauria .

2021 ◽  
Vol 17 (1) ◽  
pp. 60-70
Author(s):  
Vinoth Kumar V. ◽  
Ramamoorthy S. ◽  
Dhilip Kumar V. ◽  
Prabu M. ◽  
Balajee J. M.

In recent years, WiFi offloading provides a potential solution for improving ad hoc network performance along with cellular network. This paper reviews the different offloading techniques that are implemented in various applications. In disaster management applications, the cellular network is not optimal for existing case studies because the lack of infrastructure. MANET Wi-Fi offloading (MWO) is one of the potential solutions for offloading cellular traffic. This word combines the cellular network with mobile ad hoc network by implementing the technique of Wi-Fi offloading. Based on the applications requirements the offloading techniques implemented into mobile-to-mobile (M-M), mobile-to-cellular (M-C), mobile-to-AP (M-AP). It serves more reliability, congestion eliminated, increasing data rate, and high network performance. The authors also identified the issue while implementing the offloading techniques in network. Finally, this paper achieved the better performance results compared to existing approaches implemented in disaster management.


Sign in / Sign up

Export Citation Format

Share Document