An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network

2021 ◽  
Vol 13 (04) ◽  
pp. 21-37
Author(s):  
Priyanka Pandey ◽  
Raghuraj Singh

Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.

2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Elham Zamani ◽  
Mohammadreza Soltanaghaei

Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable routing is one of the research aspects of MANET. In this paper, a proposed method, called M-AODV, which is a type of overhearing backup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the improvement of packet delivery rate and reduction of overhead and delay. Moreover, to assess the security of the proposed protocol, we simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results showed that M-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount of overhead had been increased.


Now a day’s mobile ad-hoc network (MANET) is engaged by numerous scientists and endeavoring to be conveyed by and by. To accomplish this objective, these two components are a significant issue that we need to consider. The first is "overhead". As it were, messages that is not important to be sent when setting up a system association between versatile hubs. The following issue is the parcel sending rate from source to the goal hub that sufficiently high to ensure a successful system association. This paper is concentrating on improving the exhibition of the Location-Aided Routing Protocol (LAR) regarding overhead decrease by adjusting the calculation of the MANET course disclosure process. The consequence of the reproduction shows that the proposed convention can decrease overhead definitely, growing system lifetime and increment parcel sending rate while contrasting and other traditional conventions.


Wireless and mobile computing enables the spontaneous networking of a system with or without previous set-up. Mobile Ad Hoc Network (MANET) is a Wi-Fi grid that has already been developed and does not require an existing infrastructure for a specific extemporaneous operation. Any node can then connect or exit the network, which will permit the attacker to access the whole system. These networks are liable to various attacks. This paper directs detection of the clone attack from MANETs in which the attacker node steals the id of the closing node, twin it and attracts all the data towards it. ACO noticed the clone attack and measured performance based on the packet drops, packet delivery ratio and network throughput.


2013 ◽  
Vol 798-799 ◽  
pp. 407-410
Author(s):  
Hong Song Chen ◽  
Xue Wei Shang ◽  
Fei Ye

With the rapid development of mobile ad hoc network, energy and trust are important to the network. Energy consumption and trust routing scheme are the main issues in mobile ad hoc network. Trust routing is related to many factors such as hop numbernode residual energy and node behavior. To use the multi-source information, multi-agent information fusion method is used to design trust routing scheme. The definition of trust routing is proposed. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme, Route Reply (RREP) Message is extended to record node residual energy and behavior information. NS-2 simulator is used to simulate different network scenarios. Simulation results show that low power trust routing scheme can improve the security and efficiency of network, the scheme is sensitive to node residual energy, so it extends the service lifetime of the network.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Murtadha M. A. Alkadhmi ◽  
Osman N. Uçan ◽  
Muhammad Ilyas

With the reliance of humans on mobile smart devices that have wireless communication, modules have significantly increased in recent years. Using these devices to communicate with the survivors during a disaster or its aftermath can significantly increase the chances of locating and saving them. Accordingly, a method is proposed in this study to extend the lifetime of the nodes in a Mobile Ad Hoc Network (MANET) while maintaining communications with the nearest base station (BS). Such a methodology allows the rapid establishment of temporary communications with these survivors, as restoring the complex infrastructure is a time-consuming process. The proposed method achieves the longer lifetime of the network by balancing the load throughout the nodes and avoids exhausting those with limited remaining energy. The proposed method has shown significant improvement in the lifetime of the MANET while maintaining similar Packet Delivery Rate (PDR) and route generation time, compared to existing methods.


Author(s):  
Rajendra Prasad P ◽  
Shiva Shankar

Introduction: The aim of the securing energy routing protocol, is to provide the countermeasures to the attacks par-ticularly to the black hole in mobile ad-hoc network, and enhancing the network performance metric throughput al-so reducing the end-to-end delay between the nodes in the network.To build the protocol that enhances the perfor-mance of the network by modifying the existing DSR protocol by introducing new route discovery mechanism in the proposed protocol. Method: The proposed protocol implementation has two phases, route request/reply phase and route confirm phas-es. During the route discovery process, the route discovery from the source to destination process are described by sending the RREQ packet from the source hub as shown in Fig. 1(a), when it does not have one accessible and crav-ings a route to a destination. The source node transmits the RREQ to its associate nodes and the destination node re-ply with RREP. When the source receives reply message, the source node respond with reverse path with a confirm RCON message and providing security to the nodes in the network. Results: To verify the performance of the proposed protocol against the existing DSR protocol are compared with respect to various network metrics like end-to-end delay and packet delivery ratio and validated the result by com-paring both routing algorithm using Network Simulator 2. Conclusion: The results of the proposed SERP strongly safeguard against the attacks in the network and the packet delivery ratio is increased compared with the DSR also the end-to-end delay is reduced in the proposed protocol. Discussion: Mobile ad-hoc networks are being dynamic in nature, it associates with issues relating to secure routing, energy and are generally vulnerable to several types of attacks. The DSR is one of the widely used reactive proto-cols available for the mobile ad-hoc network and the proposed work enhancing the security of the network in the existing pro


Sign in / Sign up

Export Citation Format

Share Document