scholarly journals Secure Data Transmission for Cluster Based Internet Integrated with MANETs

Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.

Mobile Ad hoc Network is a decentralized network which can be deployed instantly. Routing is a very challenging task in this network due to dynamic movement of mobile nodes. Various routing protocols such as OLSR, DYMO and ZRP are proposed to establish the route for the data packets in MANET’s. As deploying of the protocols into real environment is a cost expensive process, the protocols are initially evaluated through a simulated arena. Many of the mobile devices are battery equipped and each protocol consumes energy in different manner. In this paper, energy consumption evaluation is carried out on OLSR, DYMO and ZRP protocols in a grid environment. The experiments have shown that DYMO protocol has less energy consumption when compared to OLSR and ZRP protocols.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 305
Author(s):  
W Ancy Breen ◽  
S Durga Devi ◽  
E Sushmitha ◽  
V Suveetha

MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANETS are highly vulnerable and are prone to malicious attack. Security issue is highly challenging in MANET. Understanding the different form of possible attacks and providing good security solutions is important for secure data transmission between nodes. The most dangerous attack among these attacks is Gray-hole attack. In this paper, it proposed a method for reducing the Gray-hole attack. Our proposed algorithm MAODV identifies the malicious node before the data transmission process and it greatly reduces the dropping of data packets. 


2013 ◽  
Vol 11 (10) ◽  
pp. 3065-3070
Author(s):  
Roopali Garg ◽  
Guneet Kaur

Mobile ad hoc network is an assembly of mobile nodes with no centralized server. Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from source to destination.  QoS can be defined in terms of various metrics like delay, bandwidth, packet loss, routing overhead, jitter. Routing can be unicast, multicast or multipath.  This paper presents the description about the QoS multipath routing algorithm.


2019 ◽  
Vol 16 (9) ◽  
pp. 3835-3839
Author(s):  
Nippun Kamboj ◽  
Dalip ◽  
Munishwar Rai

In modern era, MANET i.e., Mobile Ad-hoc Network is a very powerful, interactive tool and useful resource for transmission/communication in computer networks. About composition of MANET, a collection of mobile nodes have the potential of creating self-maintaining and self-configurable network without having any centralized infrastructure i.e., MANET is a self-organized network without any infrastructure. Nodes in the network require energy for transmission of data after collapse of energy a node become inactive and it can’t participate in the communication. Due to exhaustation of energy the network becomes unstable. An unstable network requires extra routing process for coin out a route. In future security of MANET is a major challenge for smooth and efficient data communication. There are many protocols in MANET but in this paper, we discussed AODV routing protocol for data communication. In this paper a new algorithm is designed i.e., modified AODV with security constraint. This paper also gives the comparative study of original AODV and modified AODV.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Amit Singh ◽  
Nitin Mishra ◽  
Angad Singh

 A Wireless Mobile Ad-hoc Network consists of variety of mobile nodes that temporally kind a dynamic infrastructure less network. To modify communication between nodes that don’t have direct radio contact, every node should operate as a wireless router and potential forward knowledge traffic of behalf of the opposite node. In MANET Localization is a fundamental problem. Current localization algorithm mainly focuses on checking the localizability of a network and/or how to localize as many nodes as possible. It could provide accurate position information foe kind of expanding application. Localization provide information about coverage, deployment, routing, location, services, target tracking and rescue If high mobility among the mobile nodes occurs path failure breaks. Hence the location information cannot be predicted. Here we have proposed a localization based algorithm which will help to provide information about the localized and non-localized nodes in a network. In the proposed approach DREAM protocol and AODV protocol are used to find the localizability of a node in a network. DREAM protocol is a location protocol which helps to find the location of a node in a network whereas AODV is a routing protocol it discover route as and when necessary it does not maintain route from every node to every other. To locate the mobile nodes in a n/w an node identification algorithm is used. With the help of this algorithm localized and non-localized node can be easily detected in respect of radio range. This method helps to improve the performance of a module and minimize the location error and achieves improved performance in the form of UDP packet loss, received packet and transmitted packets, throughput, routing overhead, packet delivery fraction. All the simulation done through the NS-2 module and tested the mobile ad-hoc network.


Sign in / Sign up

Export Citation Format

Share Document