Adaptive Fuzzy Velocity-Based Routing for MANET

2011 ◽  
Vol 128-129 ◽  
pp. 46-49
Author(s):  
Chang Le Li ◽  
Han Xiao Zhang ◽  
Bin Bin Hao ◽  
Jian Dong Li

In Ad hoc On-Demand Distance Vector Routing (AODV) protocol, numerous control messages consume a large quantity of the network resources, which deteriorates the effectiveness of AODV. In this paper, Fuzzy Velocity-based AODV (FV-AODV) is proposed for improving the reliability and effectiveness of AODV in wireless mobile ad hoc network (MANET). According to the velocities of network nodes, FV-AODV adaptively adjusts the HELLO_INTERVAL, which is the transmission time interval of two successive HELLO messages. The simulation results demonstrate that the reliability and effectiveness of FV-AODV are improved comparing with AODV.

2013 ◽  
Vol 760-762 ◽  
pp. 599-606
Author(s):  
Hua Sen FU

In order to effectively manage the communication nodes in Mobile Ad Hoc Network (MANET), it is important to know the topology of such networks. Traditional Ad-hoc On-demand Distance Vector (AODV) protocol can not get the MANET topology due to the lack of the topology discovery mechanism. Aiming at this problem, an enhanced topology discovery algorithm based on AODV (AODV-TD) is proposed. AODV-TD can not only obtain the topology of dynamic network by topology discovery request, but also realize route discovery among nodes. Finally, the proposed algorithm is implemented on a hardware platform using CC1100, and the experiment results show that, even the network changes dynamically, AODV-TD can still discover the network topology rapidly and accurately, so that contribute to reducing the route discovery time and the RREQ forwarding packets.


2017 ◽  
Vol 16 (1) ◽  
pp. 7535-7547 ◽  
Author(s):  
Sherin Hijazi ◽  
Mahmoud Moshref ◽  
Saleh Al-Sharaeh

Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks are a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.


2017 ◽  
Vol 7 (1.2) ◽  
pp. 110
Author(s):  
Uzma Shaikh ◽  
Arokia Paul Rajan

Mobile Ad-hoc Network (MANET) is a mobile network which has a large scale of self-directed nodes which is powerful to form a short-term means of communication network, without any use of prior communications. Due to its uniqueness like partial resources, varying loops and shortfall of controlling the networks, these networks are exposed to diverse network layer issues. The “Ad hoc on demand distance vector” is a self-starting directing procedure whose security is compromised with the distinct form of attack named as “Black-Hole” and “Grey Hole” attacks. This “malicious node” publicize as such, it contains the supreme track to the target during the route discovery process and thus interrupt the real communication and corrupt network performance. This paper introduces a new method in which a base node is introduced in the network that increases the probability of detecting multiple malicious nodes in the network and further separate them from taking part in any communication. It detects the corrupted nodes and prevent it by causing an effect for the communication. The proposed method has been experimented using NS2 and the results found to be efficient.


2014 ◽  
Vol 989-994 ◽  
pp. 4482-4487
Author(s):  
Xiao Jing Meng ◽  
De Yu Lin ◽  
De Qin Lin ◽  
Rong Hua

Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2013 ◽  
Vol 11 (9) ◽  
pp. 2994-3003
Author(s):  
Reeta Mishra

Now a day, security in Mobile Ad hoc Network is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Therefore attacks in this are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping.This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behaviour during the process of route discovery. For any received REQ, the black hole claims having a route and propagates a faked REP. The source node responds to these faked REPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination.The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; REP is overloaded with an extra field to indicate the reliability of the replying node. 


2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


Sign in / Sign up

Export Citation Format

Share Document