SimuMANET

Author(s):  
Ana Vazquez Alejos ◽  
Paula Gómez Pérez ◽  
Manuel Garcia Sanchez ◽  
Muhammad Dawood

Simulation software in MANET research is vital. Such a tool provides a versatile mechanism to understand all the involved aspects of these particular systems, from the radio interface to the last communication layer. In this chapter, the authors present the SimuMANET project, a tool for both simulation and field tests purpose. It allows the deployment of wireless reconfigurable ad-hoc networks and MANETs, assisted by a real-time graphical user interface (GUI) for network traffic monitoring and management of radio electric features of the links established between the active network nodes. Due to a set of functionalities, such as GUI, network topology visualization, traffic and motion pattern configuration, and real-time network status analysis, the simulator introduced here becomes a valid tool for both research and education targets. Two scenarios with different types of motion and traffic are simulated using the SimuMANET tool, and the results are shown and commented to illustrate some capabilities of this software.

2006 ◽  
Vol 8 (2) ◽  
pp. 356-369 ◽  
Author(s):  
Shiwen Mao ◽  
D. Bushmitch ◽  
S. Narayanan ◽  
S.S. Panwar

2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


2005 ◽  
Vol 12 (3) ◽  
pp. 147-157
Author(s):  
Giuseppe Caizzone ◽  
Paolo Giacomazzi ◽  
Luigi Musumeci ◽  
Gabriella Saddemi ◽  
Giacomo Verticale

Drones ◽  
2022 ◽  
Vol 6 (1) ◽  
pp. 22
Author(s):  
Esmot Ara Tuli ◽  
Mohtasin Golam ◽  
Dong-Seong Kim ◽  
Jae-Min Lee

The growing need for wireless communication has resulted in the widespread usage of unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol for UAVs is paramount as well as challenging due to its dynamic attributes. The difficulty stems from features other than mobile ad hoc networks (MANET), such as aerial mobility in 3D space and frequently changing topology. This paper analyzes the performance of four topology-based routing protocols, dynamic source routing (DSR), ad hoc on-demand distance vector (AODV), geographic routing protocol (GRP), and optimized link state routing (OLSR), by using practical simulation software OPNET 14.5. Performance evaluation carries out various metrics such as throughput, delay, and data drop rate. Moreover, the performance of the OLSR routing protocol is enhanced and named “E-OLSR” by tuning parameters and reducing holding time. The optimized E-OLSR settings provide better performance than the conventional request for comments (RFC 3626) in the experiment, making it suitable for use in UAV ad hoc network (UANET) environments. Simulation results indicate the proposed E-OLSR outperforms the existing OLSR and achieves supremacy over other protocols mentioned in this paper.


Author(s):  
Meenakshi Tripathi ◽  
M.S. Gaur ◽  
V. Laxmi

Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing, and energy constraint make it difficult to incorporate compute-intensive security solutions in these networks. Existing solutions for developing cost and energy efficient algorithms do not fit the security parameters for these resource constrained networks. As a result, these networks remain vulnerable to several types of attacks. This chapter presents a survey of various attacks at the different layers of WSN protocol stack, their detection, and countermeasures. Although every layer of the stack has its own security challenges, the network layer is most vulnerable to many security attacks because it provides an excellent basis for traffic monitoring activities, which helps the attacker form a strategy to perform the attack. The most common attacks on this layer are the Sybil attack, selective forwarding attack, wormhole attack, sinkhole attack, etc. This survey provides a comprehensive view of present attacking strategies to disrupt the normal functioning of WSN.


Sign in / Sign up

Export Citation Format

Share Document