A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network

2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Author(s):  
Zhiyan A. Younis ◽  
Adnan Mohsin Abdulazeez ◽  
Subhi R. M. Zeebaree ◽  
Rizgar Ramadhan Zebari ◽  
Diyar Qader Zeebaree

Disasters could cause communication systems partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily maintainable to provide better services. Wireless ad-hoc networks could be the choice of establishing communication with the aid of existing infrastructure in a post-disaster case. In order to optimize mobile ad-hoc network performance, address the challenges that could lead to unreliable performance is required. One and most crucial key challenge is routing information from a sender to receiver. Due to the characteristics of a disaster environment such as signal attenuation, communication links exist between rescue crew is short-lived, suffer from frequent route breakage, and may result in unreliable end-to-end services. Many routing protocols have been proposed and evaluated in different network environments. This paper presents the basic taxonomy of Mobile Ad Hoc Networks and the state of the art in routing categorizes (Proactive, Reactive, Geographic-aware and Delay tolerant Networks (DTN)). The comparison of existing routing protocols in Mobile Ad-Hoc Networks indicates that overhead in Proactive and Geographic is competitive with delay in Reactive and DTN routing.


Author(s):  
Pawitar Dulari

Security is an essential requirement in wireless ad hoc network. The type of ad hoc networks makes them vulnerable to distinct forms of attack. The random nature of these networks makes invoke of security a challenging issue. The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks. Then it presents the main attack categories that exist in it. Finally presents the current security solutions for the mobile ad hoc network.


Author(s):  
Naveen Chauhan ◽  
Lalit K. Awasthi ◽  
Narottam Chand ◽  
Ramesh C. Joshi ◽  
Manoj Misra

Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.


Author(s):  
Revathi Venkataraman ◽  
T. Rama Rao

This chapter covers issues related to security in mobile ad hoc networks. It acts as a comprehensive survey material covering the cryptographic schemes and trust modeling techniques traditionally found in mobile ad hoc network (MANET) survey articles. The need for hybrid security techniques, involving both cryptographic approach and trust based model, in a resource constrained ad hoc network, is also emphasized in this work. Additionally, the lack of realism in the research works related to ad hoc network security is also pointed out. The state of the art in ad hoc security should employ hybrid techniques that can be easily implemented in an ad hoc network. This will lead to the large scale deployment of mobile ad hoc networks in various context-aware applications.


Author(s):  
Naveen Chauhan ◽  
Lalit K. Awasthi ◽  
Narottam Chand ◽  
R.C. Joshi ◽  
Manoj Misra

Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.


2006 ◽  
Vol 03 (03) ◽  
pp. 233-245
Author(s):  
A. SHAJIN NARGUNAM ◽  
M. P. SEBASTIAN

Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure-less networks is how to manage the cryptographic keys that are needed. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These unique characteristics of mobile ad hoc networks such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology cause a number of nontrivial challenges to security design. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non-overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 16 (2) ◽  
pp. 616-620
Author(s):  
S. Priya ◽  
P. Suganthi

The mobile ad hoc networks have made the source and the influenced shortest path routing extremely challenging owing to their unstable and dynamic topology. Even though the nodes keep moving and this increases the packets and their retransmission and this brings down the delivery ratio. The Ad hoc networks with their quick deployment and minimal configuration are well-suited for these emergency situations such as disasters that are human-induced, medical situations or emergency, military conflicts and so on. Every mobile node found in a Mobile Ad hoc Network (MANET) can perform a routing function to establish some communication among various nodes, their "death" and also of some nodes owing to the exhaustion of energy that can disrupt service of the whole network. The ad hoc on-demand distance vector routing (AODV) is that routing protocol which gets established at a time there is a demand for another new route. It is found to be similar to the energy and the other parameters of Quality of Service that includes throughput, security, jitter and end-to-end delay. For this work, there is a probabilistic routing scheme which is quality aware for enhancing and improving the mobile ad hoc network and its throughput and this is known as a Differential Evolution (DE). As opposed to looking out for a path that is the shortest, this heuristic has proposed the best path to ensure that there is an overall quality of service that is ensured. This algorithm which is based on the DE has improved the chances of selecting the ideal route for data transmission.


Sign in / Sign up

Export Citation Format

Share Document