Evaluation Platform for Large Scale P2P Mobile Ad-hoc Networks

Author(s):  
Raphaël Kummer ◽  
Peter Kropf ◽  
Jean-Frédéric Wagen ◽  
Timothée Maret

Many innovative P2P algorithms designed for mobile ad-hoc networks (MANETs) have been designed to scale smoothly when handling a very large number of nodes and transmissions. To cope with the complexity of software development for large-scale MANETs, simulations are widely used instead because hardware implementations are too costly. Simulations are very well suited to testing and evaluating concepts, but when implementing algorithms for testing on target systems, unexpected problems can often surface. Thus, once simulations have provided satisfactory results, emulation is a more desirable approach for detecting and handling unexpected behavior before committing to large-scale deployment. In particular, given that large P2P testbeds require a large number of devices spread over a prohibitive space and are limited by complex programming models, the authors are featuring a Java-based emulator called Freemote. To demonstrate some of the practical advantages of combining simulation and emulation, Freemote makes it possible to integrate real and emulated nodes, and the real nodes (JMotes) run exactly the same Java programs as emulated nodes. Since the JMotes are still not very widely used, the Freemote emulator and JMotes have been designed to be compatible with the more popular Berkeley’s motes. Furthermore, remarkable visualization and development tools have been implemented to undertake large-scale emulation of ad-hoc algorithms, featuring a high level of realism. Freemote has been tested in emulations for up to 10,000 nodes, distributed over ten computers (refer to a preceding chapter of this book “P2P Information Lookup, Collection and Distribution in Mobile Ad-Hoc Network” for a test application running DHT algorithms). In this chapter, the authors present the Freemote platform along with the results of a brief comparison of emulation and simulation experiments.

Author(s):  
Revathi Venkataraman ◽  
T. Rama Rao

This chapter covers issues related to security in mobile ad hoc networks. It acts as a comprehensive survey material covering the cryptographic schemes and trust modeling techniques traditionally found in mobile ad hoc network (MANET) survey articles. The need for hybrid security techniques, involving both cryptographic approach and trust based model, in a resource constrained ad hoc network, is also emphasized in this work. Additionally, the lack of realism in the research works related to ad hoc network security is also pointed out. The state of the art in ad hoc security should employ hybrid techniques that can be easily implemented in an ad hoc network. This will lead to the large scale deployment of mobile ad hoc networks in various context-aware applications.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2021 ◽  
Vol 9 (1) ◽  
pp. 191-197
Author(s):  
Omar Faruque, Tadiwa Elisha Nyamasvisva, Abdullahi Mujaheed Saleh, Hasliza Binti Hashim

Wireless technology has brought a very advanced change in the field of the internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) which makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network that consists of a collection of wireless mobile nodes, and the communication between these nodes has been carried out without any centralized authority. There are several network performance metrics, Packet Loss and End-to-End Delay which can be taken into account, for getting a general idea about the performance of the Geographical Routing Protocol in Mobile Ad-Hoc Networks. The proposed research will evaluate the parameters which affect the communication in the Geographical Routing Protocol in Mobile Ad-Hoc Networks.


Author(s):  
Christian Gottron ◽  
Andre Konig ◽  
Matthias Hollick ◽  
Sonja Bergstrasser ◽  
Tomas Hildebrandt ◽  
...  

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Sign in / Sign up

Export Citation Format

Share Document