scholarly journals Probabilistic Anonymous Routing in Mobile Ad-Hoc Networks

Author(s):  
Dhaval Moliya ◽  
Rusheel Jain ◽  
Vakul Mohanty ◽  
Chittaranjan Hota

In this paper, we propose a routing protocol which ensures route anonymity, for the user. Amongst all suboptimal paths between source and destination, path for data transfer is chosen randomly at each intermediate node. Route anonymity becomes essential for preventing attacks like traffic monitoring. Bayesian approach has been employed for route discovery phase of the protocol. The protocol is simulated using NCTUNS network simulator. The robustness of our protocol is evaluated against known security attacks.

2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


Author(s):  
Nahida Nigar ◽  
Muhammad Anwarul Azim

Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which claim to have better throughput comparing with other TCP variants in a wired network. Fairness issues of TCP Variants in MANET including existing routing protocol are still unsolved. To determine the best TCP Variants in MANET environment over renowned routing protocol is the main objective of this paper. A Study on the throughput fairness of TCP Variants namely, Vegas, Reno, New Reno, SACK, FACK, and Cubic are performed via simulation experiment using network simulator (ns-2) over existing routing protocol, named, AODV, AOMDV, DSDV, and DSR. This fairness evaluation of TCP flows arranged a contrast medium for the TCP Variants using stated routing protocol in MANET. However, TCP Vegas obtain unfair throughput in MANET. The simulation results show that TCP Reno outperforms other TCP variants under DSDV routing protocol.


Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


2019 ◽  
Vol 8 (4) ◽  
pp. 9667-9674

For express employments of the mobile ad hoc networks (MANETs) sent during opponent conditions, unidentified correspondences through data overwhelm with expectedness is goliath. A fundamental thing is to give unidentifiability and unlinkability toward the mobile center obsessions as well as their techniques. The present protocol be weak against security dangers similar to if all else fails government administrator strikes, fake routing packs ambushes otherwise denial-of-service (DoS) broad-tossing assault, transfer examination strikes as well as insider strikes. During this document we suggest another routing protocol which is an improvement of the present protocol Authenticated Anonymous Secure Routing (AASR) protocol. AASR secures the strikes and outfits adequate nonattendance of clearness with the help of get-together signature and key mixed onion routing. In this work a bound together trust the board plan has been hardened with AASR protocol in order to upgrade the routing and data security in MANETs. Beguilement consequences contain shown the adequacy of the planned protocol through enhanced execution to the degree throughput, bunch got degree, pack adversity degree and surrender when ascended out of the present ones.


Author(s):  
Suleiman Zidan Aldarf, Jamal Al-yassin

Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes.  Routing protocols of mobile ad-hoc networks differ from the existing internet protocols which are designed for the fixed structure based wireless networks. MANET protocols have to face high challenges due to dynamically changing of topologies, low transmission power and asymmetric links. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. Currently existent routing protocols provide routing solutions up to a certain level and most of them are designed and implemented in small areas. Many researchers are still working on the developments of MANET routing protocols. This research study effect of some voice codecs on ad-hoc networks using the (TORA routing protocol) and by running the VOIP application on a network randomized scenario. This effect will be compared through several performance parameters for the network used. The Network Simulation Program (OPNET), which is the first program in the area of telecommunications networks in general, is used to provide accurate results for studies in the field of networks.  


2018 ◽  
Vol 7 (4.38) ◽  
pp. 893
Author(s):  
Ajit Kumar Singh Yadav ◽  
Rajesh K. Yadav

In recent years, Mobile ad hoc networks ((MANETs) have generated great interest among researchers in their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. The ad hoc on demand distance vector (AODV) is most suitable routing protocol for mobile adhoc networks in which resource consumption attacks are frequent if it is not detected timely. In this paper, we have proposed a scheme to detect as well as overcome black hole attacks using an Intrusion Detection System (IDS). The proposed scheme is implemented using network simulator 2(NS2) to compare its performance against the standard AODV with and without attack. The results of the simulation show that proposed scheme optimizes the end-to-end delay, normalized routing load, packet delivery fraction and average throughput in comparison with AODV protocols under black hole attack.  


2009 ◽  
Vol 7 (8) ◽  
pp. 1536-1550 ◽  
Author(s):  
Ying Dong ◽  
Tat Wing Chim ◽  
Victor O.K. Li ◽  
S.M. Yiu ◽  
C.K. Hui

Sign in / Sign up

Export Citation Format

Share Document