scholarly journals Mobile Ad-hoc Networks: A Survey on multipath routing protocols

2022 ◽  
Vol 24 (1) ◽  
pp. 244-252
Author(s):  
Mrs.L. D. Sujithra Devi ◽  
◽  
Mrs. A. Praveena ◽  
Mrs. B. Reena ◽  
Mrs. G. Anandhi ◽  
...  

A Mobile Ad Hoc Network (MANETs) connects mobile nodes without any base station. These nodes in the network can change the topology dynamically and transfer the data among themselves. The nodes in the MANET are categorized based on the resource factors like memory, computation, and power levels. The dynamic change in route makes the connection of the destination node more complex. Sometimes, it results in link failure, and hence the primary route is failed, which means an alternative route is required to transmit the packets. It required multiple paths from the source node to destination node with a stable path connecting the source node. This issue makes MANET routing a crucial task. To address these problems, multipath routing in MANET is discussed in this paper. Multipath routing provides various paths for a single source node to a single destination node. It is more important to consider load balancing and fault tolerance when establishing the multipath routing mechanism. This paper describes the various type of challenges along with their respective multipath routing protocols in MANETs.

Author(s):  
Anubhuti Roda MOHINDRA ◽  
Charu GANDHI

Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and critical tasks in recent days, due to its dynamic nature. For this reason, the various routing protocols and security mechanisms are developed for the traditional networks. Nonetheless, it still lacks the limitation of increased computational complexity, inefficient security, reduced throughput, and increased delay. To solve these problems, this paper developed a new system, namely, Secure Cryptography based Clustering Mechanism (SCCM) for MANET. It comprised the following stages: secure routing, encryption, signature generation, signature verification, and decryption. After forming the network, the connection between the mobile nodes was formed. After that, the secured routing was created between the source and destination by implementing the AOMDV routing protocol. Then, the original packet was converted into an unknown format by employing an Elliptic Curve Cryptography (ECC) encryption mechanism. Consequently, the signature for the encrypted packet was generated and forwarded to the destination via the Region Head (RH) and other gateway nodes. When the destination node received the packet, it performed the signature verification process for verifying whether the packet is valid or invalid.  If it were valid, the receiver would accept the data and decrypt it by using the ECC decryption mechanism; otherwise, it would reject the packet and report to the base station. The simulation results evaluated the performance of the proposed security mechanism by using various measures and compared it with other techniques for proving the superiority.


2013 ◽  
Vol 11 (9) ◽  
pp. 2994-3003
Author(s):  
Reeta Mishra

Now a day, security in Mobile Ad hoc Network is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Therefore attacks in this are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping.This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behaviour during the process of route discovery. For any received REQ, the black hole claims having a route and propagates a faked REP. The source node responds to these faked REPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination.The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; REP is overloaded with an extra field to indicate the reliability of the replying node. 


2019 ◽  
Vol 16 (9) ◽  
pp. 3906-3911
Author(s):  
Karan Singh ◽  
Rajeev Gupta

Recent progression in the field of information and communication cause increase of packet count over the World Wide Web network. These communicated packets should deliver on time from origin node to destination node using a reliable and shortest route. In this way routing plays an important part in dispatching the packets to destination form the source. This routing becomes more crucial when packets delivery is done in independent mobile nodes which dynamically form a temporary network. This network named as Mobile Ad-Hoc Network and therefore it is said to be particular reason-specific, self-ruling and dynamic. In this paper we analyzed 3 protocols and for a quality of service (i.e., Packet Delivery Ratio) and achieved comparative study of various protocols of routing with respect to Operation of protocols, Route maintenance, Routing table, Route, Route selection, Routing structure, Routing Approaches, Protocol types, Merits and Demerits.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


2017 ◽  
Vol 10 (3) ◽  
pp. 593-596
Author(s):  
Jitendra Soni ◽  
Kokila Uikey

Mobile ad-hoc Network [MANET] is the collection of mobile nodes deployed with the short-lived purpose. It is the most innovative and useful variety which provide the facility to establish communication without the prerequisite of any infrastructure. Here, wireless communication medium is usually used for communication and connection establishment purpose. Generally, it is deployed with mobile nodes but can be used for stationary design also. Open nature communication makes it vulnerable for several security threats. This paper has considered the simulation of AODV and ODMRP using Qualnet 5.2 simulator.


Author(s):  
Jaber H. Majeed ◽  
Najmah Abed Habeeb ◽  
Waleed Khalid Al-Azzawi

<span>A mobile ad hoc network (MANET) can be seen as a mobile nodes collection having no support of fixed infrastructure and therefore its communication is totally dependent on the network's nodes. As a result of the mobility of nodes, rapid and unpredictable changes occur within the mobile ad hoc network (MANET) arrangements. Therefore, this makes the analysis of routing protocols very crucial so as to enhance efficient communication between the wireless nodes. IPv4 and IpV6 within the MANET is another issue of concern. IPv4 which has been traditionally used for ages and IPv6; predicted to be the forthcoming network architecture model is investigated because of its protection which has been improved as well as its enormous address space provision. The analysis on Ad Hoc On Demand Vector and Dynamic Manet On Demand routing protocols are performed using Qualnet simulator under the IPv4 and IPv6 standards. A thorough evaluation of the usability and functionality of the simulator software is carried out. The metrics for performance are; Throughput, End-to-End Delay and Average jitter. Afterwards, analyses and summary of the results is conducted and summarized in order to make available an assessment of their performances.</span>


Author(s):  
J. Kaur ◽  
S. Kaur

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.


2013 ◽  
Vol 11 (10) ◽  
pp. 3065-3070
Author(s):  
Roopali Garg ◽  
Guneet Kaur

Mobile ad hoc network is an assembly of mobile nodes with no centralized server. Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from source to destination.  QoS can be defined in terms of various metrics like delay, bandwidth, packet loss, routing overhead, jitter. Routing can be unicast, multicast or multipath.  This paper presents the description about the QoS multipath routing algorithm.


Author(s):  
Prathviraj N. ◽  
Santosh L Deshpande

The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multi-layer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.


Sign in / Sign up

Export Citation Format

Share Document