scholarly journals Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network

2011 ◽  
Vol 1 (5) ◽  
pp. 45-54
Author(s):  
Jyotsana Jaiswal
2020 ◽  
Vol 34 (3) ◽  
pp. 337-343
Author(s):  
Vijay Aroulanandam ◽  
Thamarai Latchoumi ◽  
Karnan Balamurugan ◽  
Tiruchengode Yookesh

Author(s):  
Veeresh Poola ◽  
Praveen Sam R ◽  
Shoba Bindu C

<p><span lang="EN-US">A Due to the rapid development of smart processing mobile devices, Mobile applications are exploring the use of web services in MANETs to satisfy the user needs. Complex user needs are satisfied by the service composition where a complex service is created by combining one or more atomic services. Service composition has a significant challenge in MANETs due to its limited bandwidth, constrained energy sources, dynamic node movement and often suffers from node failures. These constraints increase the failure rate of service composition. To overcome these, we propose Reliable Fault Tolerant System for Service Composition in MANETs (RFTSC) which makes use of the checkpointing technique for service composition in MANETs. We propose fault policies for each fault in service composition when the faults occur. Failure of services in the service composition process is recovered locally by making use of Checkpointing system and by using discovered services which satisfies the QoS constraints. A Multi-Service Tree (MST) is proposed to recover failed services with O(1) time complexity. Simulation result shows that the proposed approach is efficient when compared to existing approaches.</span></p>


2021 ◽  
Vol 15 (1) ◽  
pp. 44-64
Author(s):  
Hatem Mahmoud Salama ◽  
Mohamed Zaki Abd El Mageed ◽  
Gouda Ismail Mohamed Salama ◽  
Khaled Mahmoud Badran

Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.


2014 ◽  
Vol 573 ◽  
pp. 377-380
Author(s):  
Murugesan Meenakshi ◽  
C.T. Kalaivani

In this paper we focus on energy efficiency of the node in mobile ad hoc network with respect to metrics residual battery capacity and relay capacity of the node in the network. We have proposed a multicast algorithm which will use the remaining battery power of the node in an efficient way to increase the lifetime of the network. If the source node wants to send multicast packets, it chooses a node with higher residual-battery capacity. If all the intermediate nodes have equal residual-battery capacity, then it chooses a node with higher relay capacity. Simulation results revealed that the proposed algorithm is more efficient than the existing in terms of node lifetime, delay and throughput.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document