WorldWideScience

Sample records for ad hoc committee

  1. History of the research ad hoc committee on 'dissemination of information' and the special ad hoc committee on 'dissemination of information' of the Atomic Energy Society of Japan

    International Nuclear Information System (INIS)

    The Research ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 15 times from Oct. 1970 to Mar 1973. After that, The Special ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 115 times from Apr. 1973 to Mar 2009. The history of these two committees is described. Activity report is arranged including the information on change of the member and topics of the meeting, and the minutes. Furthermore, the document list on International Nuclear Information System (INIS) from Japan is included. (author)

  2. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    Science.gov (United States)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  3. Report of ad hoc OTEC cold water pipe committee

    Energy Technology Data Exchange (ETDEWEB)

    Barr, R.; Giannotti, J.; Deuchler, W.; Scotti, R.; Stadter, J.; Walsh, J. P.; Weiss, R.

    1980-02-01

    Now that the design work on the pilot plant is scheduled to start in the near future, DOE has considered it essential that an overall look be taken at the cold water pipe design process. The VSE Corporation, in its role as a support contractor to DOE, was tasked to organize a small study group to answer the question, Where do we stand on the verification of the computer models of the cold water pipe response by experimental measurements. The committee has studied all the available results of the cold water pipe development program. This report summarizes those results. The development and present capabilities of the computer programs used to calculate the response of a cold water pipe attached to a platform under known at-sea conditions are discussed. The various cold water pipe designs that have been done using the computer programs are summarized. The experiments that have been conducted up to the present time to measure the response of cold water pipes at-sea and in experimental tanks are described. The results of these experiments are presented. The experimental results are compared with the predictions made with the analytical computer programs. Conclusions drawn as a result of this analysis are presented and some recommendations are made. (WHK)

  4. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    Science.gov (United States)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  5. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  6. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. In-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2003 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from April 2002 to August 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 5th, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5th, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  7. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  8. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  9. Summary of results for the uranium benchmark problem of the ANS Ad Hoc Committee on Reactor Physics Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Parish, T.A. [Texas A and M Univ., College Station, TX (United States). Nuclear Engineering Dept.; Mosteller, R.D. [Los Alamos National Lab., NM (United States); Diamond, D.J. [Brookhaven National Lab., Upton, NY (United States); Gehin, J.C. [Oak Ridge National Lab., TN (United States)

    1998-12-31

    This paper presents a summary of the results obtained by all of the contributors to the Uranium Benchmark Problem of the ANS Ad hoc Committee on Reactor Physics Benchmarks. The benchmark problem was based on critical experiments which mocked-up lattices typical of PWRs. Three separate cases constituted the benchmark problem. These included a uniform lattice, an assembly-type lattice with water holes and an assembly-type lattice with pyrex rods. Calculated results were obtained from eighteen separate organizations from all over the world. Some organizations submitted more than one set of results based on different calculational methods and cross section data. Many of the most widely used assembly physics and core analysis computer codes and neutron cross section data libraries were applied by the contributors.

  10. The Future of 12th Grade NAEP: Report of the Ad Hoc Committee on Planning for NAEP 12th Grade Assessments in 2009

    Science.gov (United States)

    National Assessment Governing Board, 2006

    2006-01-01

    The task of the Ad Hoc Committee on Planning for the the National Assessment of Educational Progress (NAEP) 12th Grade Assessments in 2009 addresses three policy areas: (1) Conducting assessment at the state level in 12th grade; (2) Reporting on 12th grade student preparedness for college-credit coursework, training for employment and entrance…

  11. Consensus statement: the use of intravenous immunoglobulin in the treatment of neuromuscular conditions report of the AANEM ad hoc committee.

    Science.gov (United States)

    Donofrio, Peter D; Berger, Alan; Brannagan, Thomas H; Bromberg, Mark B; Howard, James F; Latov, Normal; Quick, Adam; Tandan, Rup

    2009-11-01

    Intravenous immunoglobulin (IVIG) is a therapeutic biologic agent that has been prescribed for over two decades to treat various neuromuscular conditions. Most of the treatments are given off-label, as little evidence from large randomized trials exists to support its use. Recently, IGIV-C has received an indication for the treatment of chronic inflammatory demyelinating polyneuropathy (CIDP). Because of the lack of evidence, an ad hoc committee of the AANEM was convened to draft a consensus statement on the rational use of IVIG for neuromuscular disorders. Recommendations were categorized as Class I-IV based on the strength of the medical literature. Class I evidence exists to support the prescription of IVIG to treat patients with Guillain-Barré syndrome (GBS), CIDP, multifocal motor neuropathy, refractory exacerbations of myasthenia gravis, Lambert-Eaton syndrome, dermatomyositis, and stiff person syndrome. Treatment of Fisher syndrome, polymyositis, and certain presumed autoimmune neuromuscular disorders is supported only by Class IV studies, whereas there is no convincing data to substantiate the treatment of inclusion body myopathy (IBM), idiopathic neuropathies, brachial plexopathy, or diabetic amyotrophy using IVIG. Treatment with IVIG must be administered in the context of its known adverse effects. There is little evidence to advise the clinician on the proper dosing of IVIG and duration of therapy.

  12. An evidence-based definition of lifelong premature ejaculation: Report of the International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation

    DEFF Research Database (Denmark)

    McMahon, C.G.; Althof, S.E.; Waldinger, M.D.;

    2008-01-01

    Introduction. The medical literature contains several definitions of premature ejaculation (PE). The most commonly quoted definition, the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders-Fourth Edition-Text Revision, and other definitions of PE are all...... authority based rather than evidence based, and have no support from controlled clinical and/or epidemiological studies. Aim. The aim of this article is to develop a contemporary, evidence-based definition of PE. Methods. In August 2007, the International Society for Sexual Medicine (ISSM) appointed several...... international experts in PE to an Ad Hoc Committee for the Definition of Premature Ejaculation. The committee met in Amsterdam in October 2007 to evaluate the strengths and weaknesses of current definitions of PE, to critique the evidence in support of the constructs of ejaculatory latency, ejaculatory control...

  13. Using Wikipedia categories for ad hoc search

    NARCIS (Netherlands)

    R. Kaptein; M. Koolen; J. Kamps

    2009-01-01

    In this paper we explore the use of category information for ad hoc retrieval in Wikipedia. We show that techniques for entity ranking exploiting this category information can also be applied to ad hoc topics and lead to significant improvements. Automatically assigned target categories are good sur

  14. Queueing models for mobile ad hoc networks

    NARCIS (Netherlands)

    Haan, de Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: mobile ad hoc networking. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of stations

  15. An evidence-based unified definition of lifelong and acquired premature ejaculation : report of the second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    NARCIS (Netherlands)

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne J G; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    INTRODUCTION: The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that ti

  16. An evidence-based unified definition of lifelong and acquired premature ejaculation : report of the second international society for sexual medicine ad hoc committee for the definition of premature ejaculation

    NARCIS (Netherlands)

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne Jg; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    INTRODUCTION: The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that ti

  17. Sociocultural barriers to medical care among Mexican Americans in Texas: a summary report of research conducted by the Southwest Medical Sociology Ad Hoc Committee.

    Science.gov (United States)

    Quesada, G M; Heller, P L

    1977-05-01

    This paper summarizes research findings from members of the Southwest Medical Sociology Ad Hoc Committee concerning sociocultural barriers to medical care among Mexican Americans in Texas. Committee members individually, or in two-person groups, studied a number of factors concerning Mexican-American medical care in Texas such as: 1) mortality, morbidity, and other health status indicators; 2) health manpower and educational needs; 3) political factors impeding economical health care; 4) alienation, familism, and their relationship to utilization of the health services; 5) language and communication barriers; and 6) folk medicine. Findings include documentation that structural alienation of Mexican-Americans from mainstream Anglo-American middle-class society is carried over into their relation with utilization of the health care delivery system; that their emphasis on familism works alternatively to encourage and discourage their seeking access to health care; the language differences serve to perpetuate certain cultural differences that are inimical to health care delivery; and that curanderismo can be seen as complementing other types of health care. The report concludes with a number of recommendations for accomplishing cultural integration that will lead to better care for this segment of the health population.

  18. Service placement in ad hoc networks

    CERN Document Server

    Wittenburg, Georg

    2012-01-01

    Service provisioning in ad hoc networks is challenging given the difficulties of communicating over a wireless channel and the potential heterogeneity and mobility of the devices that form the network. Service placement is the process of selecting an optimal set of nodes to host the implementation of a service in light of a given service demand and network topology. The key advantage of active service placement in ad hoc networks is that it allows for the service configuration to be adapted continuously at run time. ""Service Placement in Ad Hoc Networks"" proposes the SPi service placement fr

  19. Multilevel security model for ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Wang Changda; Ju Shiguang

    2008-01-01

    Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations.As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.

  20. Trust Based Routing in Ad Hoc Network

    Science.gov (United States)

    Talati, Mikita V.; Valiveti, Sharada; Kotecha, K.

    Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.

  1. AD HOC P2P on Android

    OpenAIRE

    Narayanan, Sathya; Byun, YoungJoon; Cebrowski Institute; CSUMB, C.S.I.T. Program

    2011-01-01

    In conjunction with the NPS C.S. Department MWC Group, this research looks at establishing an Ad Hoc Peer-to-Peer network on cell phones, specifically using the Android OS. Work comprised of Android Device, Library, and Application Design. The Library used was AODV (Ad Hoc on demand Distance Vector) and hardware devices must be controlled directly in addition to application enhancements. A prototype has been created and communication was achieved. Future work to include enhancements to contro...

  2. Security Threats in Mobile Ad Hoc Network

    OpenAIRE

    Biswas, Kamanashis; Ali, Md. Liakat

    2007-01-01

    Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like o...

  3. Conclusions of the Ad-hoc Review Committee (ARC) on the International Commission on Stratigraphy (ICS) of the International Union of Geological Sciences (IUGS) (Paris, 7-8 November 2005)

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Background Following the recommendations of the IUGS Strategic Planning Committee (2000) and IUGS Strategic Action Plan (2001)to appoint Ad-hoc Review Committees (ARCs) to hold reviewsof all IUGS-funded scientific activities on a regular basis, theIUGS Executive Committee decided at its last meeting in Vilnius, Lithuania (March 2005) that an ARC should be convened toreview the IUGS International Commission on. Stratigraphy(ICS). ICS has been part of IUGS since 1965, and the last reviewof ICS by the IUGS was in 1995.

  4. Ad Hoc网络%Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    王海涛

    2005-01-01

    首先介绍了Ad Hoc网络的基本概念、技术特点以及关键技术等,然后较为全面地归纳了Ad Hoc网络的典型应用,最后讨论了Ad Hoc网络的发展趋势和有待解决的问题.

  5. Connectivity in finite ad-hoc networks

    Institute of Scientific and Technical Information of China (English)

    WANG HanXing; LU GuiLin; JIA WeiJia; ZHAO Wei

    2008-01-01

    Research on ad-hoc network connectivity has mainly focused on asymptotic results In the number of nodes in the network. For a one-dimensional ad-hoc network G1, assuming all the nodes are Independently uniform distributed in a closed Interval [O, Z](z ∈ R+), we derive a generic formula for the probability that the network is connected. The finite connected ad-hoc networks is analyzed. And we separately suggest necessary conditions to make the ad-hoc network to be connected in one and two dimensional cases, facing possible failed nodes (f-nodes). Based on the necessary condition and unit-disk assumption for the node transmission, we prove that the nodes of the connected two-dimensional ad-hoc networks (G2) can be di-vided into at most five different groups. For an f-node n0 in either of the five groups, we derive a close formula for the probability that there is at least one route between a pair of nodes in G2 - {no}.

  6. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  7. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    OpenAIRE

    Serefoglu, Ege Can; McMahon, Chris G.; Waldinger, Marcel D.; Stanley E. Althof; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita

    2014-01-01

    INTRODUCTION: The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. AIM: The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/o...

  8. Secure Clustering in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zainab Nayyar

    2015-09-01

    Full Text Available A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. Nodes self-organize to form a network over radio links. Security issues are commonly observed in vehicular ad hoc networks; like authentication and authorization issues. Secure Clustering plays a significant role in VANETs. In recent years, various secure clustering techniques with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these techniques are designed for VANETs and pave the way for the further research, a survey of the secure clustering techniques is discussed in detail in this paper. Qualitatively, as a result of highlighting various techniques of secure clustering certain conclusions are drawn which will enhance the availability and security of vehicular ad hoc networks. Nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads.

  9. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  10. Report on the supply and demand of 18O enriched water. Ad hoc committee of the North American Society for the Study of Obesity, 21 January 1999

    International Nuclear Information System (INIS)

    Oxygen-18 is a stable isotope that is used as a tracer for several biomedical applications. The two primary applications are the study of organismal energy expenditure and organ specific utilization of glucose. The former uses 18O along with deuterium to measure carbon dioxide production of free-living animals and humans. Total energy expenditure is calculated from carbon dioxide production using the standard equations of indirect calorimetry. The later uses 18O as a precursor for the production of 18F, a radionuclide that is incorporated into glucose homologues and injected into the circulating blood. When the glucose homologues are taken up by an organ (usually brain), the organ can be imaged using positron emission tomography (PET). Both of these techniques have become major research and, in the case of PET, diagnostic tools during the last decade. This growth in the use of these tools has increased the world-wide demand for 18O in the form of water. In 1998, this demand could not be met by suppliers and significant delivery delays have been encountered by many investigators and clinicians. Some suppliers are quoting delivery delays of a year. These delays have disrupted on-going research and delayed the start of new projects. The shortage has resulted in a price increase of nearly 50% in 18O water. The disruption of 18O supply in 1998 is the second such disruption in the past decade. Commercial suppliers could not provide sufficient product in late 1990 following the forced closure of the US government production facility at Los Alamos Laboratory. Delivery delays lasted throughout 1991. In August of 1998, the council of the North American Association for the Study of Obesity formed an ad hoc committee to gather information regarding the supply and demand for 18O and to investigate potential solutions to the problem

  11. Ad hoc networks telecommunications and game theory

    CERN Document Server

    Benslama, Malek; Batatia, Hadj

    2015-01-01

    Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura

  12. Intermittently connected mobile ad hoc networks

    CERN Document Server

    Jamalipour, Abbas

    2011-01-01

    In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths betwe

  13. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  14. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, Fei

    2011-01-01

    Mobile ad-hoc networks (MANETs) are more and more present in our daily life. Such networks are often composed of mobile and battery-supplied devices, like laptops and PDAs. With no requirement for infrastructure support, MANETs can be used as temporary networks, such as for conference and office env

  15. Localization in Ad-Hoc Sensor Networks

    NARCIS (Netherlands)

    Keijzer, de A.

    2003-01-01

    In many applications, like tracking persons, the position of sensor nodes is important. This report describes existing research in localization. Using these existing methods a localization method for ad-hoc sensor networks is presented. Simulation results are discussed and suggestions for implementa

  16. Supporting Dynamic Ad hoc Collaboration Capabilities

    International Nuclear Information System (INIS)

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment

  17. Supporting Dynamic Ad hoc Collaboration Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  18. Flexible Authentication in Vehicular Ad hoc Networks

    CERN Document Server

    Caballero-Gil, P; Molina-Gil, J; Hernández-Goya, C

    2010-01-01

    A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Consequently, the vehicles need to make sure that the information has been sent by an authentic node in the network. VANETs present unique challenges such as high node mobility, real-time constraints, scalability, gradual deployment and privacy. No existent technique addresses all these requirements. In particular, both inter-vehicle and vehicle-to-roadside wireless communications present different characteristics that should be taken into account when defining node authentication services. That is exactly what is done in this paper, where the features of inter-vehicle and vehicle-to-roadside communications are analyzed to propose differentiated services for node authentication, according to privacy and efficiency needs.

  19. Routing Security in Ad Hoc Wireless Networks

    Science.gov (United States)

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  20. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  1. Research on Routing Protocol of Mobile Ad Hoc Network

    OpenAIRE

    Tuo Ming Fu; Che Min

    2016-01-01

    Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.

  2. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    Science.gov (United States)

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  3. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    Science.gov (United States)

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    Introduction The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. Aim The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. Methods In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. Results The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the

  4. A REVIEW PAPER ON AD HOC NETWORK SECURITY

    Directory of Open Access Journals (Sweden)

    Karan Singh

    2007-06-01

    Full Text Available In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the proposed solutions and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.

  5. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  6. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  7. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  8. A Comparison of Routing Strategies for Vehicular Ad Hoc Networks

    OpenAIRE

    Füßler, Holger; Mauve, Martin; Hartenstein, Hannes; Käsemann, Michael; Vollmer, Dieter

    2002-01-01

    On this paper we investigate the use of ad-hoc routing algorithms for the exchange of data between vehicles. There are two main aspects that are of interest in this context: the specific characteristics of ad-hoc networks formed by vehicles and the applicability of existing ad-hoc routing schemes to networks that display these characteristics. In order to address both aspects we generate realistic vehicular movement patterns of highway traffic scenarios using a well validated traffic simulati...

  9. Mobility Models for Vehicular Ad-hoc Network Simulation

    OpenAIRE

    Vaishali D. Khairnar; Pradhan, S. N.

    2013-01-01

    One of the emerging applications that belong to ambient systems is to transparently and directly interconnect vehicles on roads, making an ad hoc network that enables a variety of applications through distributed software without the need of any fixed and dedicated infrastructure. The network as well as the embedded computers and sensors in the vehicle will be invisible to the driver, who will get the required services during his journey. New type of ad hoc network is the Vehicular Ad hoc Net...

  10. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  11. Improving Reactive Ad Hoc Routing Performance by Geographic Route Length

    Institute of Scientific and Technical Information of China (English)

    CAO Yuan-da; YU Yan-bing; LU Di

    2005-01-01

    In order to help reactive ad hoc routing protocols select better-performance routes, a novel metric named geographic route length (GRL) is proposed. The relationship between GRL metric and routing performance is analyzed in detail. Combined with hop metric, GRL is applied into the original ad hoc on-demand distance vector (AODV) to demonstrate its effectiveness. Simulation experiments have shown that GRL can effectively reduce packet delay and route discovery frequency, thus can improve reactive ad hoc routing performance.

  12. Ad Hoc Protocols Via Multi Agent Based Tools

    OpenAIRE

    Ali Bazghandi; Mehdi Bazghandi

    2011-01-01

    The purpose of this paper is investigating behaviors of Ad Hoc protocols in Agent-based simulation environments. First we bring brief introduction about agents and Ad Hoc networks. We introduce some agent-based simulation tools like NS-2. Then we focus on two protocols, which are Ad Hoc On-demand Multipath Distance Vector (AODV) and Destination Sequenced Distance Vector (DSDV). At the end, we bring simulation results and discuss about their reasons.

  13. Implementation and Experimental Evaluation of Wireless Ad hoc Routing Protocols

    OpenAIRE

    Lundgren, Henrik

    2005-01-01

    A wireless ad hoc network consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. New routing protocols that can adapt to the frequent topology changes induced by node mobility and varying link qualities are needed. During the last decade dozens of different ad hoc routing protocols have been proposed, optimized and partially compared, mainly through simulation studies. This thesis takes an experimental approach to the evaluation of ad hoc routing pro...

  14. Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks

    OpenAIRE

    Sujatha J; Mr. Manoj Challa

    2013-01-01

    In ad hoc networking the polices are vulnerable to a wide range of security in network attacks.The design of enforcing and revoking policy mechanisms is a challenging task, especially in comparison tosecuring the ad hoc network. In this paper, the designed and implemented mechanism to provide a trustedcommunication for file sharing in ad-hoc network is explained, where the mechanism has been developedwith the help of polices where each policy is a combination of set of parameters. Simulation ...

  15. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  16. A Survey of Vehicular Ad hoc Networks Routing Protocols

    OpenAIRE

    Marwa Altayeb; Imad Mahgoub

    2013-01-01

    In recent years, the aspect of vehicular ad hoc network (VANET) is becoming an interesting research area; VANET is a mobile ad hoc network considered as a special case of mobile ad hoc network (MANET). Similar to MANET, VANET is characterized as autonomous and self-configured wireless network. However, VANET has very dynamic topology, large and variable network size, and constrained mobility; these characteristics led to the need for efficient routing and resource saving VANET protocols, to f...

  17. A mobile ad-hoc network (MANET) implementation on android

    OpenAIRE

    Mohammed, Mohammed Khalid Hassan

    2014-01-01

    The continual changing of self-organizing nodes located in an infrastructure-less mesh network is called ad hoc network. The recent years have witnessed a rapid growth of interest in ad hoc networking. This research with the aid of Java Native Interface (JNI) and UNIX kernel tools for network, a method to build a Mobile Ad hoc Network (MANET) has been implemented for Android devices to provide supplementary way of communication in certain situations where network infrastructure does not exist...

  18. Geocasting and Multicasting Routing Operation in Mobile Ad Hoc Network

    OpenAIRE

    R.Kruthika

    2013-01-01

    The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc network (MANET).An Ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure .In this environment routing/multicasting protocols are faced with the challenge of producing multihop router under host mobility and band constraints. Various approaches and routing protocol have been proposed to address Ad hoc networking problems and multiple standardization effort wit...

  19. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  20. CAPACITY EVALUATION OF MULTI-CHANNEL WIRELESS AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Jiandong; Zygmunt J. Haas; Min Sheng

    2003-01-01

    In this paper, the capacity of multi-channel, multi-hop ad hoc network is evaluated.In particular, the performance of multi-hop ad hoc network with single channel IEEE 802.11MAC utilizing different topologies is shown. Also the scaling laws of throughputs for large-scale ad hoc networks and the theoretical guaranteed throughput bounds for multi-channel gridtopology systems are proposed. The results presented in this work will help researchers to choosethe proper parameter settings in evaluation of protocols for multi-hop ad hoc networks.

  1. IP ADDRESS AUTOCONFIGURATION FOR WIRELESS AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    阿姆贾德

    2002-01-01

    A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks.

  2. A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    DR. N. SATYANARAYANA

    2010-12-01

    Full Text Available Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack (AHFA, can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP, a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.

  3. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  4. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    Directory of Open Access Journals (Sweden)

    Ege Can Serefoglu, MD

    2014-06-01

    Conclusion: The ISSM unified definition of lifelong and acquired PE represents the first evidence-based definition for these conditions. This definition will enable researchers to design methodologically rigorous studies to improve our understanding of acquired PE. Serefoglu EC, McMahon CG, Waldinger MD, Althof SE, Shindel A, Adaikan G, Becher EF, Dean J, Giuliano F, Hellstrom WJG, Giraldi A, Glina S, Incrocci L, Jannini E, McCabe M, Parish S, Rowland D, Segraves RT, Sharlip I, and Torres LO. An evidence-based unified definition of lifelong and acquired premature ejaculation: Report of the second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation. Sex Med 2014;2:41–59.

  5. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  6. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  7. Optimal channel choice for collaborative ad-hoc dissemination

    DEFF Research Database (Denmark)

    Hu, Liang; Boudec, J-Y. L.; Vojnovic, M.

    2010-01-01

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others...

  8. Philosophical perspectives on ad hoc hypotheses and the Higgs mechanism

    NARCIS (Netherlands)

    Friederich, Simon; Harlander, Robert; Karaca, Koray

    2014-01-01

    We examine physicists' charge of ad hocness against the Higgs mechanism in the standard model of elementary particle physics. We argue that even though this charge never rested on a clear-cut and well-entrenched definition of "ad hoc", it is based on conceptual and methodological assumptions and pri

  9. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  10. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    2010-01-01

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from no

  11. AD HOC TEAMWORK BEHAVIORS FOR INFLUENCING A FLOCK

    Directory of Open Access Journals (Sweden)

    Katie Genter

    2016-02-01

    Full Text Available Ad hoc teamwork refers to the challenge of designing agents that can influence the behavior of a team, without prior coordination with its teammates. This paper considers influencing a flock of simple robotic agents to adopt a desired behavior within the context of ad hoc teamwork. Specifically, we examine how the ad hoc agents should behave in order to orient a flock towards a target heading as quickly as possible when given knowledge of, but no direct control over, the behavior of the flock. We introduce three algorithms which the ad hoc agents can use to influence the flock, and we examine the relative importance of coordinating the ad hoc agents versus planning farther ahead when given fixed computational resources. We present detailed experimental results for each of these algorithms, concluding that in this setting, inter-agent coordination and deeper lookahead planning are no more beneficial than short-term lookahead planning.

  12. Opinion Impact Models and Opinion Consensus Methods in Ad Hoc Tactical Social Networks

    OpenAIRE

    Demin Li; Jie Zhou; Jingjuan Zhu; Jiacun Wang

    2013-01-01

    Ad hoc social networks are special social networks, such as ad hoc tactical social networks, ad hoc firefighter social networks, and ad hoc vehicular social networks. The social networks possess both the properties of ad hoc network and social network. One of the challenge problems in ad hoc social networks is opinion impact and consensus, and the opinion impact plays a key role for information fusion and decision support in ad hoc social networks. In this paper, consider the impact of physic...

  13. AD HOC TEAMWORK BEHAVIORS FOR INFLUENCING A FLOCK

    OpenAIRE

    Katie Genter; Peter Stone

    2016-01-01

    Ad hoc teamwork refers to the challenge of designing agents that can influence the behavior of a team, without prior coordination with its teammates. This paper considers influencing a flock of simple robotic agents to adopt a desired behavior within the context of ad hoc teamwork. Specifically, we examine how the ad hoc agents should behave in order to orient a flock towards a target heading as quickly as possible when given knowledge of, but no direct control over, the behavior of the flock...

  14. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  15. Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme

    Directory of Open Access Journals (Sweden)

    Mona Holsve Ofigsbø

    2008-06-01

    Full Text Available The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs. The scheme is intended for ad hoc networks with a planned origin, and where a common point of trust exists. Mobile ad hoc networks have limited available bandwidth. The revocation lists must therefore be specific to the network. They are established with the aid of trusted gateways reporting the identity of the nodes to a central trusted entity. To minimize overhead, the revocation lists are distributed along with the routing messages. In the articles we discuss how the scheme can be implemented in conjunction with the predominant routing protocols in ad hoc networks. The article also provides a detailed security analysis of the proposed protocols, partly based on the use of formal methods.

  16. Routing in Highly Dynamic Ad Hoc Networks: Issues and Challenges

    Directory of Open Access Journals (Sweden)

    Varun G Menon

    2016-04-01

    Full Text Available The aim of this research paper is to analyze the various issues and challenges involved in routing of data packets in highly mobile ad hoc networks. Routing in ad hoc networks has always been a challenging and tough task due to the dynamic topology and error prone wireless channel. There are a number of issues like lack of centralized control, constantly moving nodes etc that has to be considered while routing a data packet from the source to the destination in the ad hoc network. Routing of data packets becomes much more difficult with increased mobility of nodes. This paper analyses the various issues in routing of data packets from the source to the destination node and also lists down the parameters that has to be considered while designing and selecting a routing protocol for highly mobile ad hoc networks.

  17. The Extended Clustering AD HOC Routing Protocol (ECRP

    Directory of Open Access Journals (Sweden)

    Buthayna Al-Sharaa

    2013-06-01

    Full Text Available Ad hoc networks are acollection of mobile nodes communicating via wireless channels without any fixedinfrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractiveapplications in different fields. The topology of ad hoc networks changes dynamically, and each node in thenetwork can act as a host or router.With the increase in the number of wirelessdevices andlarge amountof traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents ascalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc RoutingProtocol (ECRP. This is a hybrid protocol, which combines reactive and proactive approaches in routing.The protocol uses theGlobal PositioningSystem todetermine the position of certain nodesin the network.The evaluation methodology and simulation results obtained showthat the protocol is efficient and scaleswell in large networks

  18. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Sun Baolin; Li Layuan

    2006-01-01

    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  19. Connectivity-driven Attachment in Mobile Cellular Ad Hoc Networks

    OpenAIRE

    Boite, Julien; Leguay, Jérémie

    2014-01-01

    International audience Cellular wireless technologies (e.g. LTE) can be used to build cellular ad hoc networks. In this new class of ad hoc networks, nodes are equipped with two radio interfaces: one being a terminal, the other one being an access point. In this context, attachment decisions based on traditional criteria (e.g. signal quality) may lead to network partitions or suboptimal path lengths, thus making access point selection critical to ensure efficient network connectivity. This...

  20. Coping With Misbehavior in Mobile Ad-hoc Networks

    OpenAIRE

    Buchegger, Sonja

    2004-01-01

    In this work, we address the question of how to enable a system to operate despite the presence of misbehavior. Specifically, in a mobile ad-hoc network, how can we keep the network functional for normal nodes when other nodes do not route and forward correctly? Node misbehavior due to selfish or malicious reasons or faulty nodes can significantly degrade the performance of mobile ad-hoc networks. Existing approaches such as economic incentives or secure routing by cryptographic means allevi...

  1. Routing in Terrestrial Free Space Optical Ad-Hoc Networks

    OpenAIRE

    Dong, Yao; Sadegh Aminian, Mohammad

    2014-01-01

    Terrestrial free-space optical (FSO) communication uses visible or infrared wavelengths to broadcast high speed data wirelessly through the atmospheric channel. The performance of terrestrial FSO channel mainly depends on the local atmospheric conditions. Ad hoc networks offer cost-effective solutions for communications in areas where infrastructure is unavailable, e.g., intelligent transport system, disaster recovery and battlefield scenarios. Traditional ad hoc networks operate in the radio...

  2. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    CERN Document Server

    Kaaniche, Heni

    2010-01-01

    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  3. A Review of Anonymity in Mobile Ad Hoc Networks

    OpenAIRE

    KERNÁCS János; SZILÁGYI Szabolcs

    2010-01-01

    An ad hoc network is a self-organizingnetwork of wireless links connecting mobile nodes.The mobile nodes can communicate without aninfrastructure. They form an arbitrary topology, wherethe nodes play the role of routers and are free to moverandomly. Mobile ad hoc networks requireanonymous communications, in order to thwart newwireless passive attacks, and to protect new assets ofinformation such as nodes’ locations, motion patterns,network topology and traffic patterns in addition toconventio...

  4. Secure and reliable wireless and ad hoc communications

    OpenAIRE

    Nguyen, Son Thanh

    2009-01-01

    Wireless and ad hoc communication systems create additional challenges for the implementation of security and reliability services when compared to fxed networks. On the one hand, the inherent characteristics of wireless environment contribute serious system vulnerabilities if the security requirements are not met. On the other hand, the mobility pattern as well as resource constraints of ad hoc devices make security design more di cult. The principal objective of SWACOM pro...

  5. IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks

    OpenAIRE

    Shahrukh Khalid; Athar Mahboob; Choudhry Fahad Azim; Aqeel Ur Rehman

    2016-01-01

    Ad hoc networks lack support of infrastructure and operate in a shared bandwidth wireless environment. Presently, such networks have been realized by various adaptations in Internet Protocol (IP) architecture which was developed for infrastructure oriented hierarchical networks. The IP architecture has its known problem and issues even in infrastructure settings, like IP address overloading, mobility, multihoming, and so forth. Therefore, when such architecture is implemented in ad hoc scenar...

  6. Link Perdurability Based Routing for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Sun Xuebin; Zhou Zheng

    2003-01-01

    Ad Hoc networks are prone to link failures due to mobility. In this letter, a link perdurability based routing scheme is proposed to try dealing with this problem. This scheme uses signal strength measurements to estimate the route life time and hence chooses a stable route, and is implemented in two typical ad hoc routing protocols to evaluate its performance. The simulation results have shown that this scheme can improve these protocols' packet delivery ratio in cases where there are frequent link failures.

  7. An Intrusion Detection System Framework for Ad Hoc Networks

    OpenAIRE

    Arjun Singh; Surbhi Chauhan; Kamal Kant; Reshma Doknaia

    2012-01-01

    Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. This paper presents an intrusion detection system fo...

  8. An Efficient Proactive RSA Scheme for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Rui-shan; CHEN Ke-fei

    2007-01-01

    A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient.

  9. Performance Evaluation of Important Ad Hoc Network Protocols

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available A wireless ad hoc network is a collection of specific infrastructureless mobile nodes forming a temporary network without any centralized administration. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can adopt dynamically changing topology. To accomplish this, a number of ad hoc routing protocols have been proposed and implemented, which include dynamic source routing (DSR, ad hoc on-demand distance vector (AODV routing, and temporally ordered routing algorithm (TORA. Although considerable amount of simulation work has been done to measure the performance of these routing protocols, due to the constant changing nature of these protocols, a new performance evaluation is essential. Accordingly, in this paper, we analyze the performance differentials to compare the above-mentioned commonly used ad hoc network routing protocols. We also analyzed the performance over varying loads for each of these protocols using OPNET Modeler 10.5. Our findings show that for specific differentials, TORA shows better performance over the two on-demand protocols, that is, DSR and AODV. Our findings are expected to lead to further performance improvements of various ad hoc networks in the future.

  10. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  11. Reliable routing algorithm in marine ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    LIN Wei; YANG Yong-Tian

    2004-01-01

    A routing algorithm called DNH for increasing efficiency of mobile ad hoc network is presented, which is based on a new criterion called TSS ( Temporarily Steady State) , combining with wireless transmission theory that makes networks topology correspondingly stabilization. Also the DNH algorithm has the characteristics of giving up queuing in a node, but selecting another idle node instead of the node for forwarding data packets if the node has a full throughput. Simulation evaluation shows that selecting another node is better than queuing in a full throughout node if some conditions are satisfied, especially during a sea battle, every warship in ad hoc network wants to contest time and increase propagation reliability. The DNH algorithm can help decrease routing time, and raise efficiency of marine ad hoc networks.

  12. Survey of Routing Protocols in Vehicular Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Karthikumar. P.

    2012-04-01

    Full Text Available Vehicular ad-hoc networks (VANETs are a promising communication scenario. Several new applications are envisioned, which will improve traffic management and safety. In comparison to other communication networks, Vehicular Ad-hoc Networks (VANETs have unique requirements with respect to applications, types of communication, self-organization and other issues. VANETspecific protocol layers, a staircase approach for interaction among layers and the use of an information connector for cross-layer information exchange using the publisher/subscriber pattern. The main goal of VANET is providing safety and comfort for passengers. Each vehicle equipped with VANET device will be a node in the Ad-hoc network and can receive

  13. Dynamic Encryption Technology in Ad-hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JIN Zhao-hui; WANG Shun-man; XU Kai; LIANG Qing

    2007-01-01

    A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results.

  14. A Reactive Location Service for Mobile Ad Hoc Networks

    OpenAIRE

    Käsemann, Michael; Füßler, Holger; Hartenstein, Hannes; Mauve, Martin

    2002-01-01

    We present and analyze a reactive location service RLS for mobile ad hoc networks. RLS provides a mobile node in a wireless ad-hoc network with the means to inquire the current geographical position of another node on-demand and can be used as a building block for location-based routing. We provide a comparison of RLS to an ideal omniscient location service as well as to the complex Grid Location Service (GLS). In addition, we compare the performance of greedy location-based routing in combin...

  15. A Study On OFDM In Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Malik Nasereldin Ahmed

    2012-06-01

    Full Text Available Orthogonal Frequency Division Multiplexing (OFDM is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can be used adaptively in a dynamically changing channel. This study gives a detailed view about OFDM and how it is useful to increase the bandwidth. This paper also gives an idea about how OFDM can be a promising technology for high capacity wireless communication.

  16. Mobile Ad Hoc Networks Current Status and Future Trends

    CERN Document Server

    Loo, Jonathan

    2011-01-01

    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility o

  17. Virtual reality mobility model for wireless ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yu Ziyue; Gong Bo; He Xingui

    2008-01-01

    For wireless ad hoc networks simulation.node's mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment,and the model uses the path planning method to avoid obstacles and to compute the node's moving path.Obstacles also affect node's signal propagation.Considering these factors,this study implements the mobility model for wireless ad hoc networks.Simulation results show that the model has a significant impact on the performance of protocols.

  18. Routing Protocol of Sparse Urban Vehicular Ad Hoc Networks

    Science.gov (United States)

    Li, Huxiong

    Vehicular ad hoc network (VANET) is an application of mobile ad hoc technology in transportation systems, it has become an important part of ITS. Since multi-hop link is hard to set up in sparse VANET, a traffic-aware routing (TAR) protocol is proposed which estimates vehicle average neighbors (VAN) of roads by exchanging beacon messages between encounter vehicles. Road with high VAN is preferred to be selected as part of forwarding path at intersection. Packets are forwarded to the next intersection in road in a greedy manner. Simulations show that TAR outperforms the compared protocols in terms of both packet delivery ratio and average end-to-end delay.

  19. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  20. Gossip Based Routing Protocol Design for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Toqeer Mahmood

    2012-01-01

    Full Text Available A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this research study, we proposed a routing strategy based on gossip based routing approach that follows the proactive routing with some treatment for wireless Ad Hoc network. The analytical verification of our proposed idea shows that it is a better approach based on gossip routing.

  1. Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Er. Rakesh Kumar,

    2010-08-01

    Full Text Available hoc networks are self configuring network and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol can accommodate such an environment. Different protocols govern the mobile ad hoc networks and to improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV routing protocol in mobile ad hoc networks with high mobility, a message exchange scheme for its invalid route reconstruction is being used. Three protocols AODV, DSDV and I-DSDV were simulated using NS-2 package and were compared in terms of packet delivery ratio, end to end delay routing overhead in different environment; varying number of nodes, speed and pause time. Simulation results show that IDSDVcompared with DSDV, it reduces the number of dropped data packets with little increased overhead at higher rates of node mobility but still compete with AODV in higher node speed and number of node.

  2. TMAP ad hoc Working Group Fish Progress report 2007

    NARCIS (Netherlands)

    Bolle, L.J.; Damm, U.; Diederichs, B.; Jager, Z.; Overzee, van H.M.J.

    2007-01-01

    Building on previous work done by the TMAP ad hoc Working Group Fish, a meeting and a workshop were held in Hamburg in June and October 2007. The most important aim of both was to come to an agreement on how to proceed with the data preparations and analyses, and to facilitate the exchange of data a

  3. A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network

    Directory of Open Access Journals (Sweden)

    Li Mengyang

    2011-02-01

    Full Text Available Merging MPLS into multicast routing protocol in Mobile Ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast Routing Protocol (LSMRP is presented in this paper.

  4. Authentication and consensus overhead in vehicular ad hoc networks

    NARCIS (Netherlands)

    Petit, Jonathan; Mammeri, Zoubir

    2013-01-01

    Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm EC

  5. Routing in Ad Hoc Network Using Ant Colony Optimization

    Science.gov (United States)

    Khanpara, Pimal; Valiveti, Sharada; Kotecha, K.

    The ad hoc networks have dynamic topology and are infrastructure less. So it is required to implement a new network protocol for providing efficient end to end communication based on TCP/IP structure. There is a need to re-define or modify the functions of each layer of TCP/IP model to provide end to end communication between nodes. The mobility of the nodes and the limited resources are the main reason for this change. The main challenge in ad hoc networks is routing. Due to the mobility of the nodes in the ad hoc networks, routing becomes very difficult. Ant based algorithms are suitable for routing in ad hoc networks due to its dynamic nature and adaptive behavior. There are number of routing algorithms based on the concept of ant colony optimizations. It is quite difficult to determine the best ant based algorithm for routing as these algorithms perform differently under various circumstances such as the traffic distribution and network topology. In this paper, the overview of such routing algorithms is given.

  6. Performance modeling of data dissemination in vehicular ad hoc networks

    DEFF Research Database (Denmark)

    Chaqfeh, Moumena; Lakas, Abderrahmane; Lazarova-Molnar, Sanja

    2013-01-01

    Vehicular Ad hoc Networks (VANETs) have become a cornerstone component of Intelligent Transportation Systems (ITS). VANET applications present a huge potential for improving road safety and travel comfort, hence the growing interest of both academia and industry. The main advantage of VANETs is its...

  7. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  8. ANALYSIS OF ROUTING IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Shweta

    2012-09-01

    Full Text Available An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any standalone infrastructure or centralized administration. Routing in Ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken.In this model we not only improves the reputation of the network but also provide a routing approach for reliable data transmission and also avoid the loop occurs in the communication. The mobile network is the dynamicnetwork that provides the solution for the inclusion and exclusion of dynamic nodes in the network. AODV and DSR are the two most popular routing protocols for ad-hoc network that we discussed here. In this paper we describe the way to find the node having packet loss and to perform the elimination of node from the network withoutperforming the rerouting and provide the reliable data transfer over the network. In this paper, we design and evaluate cooperative caching techniques to efficiently support data access in the ad-hoc network.

  9. A survey of TCP over ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Altman, Eitan; Nain, Philippe

    2005-01-01

    The Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. In practice, most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless ad hoc networks can lead to TCP implemen

  10. Decentralized Network-level Synchronization in Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    Voulgaris, Spyros; Dobson, Matthew; Steen, van Maarten

    2016-01-01

    Energy is the scarcest resource in ad hoc wireless networks, particularly in wireless sensor networks requiring a long lifetime. Intermittently switching the radio on and off is widely adopted as the most effective way to keep energy consumption low. This, however, prevents the very goal of communic

  11. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, J.; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the secur

  12. Security Challenges and Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    CH.V. Raghavendran

    2013-09-01

    Full Text Available Mobile Ad hoc Network (MANET is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

  13. Multihost ad-hoc network with the clustered Security networks

    Directory of Open Access Journals (Sweden)

    J.Manikandan,

    2010-03-01

    Full Text Available Security has becomes a primary concern in order to provide protected communication between mobile nodes in a host environment .Unlike the wire line network, the unique characteristics mobile ad-hoc networkpose a collection on autonomous nodes of terminals. Which ommunication with each other by forming multihost radio network and maintaining connectivity in a decentralized manner. Node in Ad-hoc network path is dynamic network topology. These challenges clearly make a case for building multifence security selection that achieve both protection and describe network performance. In this paper we focus on the fundamental security of protection. the multihost network connectivity between mobile nodes in a MANET.we Identify thesecurity issues related to this problem, disuse the challenges to security design and review the security proposals the protect multihost wireless networks. Some security mechanism used in wired network cannot simply is applied to protocol an ad-hoc network. After analyzing various type attacks ad-hoc network, a security for thefamous routing protocol, DSR (Dynamic sources routing is proposed the complete security solutions should cluster nodes and MANET encompass the security components of prevention, detection and reactions.

  14. Providing Location Security in Vehicular Ad Hoc Networks

    Science.gov (United States)

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  15. Authentication Based on Multilayer Clustering in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Suh Heyi-Sook

    2005-01-01

    Full Text Available In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN, designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH using a new concept of control cluster head (CCH scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

  16. Technology of Ad hoc Networks%Ad hoc技术

    Institute of Scientific and Technical Information of China (English)

    曹常义

    2002-01-01

    Ad hoc技术是从无线移动Ad hoc网络(WMANET)抽象出来的一个一般性概念,该项技术所标称的是自组识、多跳的一个临时分布式系统,是一种网络构架技术.它要面临多项难题.本文就是从OSI模型的角度把Ad hoc技术分层介绍,最后给出了一种WMANET应用方案.

  17. Study on Sinkhole Attacks in Wireless Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    GAGANDEEP

    2012-06-01

    Full Text Available Wireless ad hoc network is a collection of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. As compared to conventional network, wireless ad hocnetwork are more vulnerable to the security attacks. The nature and structure of wireless ad hoc network makes it very attractive to attackers, because there is no fixed infrastructure and administrativeapproach in it. “Sinkhole attack” is one of the severe attacks in this type of network; this makes trustable nodes to malicious nodes that result in loss of secure information. This paper focuses on sinkhole attacks on routing protocols such as DSR, AODV. To overcome the problems occur due to sinkhole we discuss about Security-aware routing (SAR which helps to reduce the impact of such attack.

  18. TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Amandeep Verma

    2012-05-01

    Full Text Available An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing protocol and trust model as OWL (Ontology Web language ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework

  19. A Research on Ad hoc Network Technology%Ad hoc 网络技术研究

    Institute of Scientific and Technical Information of China (English)

    王春霞

    2007-01-01

    Ad hoc 网络是一种多跳、无中心的无线自组网络.它不需依赖任何预先设置的固定的网络设施,而能被迅速展开;而且具有灵活、机动、自适应和高抗毁等特性.基于Ad hoc网络的研究现状,讨论了Ad hoc 网络所涉及的网络体系结构、路由协议、网络安全、功率控制和节能技术等问题.

  20. Bandwidth Estimation For Mobile Ad hoc Network (MANET

    Directory of Open Access Journals (Sweden)

    Rabia Ali

    2011-09-01

    Full Text Available In this paper we presents bandwidth estimation scheme for MANET, which uses some components of the two methods for the bandwidth estimation: 'Hello Bandwidth Estimation 'Listen Bandwidth Estimation. This paper also gives the advantages of the proposed method. The proposed method is based on the comparison of these two methods. Bandwidth estimation is an important issue in the Mobile Ad-hoc Network (MANET because bandwidth estimation in MANET is difficult, because each host has imprecise knowledge of the network status and links change dynamically. Therefore, an effective bandwidth estimation scheme for MANET is highly desirable. Ad hoc networks present unique advanced challenges, including the design of protocols for mobility management, effective routing, data transport, security, power management, and quality-of-service (QoS provisioning. Once these problems are solved, the practical use of MANETs will be realizable.

  1. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  2. Implementing Smart Antenna System in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Supriya Kulkarni P

    2014-06-01

    Full Text Available As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Nowadays, users are interested in interconnecting all their personal electronic devices (PEDs in an ad hoc fashion on the move. This type of network is referred to as Mobile Ad hoc NETwork (MANET. When in such network a smart antenna System (SAS is implemented then we can achieve maximum capacity and improve the quality and coverage. So we are intended to implement such a SAS in the MANET. In this paper we have shown significance of Throughput and Bit Error Rate by implementing SAS in MANET using MATLABR2010a.

  3. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  4. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  5. BCR Routing for Intermittently Connected Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    S. RAMESH

    2014-03-01

    Full Text Available The Wireless and the Mobile Networks appear to provide a wide range of applications. Following these, the Mobile Ad hoc Networks (MANET aid in wide development of many applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Ad hoc Network (ICMANET is a sparse network where a full connectivity is never possible. ICMANET is a disconnected MANET and is also a Delay Tolerant Network (DTN that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called Bee Colony Routing (BCR is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. BCR is proposed with the basis of Bee Colony Optimization technique (BCO. The routing in ICMNAET is done by means of Bee routing protocol. This paper enchants a novel routing methodology for data transmission in ICMANET.

  6. Safety Message Power Transmission Control for Vehicular Ad hoc Networks

    CERN Document Server

    Samara, Ghassan; Al-Salihy, Wafaa A H

    2010-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. In this research we proposed a dynamic power adjustment protocol that will be used for sending the periodical safety message. (Beacon)based on the analysis of the channel status depending on the channel congestion and the power used for transmission. The Beacon Power Control (BPC) protocol first sensed and examined the percentage of the channel congestion, the result obtained was used to adjust the transmission power for the safety message to reach the optimal power. This will lead to decrease the congestion in the channel and achieve good channel performance and beacon dissemination.

  7. A Secure Multi-Routing Platform for Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    LU She-jie; CHEN Jing; XIONG Zai-hong

    2008-01-01

    In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose,a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.

  8. Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Amit Kumar

    2012-05-01

    Full Text Available The research on various issues in Mobile ad hoc networks is getting popular because of its challenging nature and all time connectivity to communicate. Network simulators provide the platform to analyse and imitate the working of the nodes in the networks along with the traffic and other entities. The current work proposes the design of a simulator for the mobile ad hoc networks that provides a test bed for the energy efficient clustering in the dynamic network. Node parameters like degree of connectivity and average transmission power are considered for calculating the energy consumption of the mobile devices. Nodes that consume minimum energy among their 1-hop neighbours are selected as the cluster heads.

  9. AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    彭伟; 卢锡城

    2001-01-01

    Broadcast is an important operation in many network protocols. It is utilized to discover routes to unknown nodes in mobile ad hoc networks (MANETs) and is the key factor in scaling on-demand routing protocols to large networks. This paper presents the Ad Hoc Broadcast Protocol (AHBP) and its performance is discussed. In the protocol, messages are only rebroadcast by broadcast relay gateways that constitute a connected dominating set of the network. AHBP can efficiently reduce the redundant messages which make flooding-like protocols perform badly in large dense networks. Simulations are conducted to determine the performance characteristics of the protocol. The simulation results have shown excellent reduction of broadcast redundancy with AHBP. It also contributes to a reduced level of broadcast collision and congestion.

  10. Power Control in Multi-cluster Mobile Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JINYanliang; YANGYuhang

    2003-01-01

    Power control gives us many advantages including power saving, lower interference, and efficient channel utilization. We proposed two clustering algorithms with power control for multl-cluster mobile ad hoc networks in this paper. They improve the network throughput and the network stability as compared to other ad hoc networks in which all mobile nodes use the same transmission power. Furthermore, they help in reducing the system power consumption. We compared the performances of the two approaches. Simulation results show that the DCAP (Distributed clustering algorithm with power control) would achieve a better throughput performance and lower power consumption than the CCAP (Centralized clustering algorithm with power control), but it is complicated and liable to be affected by node velocity.

  11. Reformative multicast routing protocol based on Ad Hoc

    Institute of Scientific and Technical Information of China (English)

    杨喜旺; 王华; 焦国太

    2008-01-01

    Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with nodes increasing and creating routing each other. The reformative on-demand multicast routing protocol was putted forward by researching the energy consuming of multicast routing protocol in Ad Hoc. It will decrease consumption in a big multicast flooding through studying the relaying group net structure based on map or wormhole. The energy consumption is reduced 30% by creating the two kinds of routing principles: minimization of energy consumption and minimization of maximum nodes energy consumption. The simulation result indicates that the reformative RODMRP is effective to reduce the energy consuming while routing protocol built.

  12. Shuttle-run synchronization in mobile ad hoc networks

    Science.gov (United States)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  13. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  14. Distributed Reinforcement Learning Approach for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Wu, Celimuge; Kumekawa, Kazuya; Kato, Toshihiko

    In Vehicular Ad hoc Networks (VANETs), general purpose ad hoc routing protocols such as AODV cannot work efficiently due to the frequent changes in network topology caused by vehicle movement. This paper proposes a VANET routing protocol QLAODV (Q-Learning AODV) which suits unicast applications in high mobility scenarios. QLAODV is a distributed reinforcement learning routing protocol, which uses a Q-Learning algorithm to infer network state information and uses unicast control packets to check the path availability in a real time manner in order to allow Q-Learning to work efficiently in a highly dynamic network environment. QLAODV is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes. We present an analysis of the performance of QLAODV by simulation using different mobility models. The simulation results show that QLAODV can efficiently handle unicast applications in VANETs.

  15. Energy Consumption Model in Ad Hoc Mobile Network

    Directory of Open Access Journals (Sweden)

    Maher HENI

    2012-06-01

    Full Text Available The aim of this work is to model the nodes battery discharge in wireless ad hoc networks. Many work focus on the energy consumption in such networks. Even, the research in the highest layers of the ISO model, takes into account the energy consumption and efficiency. Indeed, thenodes that form such network are mobiles, so no instant recharge of battery. Also with special type of ad hoc networks are wireless sensors networks using non-rechargeable batteries. All nodes with an exhausted battery are considered death and left the network. To consider the energy consumption, in this work we model using a Markov chain, the discharge of the battery considering of instant activation and deactivation distribution function of these nodes.

  16. Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dr. Kamaljit I. Lakhtaria

    2012-05-01

    Full Text Available Mobile Ad Hoc Network (MANET is an autonomous mobile nodes forming network in an infrastructure less environment and has dynamic topology. MANET reactive protocols always not have low control overhead. The control overhead for reactive protocols is more sensitive to the traffic load, in terms of the number of traffic rows, and mobility, in terms of link connectivity change rates, than other protocols. Therefore, reactive protocols may only be suitable for MANETs with small number of traffic loads and small link connectivity change rates. It is already proved that, it is more feasible to maintain full network topology in a MANET with low control overhead. In this Research Paper through simulations that were carried out by using Network Simulator-2 (NS-2 we had analyze Reactive/ On-demand protocols such as Ad Hoc On-Demand Distance Vector Routing (AODV, Temporally-Ordered Routing Algorithm (TORA, and Dynamic Source Routing (DSR,

  17. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  18. Information Sharing Modalities for Mobile Ad-Hoc Networks

    OpenAIRE

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    2009-01-01

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logi...

  19. Mobility Prediction Based Neighborhood Discovery for Mobile Ad Hoc Networks

    OpenAIRE

    Li, Xu; Mitton, Nathalie; Simplot-Ryl, David

    2010-01-01

    Hello protocol is the basic technique for neighborhood discovery in wireless ad hoc networks. It requires nodes to claim their existence/aliveness by periodic `hello' messages. Central to any hello protocol is the determination of `hello' message transmission rate. No fixed optimal rate exists in the presence of node mobility. The rate should in fact adapt to it, high for high mobility and low for low mobility. In this paper, we propose a novel mobility prediction based hello protocol, named ...

  20. Mobility Prediction Based Neighborhood Discovery in Mobile Ad Hoc Networks.

    OpenAIRE

    Li, Xu; Mitton, Nathalie; Simplot-Ryl, David

    2011-01-01

    International audience Hello protocol is the basic technique for neighborhood discovery in wireless ad hoc networks. It requires nodes to claim their existence/ aliveness by periodic 'hello' messages. Central to a hello protocol is the determination of 'hello' message transmission rate. No fixed optimal rate exists in the presence of node mobility. The rate should in fact adapt to it, high for high mobility and low for low mobility. In this paper, we propose a novel mobility prediction bas...

  1. Energy Aware OLSR-Based Mobile Ad Hoc Networks

    OpenAIRE

    Wardi

    2012-01-01

    OLSR is a well-known proactive routing protocol designed for mobile ad hoc networks (MANETs). OLSR adopts a concept of an MPR mechanism where only mobile nodes selected as MPR nodes can retransmit broadcast packets received from other mobile nodes. Although OLSR reduces the number of broadcast packets, MPR nodes consume more energy than other mobile nodes. Since mobile nodes in MANETs are powered by battery with limited energy, energy efficiency is a critical issue in designing a routing prot...

  2. Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas

    OpenAIRE

    Eui-Jik Kim; Sungkwan Youm

    2013-01-01

    This paper presents a selective cooperative transmission scheme (abbreviated SCT) for ad hoc network with directional antennas that leverages the benefits of directional-only antenna approach and cooperative communication. The main feature of SCT is its adaptability to the channel condition in the network. In other words, when the node sends data, SCT determines its transmission strategy on either direct or cooperative transmission via a relay node called a forwarder, depending on the transmi...

  3. Quality of service on ad-hoc wireless networks

    OpenAIRE

    Paoliello Guimaraes, Rafael

    2008-01-01

    Over the last years, Mobile Ad-hoc Networks (MANETs) have captured the attention of the research community. The flexibility and cost savings they provide, due to the fact that no infrastructure is needed to deploy a MANET, is one of the most attractive possibilities of this technology. However, along with the flexibility, lots of problems arise due to the bad quality of transmission media, the scarcity of resources, etc. Since real-time communications will be common in MANETs, there has been ...

  4. Connectivity analysis of one-dimensional ad-hoc networks

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Rasmussen, Jakob Gulddahl; Schwefel, Hans-Peter

    Applications and communication protocols in dynamic ad-hoc networks are exposed to physical limitations imposed by the connectivity relations that result from mobility. Motivated by vehicular freeway scenarios, this paper analyzes a number of important connectivity metrics for instantaneous snaps...... analytic expressions for the distributions and moments of these random variables for general stationary MAP processes on a one dimensional space. The numerical results compares bursty vehicular traffic with independent movement scenarios described by a Poisson process....

  5. Verteilte Zugangskontrolle in offenen Ad-hoc-Netzen

    OpenAIRE

    Kraft, Daniel

    2007-01-01

    In Ad-hoc-Netzen sind aktive Mitarbeit aller Teilnehmer und Einbringung eigener, knapper Ressourcen zugunsten Anderer unverzichtbar. Das hier vorgestellte verteilte Zugangskontrollsystem schließt dazu unkooperative Nutznießer aus dem Netz aus. Grundlage dafür sind gegenseitige Kooperativitätseinschätzungen der autonomen, einander a priori meist unbekannten Teilnehmer, die durch automatische Verhaltensbeobachtung sowie durch Austausch und Verknüpfung von Einschätzungen ermittelt werden.

  6. An Approach In Optimization Of Ad-Hoc Routing Algorithms

    Directory of Open Access Journals (Sweden)

    Sarvesh Kumar Sharma

    2012-06-01

    Full Text Available In this paper different optimization of Ad-hoc routing algorithm is surveyed and a new method using training based optimization algorithm for reducing the complexity of routing algorithms is suggested. A binary matrix is assigned to each node in the network and gets updated after each data transfer using the protocols. The use of optimization algorithm in routing algorithm can reduce the complexity of routing to the least amount possible.

  7. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  8. A Survey: variants of TCP in Ad-hoc networks

    OpenAIRE

    Komal Zaman; Muddesar Iqbal; Muhammad Shafiq; Azeem Irshad; Saqib Rasool

    2013-01-01

    MANET (Mobile Ad-hoc network) forms a temporary network of wireless mobile nodes without any infrastructure where all nodes are allowed to move freely, configure themselves and interconnect with its neighbors to perform peer to peer communication and transmission. TCP (Transmission Control Protocol) offers reliable, oriented connection and mechanism of end to end delivery. This article provides the review and comparison of existing variants of TCP for instance: The TCP Tahoe, The TCP Reno, Th...

  9. A new traffic allocation algorithm in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    LI Xin; MIAO Jian-song; SUN Dan-dan; ZHOU Li-gang; DING Wei

    2006-01-01

    A dynamic traffic distribution algorithm based on the minimization product of packet delay and packet energy consumption is proposed. The algorithm is based on packet delay and energy consumption in allocating traffic, which can optimize the network performance. Simulation demonstrated that the algorithm could dynamically adjust to the traffic distribution between paths, which can minimize the product of packet delay and energy consumption in mobile Ad hoc networks.

  10. A Robust Reputation System for Mobile Ad-hoc Networks

    OpenAIRE

    Buchegger, Sonja; Le Boudec, Jean-Yves

    2003-01-01

    Reputation systems in mobile ad-hoc networks can be tricked by the spreading of false reputation ratings, be it false accusations or false praise. Simple solutions such as exclusively relying on one`s own direct observations have drawbacks, as they do not make use of all the information available. We propose a fully distributed reputation system that can cope with false disseminated information. In our approach, everyone maintains a reputation rating and a trust rating about everyone ...

  11. An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks

    OpenAIRE

    Sen, Jaydip

    2010-01-01

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on co-operative algorithms, absence of c...

  12. Precise Positioning Systems for Vehicular Ad-Hoc Networks

    OpenAIRE

    Gufran Ahmad Ansari; Samir A. Elsagheer Mohamed; A. Nasr

    2012-01-01

    Vehicular Ad Hoc Networks (VANET) is a very promising research venue that can offers many useful and critical applications including the safety applications. Most of these applications require that each vehicle knows precisely its current position in real time. GPS is the most common positioning technique for VANET. However, it is not accurate. Moreover, the GPS signals cannot be received in the tunnels, undergrounds, or near tall buildings. Thus, no positioning service can be obtained in the...

  13. Security Analysis of Vehicular Ad Hoc Networks (VANET)

    OpenAIRE

    Samara, Ghassan

    2012-01-01

    Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's research efforts, while current solutions to achieve secure VANET, to protect the network from adversary and attacks still not enough, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their security and privacy features, which will be discussed in this paper. In this paper a various types of ...

  14. Routing Security in Mobile Ad-hoc Networks

    OpenAIRE

    Karlsson, Jonny; Dooley, Laurence S.; Pulkkis, Goran

    2012-01-01

    The role of infrastructure-less mobile ad hoc networks (MANETs) in ubiquitous networks is outlined. In a MANET there are no dedicated routers and all network nodes must contribute to routing. Classification of routing protocols for MANET is based on how routing information is acquired and maintained by mobile nodes and/or on roles of network nodes in a routing. According to the first classification base, MANET routing protocols are proactive, reactive, or hybrid combinations of proactive and ...

  15. Multicost Routing Approach in Wireless Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    P. Ramamoorthy

    2012-01-01

    Full Text Available Problem statement: A Wireless ad hoc network is a collection of autonomous movable nodes that communicate with each other over wireless links without any static infrastructure. In these networks there is no fixed topology because of the mobility of nodes, interference, multipath propagation and path loss. A variety of routing protocols and algorithm with varying network settings are analyzed to link between the nodes and communicate packets to their destinations. Most of these algorithms are single cost, in the logic that they consign a scalar cost parameter to every link and compute the path that has minimum cost. Although multicost routing, a vector of cost parameters is consigned to each link and the cost vector of a path is well-defined based on the cost vectors of the links that embrace it. Adjustable transmission power control of the nodes with multi cost routing algorithm can support optimizeto acquire the reduced interference and improve the ad hoc network performance. Approach: The link and path of the wireless network is consigned with several cost parameters. Hop count, total interference, node link delay, residual energy of a node and the node transmission power are the cost parameters assigned for link and path of the ad hoc networks. Multicost parameters are combined in different optimization function with respect to various routing algorithm. Results: Simulation and optimization shows multicost SUM/MIN Energy-Interference algorithm with variable transmission power can lead to decrease the interference and improves the overall network performance. Conclusion: The function optimized for wireless ad hoc networks that the Multicost SUM/MIN Energy-Interference algorithm achieves improved performance over than the single cost algorithm.

  16. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  17. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node’s capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss. The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  18. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  19. Cost management based security framework in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Security issues are always difficult to deal with in mobile ad hoc networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources.Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.

  20. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  1. An Algorithm for Localization in Vehicular Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hajar Barani

    2010-01-01

    Full Text Available Positioning a node in Vehicular Ad-Hoc networks is one of the most interested research areas in recent years. In many Ad-Hoc networks such as Vehicular Ad-Hoc networks in which the nodes are considered as vehicles, move very fast in streets and highways. So, to have a safe and fast transport system, any vehicle should know where a traffic problem such as a broken vehicle occurs. GPS is one of the equipments which have been widely used for positioning service. Problem statement: Vehicle can use a GPS receiver to determine its position. But, all vehicles have not been equipped with GPS or they cannot receive GPS signals in some places such as inside of a tunnel. In these situations, the vehicle should use a GPS free method to find its location. Approach: In this study, a new method based on transmission range had been suggested. Results: This algorithm had been compared with a similar algorithm ODAM in same situations. The best performance for Optimized Disseminating Alarm Message (ODAM is when 40% of nodes are equipped with GPS. Conclusion: We executed our algorithm on this situation and compared it with ODAM results. At the end of this study, we can see our algorithm in compare to ODAM has better results.

  2. Ad Hoc Network Routing Reconfiguration Technology%Ad Hoc 网络路由重构技术研究

    Institute of Scientific and Technical Information of China (English)

    崔尧; 容晓峰; 谢安明

    2015-01-01

    Because of its characteristics ,Ad Hoc network appears to have received extensive attention ,especially from the military field ,has been widely studied and applied .In some special military applications ,the moving direction and mov‐ing speed of nodes have great relationship with the military requirements ,which led to the network topology changes in real time .In such a tactical Ad Hoc dynamically changing networks ,how to provide better routing services to ensure timely and accurate delivery of information is an urgent need to address the problem .To address this issue ,the characteristics and the main factors of Ad Hoc network routing reconstruction are decribed and a new shortest path routing selection algorithm based on the hop and bandwidth is proposed .Experiments show that the algorithm can select a new link to the destination node when routing reconstruction ,thus ensuring the command operations information transmission smoothly of tactical Ad Hoc network environment .%由于 Ad Hoc 网络的特点,从它出现就一直受到了各界的广泛关注,尤其是在军事领域中,得到了广泛的研究与应用。在一些特殊的军事应用中,节点的移动方向以及移动速度都与作战需求有很大的关系,这导致网络拓扑结构实时变化。而在战术 Ad Hoc 网络这样一个动态变化的网络中,怎么样提供更好的路由服务、确保信息及时准确的送达是一个迫切需要解决的问题。针对这个问题论文主要介绍 Ad Hoc 网络路由重构技术的特点和主要因素,并在原有路由重构算法的基础上提出一种基于路径跳数和带宽的最短路径路由选择算法,通过实验验证,该算法能在网络拓扑结构发生变化触发路由重构时,有效选择一条到达目的节点的新链路,从而保证战术 Ad Hoc 网络环境下,指挥作战信息的畅通传输。

  3. Distributed optimization of a multisubchannel Ad Hoc cognitive radio network

    KAUST Repository

    Leith, Alex

    2012-05-01

    In this paper, we study the distributed-duality-based optimization of a multisubchannel ad hoc cognitive radio network (CRN) that coexists with a multicell primary radio network (PRN). For radio resource allocation in multiuser orthogonal frequency-division multiplexing (MU-OFDM) systems, the orthogonal-access-based exclusive subchannel assignment (ESA) technique has been a popular method, but it is suboptimal in ad hoc networks, because nonorthogonal access between multiple secondary-user links by using shared subchannel assignment (SSA) can bring a higher weighted sum rate. We utilize the Lagrangian dual composition tool and design low-complexity near-optimal SSA resource allocation methods, assuming practical discrete-rate modulation and that the CRN-to-PRN interference constraint has to strictly be satisfied. However, available SSA methods for CRNs are either suboptimal or involve high complexity and suffer from slow convergence. To address this problem, we design fast-convergence SSA duality schemes and introduce several novel methods to increase the speed of convergence and to satisfy various system constraints with low complexity. For practical implementation in ad hoc CRNs, we design distributed-duality schemes that involve only a small number of CRN local information exchanges for dual update. The effects of many system parameters are presented through simulation results, which show that the near-optimal SSA duality scheme can perform significantly better than the suboptimal ESA duality and SSA-iterative waterfilling schemes and that the performance loss of the distributed schemes is small, compared with their centralized counterparts. © 2012 IEEE.

  4. MobileMAN: Mobile Metropolitan Ad hoc Networks

    OpenAIRE

    Conti, Marco

    2003-01-01

    The project aims to define and develop a metropolitan area, self-organizing and totally wireless network that we call Mobile Metropolitan Ad-hoc Network (MobileMAN). In a MobileMAN the users device are the network, no infrastructure is strictly required. A MobileMAN is finalized at providing, at a low cost and where and when is needed, the communication and interaction platform for people inside a man. It will support a kind of citizens network by which people could avoid the operators infras...

  5. Ad Hoc Selection of Voice over Internet Streams

    Science.gov (United States)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  6. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  7. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  8. Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)

    Institute of Scientific and Technical Information of China (English)

    JI Xiao-jun; TIAN Chang; ZHANG Yu-sen

    2006-01-01

    Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.

  9. Complex Threshold Key Management for Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhong-wei; LI Zhi-tang

    2005-01-01

    A complex threshold key management framework has been proposed, which can address the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation of the controller and participation nodes, this scheme should be efficient in the operation environmental alteration and tolerant faults of node, which take the advantages of the benefits of both key management approaches and alleviate their limitations. For the cooperation of the controller and participation nodes, a (t,n) threshold Elliptic curve sign-encryption scheme with the specified receiver also has been proposed. Using this threshold signencryption scheme, the key management distributes the trust between a controller and a set of participation nodes.

  10. Gestión de confianza en redes ad hoc

    OpenAIRE

    Herrera Joancomartí, Jordi; Rifà Pous, Helena

    2006-01-01

    El despliegue de un esquema de confianza es fundamental para poder desarrollar servicios de seguridad que permitan administrar y operar una red. Sin embargo, las soluciones empleadas en las redes tradicionales no se adaptan a un entorno ad hoc debido a la naturaleza dinámica y sin infraestructura de estas redes. En el presente trabajo se propone un esquema de confianza práctico y eficiente basado en una infraestructura de clave pública distribuida, umbral y jerárquica, que no requiere sincron...

  11. A Timed Calculus for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mengying Wang

    2012-12-01

    Full Text Available We develop a timed calculus for Mobile Ad Hoc Networks embodying the peculiarities of local broadcast, node mobility and communication interference. We present a Reduction Semantics and a Labelled Transition Semantics and prove the equivalence between them. We then apply our calculus to model and study some MAC-layer protocols with special emphasis on node mobility and communication interference. A main purpose of the semantics is to describe the various forms of interference while nodes change their locations in the network. Such interference only occurs when a node is simultaneously reached by more than one ongoing transmission over the same channel.

  12. Analysis of Multipath Routing in Random Ad Hoc Networks Scenario

    Directory of Open Access Journals (Sweden)

    Indrani Das

    2014-10-01

    Full Text Available In this study, we have proposed a multipath routing protocol for Mobile Ad Hoc Networks. Multipath routing overcomes various problems that occur in data delivery through a single path. The proposed protocol selects multiple neighbor nodes of source node to establish multiple paths towards destination. These nodes are selected based on their minimum remaining distance from destination. We have computed the length of various paths and average hops count for different node density in the network. We have considered only three paths for our evaluation. The results show that path-2 gives better results in term of hop count and path length among three paths.

  13. ON THE CAPACITY REGION OF WIRELESS AD HOC RELAY NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Dai Qinyun; Yao Wangsheng; Peng Jianmin; Su Gang

    2006-01-01

    Network capacity is a key characteristic to evaluate the performance of wireless networks. The goal of this paper is to study the capacity of wireless ad hoc relay network. In the model, there is at most ns source nodes transmitting signal simultaneously in the network and the arbitrarily complex network coding is allowed. The upper capacity bound of the network model are derived from the max-flow min-cut theorem and the lower capacity bound are obtained by the rate-distortion function for the Gaussian source. Finally, simulation results show that the upper network capacity will decrease as the number of source nodes is increased.

  14. Wireless sensor and ad hoc networks under diversified network scenarios

    CERN Document Server

    Sarkar, Subir Kumar

    2012-01-01

    Due to significant advantages, including convenience, efficiency and cost-effectiveness, the implementation and use of wireless ad hoc and sensor networks have gained steep growth in recent years. This timely book presents the current state-of-the-art in these popular technologies, providing you with expert guidance for your projects in the field. You find broad-ranging coverage of important concepts and methods, definitions of key terminology, and a look at the direction of future research. Supported with nearly 150 illustrations, the book discusses a variety of critical topics, from topology

  15. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Puja Kumari Sharma

    2012-07-01

    Full Text Available MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing protocol is not suitable for large network because packet size gets increased according to the number of nodes travelled by route discovery packet. In this paper, extended DSR routing protocol is proposed to eliminate the above limitation of existing DSR. Proposed protocol will be suitable for small and large both types of networks.

  16. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e;

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...... networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...

  17. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model...... of the non-linear behaviour of throughput. The intermediate models obtained in this modelling effort are used to adapt the parameters as the network conditions change, in order to maximize throughput. The improvements in throughput range from 10-26 times the use of the default parameter settings...

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. Escape probability based routing for ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Zhang Xuanping; Qin Zheng; Li Xin

    2006-01-01

    Routes in an ad hoc network may fail frequently because of node mobility. Stability therefore can be an important element in the design of routing protocols. The node escape probability is introduced to estimate the lifetime and stability of link between neighboring nodes and the escape probability based routing (EPBR) scheme to discover stable routes is proposed. Simulation results show that the EPBR can discover stable routes to reduce the number of route rediscovery, and is applicable for the situation that has highly dynamic network topology with broad area of communication.

  20. The distributed parallel genetic algorithm on the ad hoc network

    Directory of Open Access Journals (Sweden)

    Nima Afifi

    2015-02-01

    Full Text Available Today, mobile computing is one of the important issues in computer and network sciences. Using the processing power of mobile devices purposefully for solving complex issues is one of the research fields for researchers. One of the important issues in the optimization which needs a high processing power for finding the best possible answer is travelling salesman problem. In this paper, by providing a method based on the distributed parallel genetic algorithm on a number of mobile nodes in the Ad Hoc network, it was attempted to increase the speed of finding the best answer for the travelling salesman algorithm.

  1. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  2. VMQL: A Visual Language for Ad-Hoc Model Querying

    DEFF Research Database (Denmark)

    Störrle, Harald

    2011-01-01

    In large scale model based development, analysis level models are more like knowledge bases than engineering artifacts. Their effectiveness depends, to a large degree, on the ability of domain experts to retrieve information from them ad hoc. For large scale models, however, existing query...... facilities are inadequate. The Visual Model Query Language (VMQL) is a novel approach that uses the respective modeling language of the source model as the query language, too. The semantics of VMQL is defined formally based on graphs, so that query execution can be defined as graph matching. VMQL has been...... applied to several visual modeling languages, implemented, and validated in small case studies, and several controlled experiments....

  3. Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM

    Directory of Open Access Journals (Sweden)

    Pariza Kamboj

    2010-10-01

    Full Text Available Many crucial applications of MANETs like the battlefield, conference and disaster recovery defines the needs for group communications either one-to-many or many-to-many form. Multicast plays an important role in bandwidth scarce multihop mobile ad hoc networks comprise of limited battery power mobile nodes. Multicast protocols in MANETs generate many controls overhead for maintenance of multicast routingstructures due to frequent changes of network topology. Bigger multicast tables for the maintenance of network structures resultsin inefficient consumption of bandwidth of wireless links andbattery power of anemic mobile nodes, which in turn, pose thescalability problems as the network size is scaled up. However,many MANET applications demands scalability from time to time. Multicasting for MANETs, therefore, needs to reduce the state maintenance. As a remedy to these shortcomings, this paper roposes an overlay multicast protocol on application layer. In the proposed protocol titled “Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM” the network nodes construct overlay hierarchical framework to reduce the protocols states and constrain their distribution within limited scope. Based on zone around each node, it constructs a virtual structure at application layer mapped with the physical topology at network layer, thus formed two levels of hierarchy. The concept of two level hierarchies reduces the protocol state maintenance and hence supports the vertical scalability. Protocol depends on the location information obtained using a distributed location service, which effectively reduces the overhead for route searching and updating the source based multicast tree.

  4. Simulation study for Mobile Ad hoc Networks Using DMAC Protocol

    Directory of Open Access Journals (Sweden)

    Vikas Sejwar

    2012-01-01

    Full Text Available This paper addresses the issue of deafness problem in Mobile Ad Hoc Networks (MANETs using directional antennas. Directional antennas arebeneficial for wireless ad hoc networks consisting of a collection of wireless hosts. A suitable Medium Access Control (MAC protocol must be designed to best utilize directional antennas. Deafness is caused whentwo nodes are in ongoing transmission and a third node (Deaf Node wants to communicate with one of that node. But it get no response because transmission of two nodes are in process. Though directional antennas offer better spatial reuse, but this problem can have a serious impact on network performance. A New DMAC (Directional Medium Access Control protocol uses flags in DNAV (Directional Network Allocation Vector tables to maintain information regarding the transmissionbetween the nodes in the network and their neighbor’s location. Two performance matrices have been used to show the impact of New DMAC algorithm on Deafness problem using simulator. These are RTS Failure Ratio and RTS Retransmission due to timeout

  5. Distributed intrusion detection for mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

    2008-01-01

    Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.

  6. PERFORMANCE COMPARISON OF MOBILE AD HOC NETWORK ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mandeep Kaur Gulati

    2014-03-01

    Full Text Available Mobile Ad-hoc Network (MANET is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find optimized routes from source to the destination and prominent among them are Dynamic Source Routing (DSR, Ad-hoc On Demand Distance Vector (AODV, and Destination-Sequenced Distance Vector (DSDV routing protocols. The performance comparison of these protocols should be considered as the primary step towards the invention of a new routing protocol. This paper presents a performance comparison of proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery ratio, average end-to-end delay, throughput, jitter, normalized routing overhead and normalized MAC overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility speed, number of nodes and data rate. The comparison results show that AODV performs optimally well not the best among all the studied protocols.

  7. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  8. Evaluating And Comparison Of Intrusion In Mobile AD HOC Networks

    Directory of Open Access Journals (Sweden)

    Zougagh Hicham

    2012-04-01

    Full Text Available In recent years, the use of mobile ad hoc network (MANETs has been widespread in many applications.Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this article we classify the architecture for IDS that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANETs presented and compared. We then provide some directions for future researches.

  9. Vehicular Ad Hoc and Sensor Networks; Principles and Challenges

    CERN Document Server

    Piran, Mohammad Jalil; Babu, G Praveen

    2011-01-01

    The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Consequently, year by year, we see the ascending rate of car accidents and casualties in most of the countries. Therefore, exploiting the new technologies, e.g. wireless sensor networks, is required as a solution of reduction of these saddening and reprehensible statistics. This has motivated us to propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. We coin the vehicular network employing wireless Sensor networks as Vehicular Ad Hoc and Sensor Network, or VASNET in short. The proposed VASNET is particularly for highway traffic .VASNET is a self-organizing Ad Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of sensor nodes, some are embedded on the vehicles-vehicular nodes- and others are deployed in predetermined distances besides the highway road, known as Road Side Sensor nodes (RSS...

  10. Identification of node behavior for Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Khyati Choure , Sanjay Sharma

    2012-12-01

    Full Text Available In present scenario, in ad-hoc network, the behavior of nodes are not very stable. They do not work properly and satisfactory. They are not cooperative and acting selfishly. They show their selfishness to share their resources like bandwidth to save life of battery, they are not hasitate to block thepackets sent by others for forwarding and transmit their own packets. Due to higher Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols especially for these conditions have been developed during the last few years, to find optimized routes from a source to some destination.But it is still difficult to know the actual shortest path without attackers or bad nodes. Ad-hoc network suffer from the lot of issues i.e. congestion, Throughput, delay, security, network overhead. Packet delivery ratio is the issues of ongoing research. Cause of node failure may be either natural failure of node links or it may be due to act of an attacker or bad node which may degrade performance of network slowly or drastically, which also need to identify or determined. In this paper, we identify the good and bad nodes. A simulation has been performed to achieve better performance of modified AODV. Good result has been obtained in terms of Throughout, Packet Delivery Ratio.

  11. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  12. Distributed Intrusion Detection System for Ad hoc Mobile Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Nawaz Khan

    2012-01-01

    Full Text Available In mobile ad hoc network resource restrictions on bandwidth, processing capabilities, battery life and memory of mobile devices lead tradeoff between security and resources consumption. Due to some unique properties of MANETs, proactive security mechanism like authentication, confidentiality, access control and non-repudiation are hard to put into practice. While some additional security requirements are also needed, like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism i.e. authentication and encryption, provide a security beach to MANETs. But some reactive security mechanism is required who analyze the routing packets and also check the overall network behavior of MANETs. Here we propose a local-distributed intrusion detection system for ad hoc mobile networks. In the proposed distributed-ID, each mobile node works as a smart agent. Data collect by node locally and it analyze that data for malicious activity. If any abnormal activity discover, it informs the surrounding nodes as well as the base station. It works like a Client-Server model, each node works in collaboration with server, updating its database each time by server using Markov process. The proposed local distributed- IDS shows a balance between false positive and false negative rate. Re-active security mechanism is very useful in finding abnormal activities although proactive security mechanism present there. Distributed local-IDS useful for deep level inspection and is suited with the varying nature of the MANETs.

  13. Defending Wormhole Attack in Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nisha S.Raote

    2011-09-01

    Full Text Available The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.

  14. SPM: Source Privacy for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jian Ren

    2010-01-01

    Full Text Available Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS. This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed.

  15. Securing Zone Routing Protocol in Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-09-01

    Full Text Available This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications. Limitations of the mobile nodes have been studied in order to design a secure routing protocol that thwarts different kinds of attacks. Our approach is based on the Zone Routing Protocol (ZRP; the most popular hybrid routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP based on efficient key management, secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol.To validate the proposed solution, we use the network simulator NS-2 to test the performance of secure protocol and compare it with the conventional zone routing protocol over different number of factors that affect the network. Our results evidently show that our secure version paragons the conventional protocol in the packet delivery ratio while it has a tolerable increase in the routing overhead and average delay. Also, security analysis proves in details that the proposed protocol is robust enough to thwart all classes of ad-hoc attacks.

  16. SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eduardo da Silva

    2016-01-01

    Full Text Available As a consequence of the particularities of Mobile Ad Hoc Networks (MANETs, such as dynamic topology and self-organization, the implementation of complex and flexible applications is a challenge. To enable the deployment of these applications, several middleware solutions were proposed. However, these solutions do not completely consider the security requirements of these networks. Based on the limitations of the existing solutions, this paper presents a new secure middleware, called Secure Middleware for Ad Hoc Networks (SEMAN, which provides a set of basic and secure services to MANETs aiming to facilitate the development of distributed, complex, and flexible applications. SEMAN considers the context of applications and organizes nodes into groups, also based on these contexts. The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. It has the following components: key management, trust management, and group management. All these components were developed and are described in this paper. They are supported by a cryptographic core and behave according to security rules and policies. The integration of these components provides security guarantees against attacks to the applications that usethe middleware services.

  17. Reliable Multicast Error Recovery Algorithm in Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Tariq Abdullah

    2012-11-01

    Full Text Available Mobile ad hoc network is an autonomous system of mobile nodes characterized by wireless links. The major challenge in ad hoc networks lies in adapting multicast communication to several environments, where mobility is unlimited and failures are frequent. Reliable multicast delivery requires a multicast message to be received by all mobile nodes in the communication group. The recovery mechanism requires feedback messages from each one of the receivers. In the tree-based recovery protocols, a group of nodes into recovery regions designate a forwarding node per region for retransmitting lost messages. In this study, local error recovery algorithm is applied within these relatively smaller regions, where the repaired packets are retransmitted only to the requested receivers in the local group. These receivers create a sub group from the local group which itself is a subgroup of the global multicast group. By applying local error recovery algorithm, the number of duplicated packets, due to packets retransmission, decreases which lead to improving the system performance. Simulation results demonstrate the scalability of the proposed algorithm in comparison to Source Tree Reliable Multicast (STRM protocol. The algorithm achieved up to 2.33% improvement on the percentage of duplicated packets in stable mobility speed without incurring any further communication or intense computation overhead.

  18. The Adaptive Optimized Routing Protocol for Vehicular Ad-hoc Networks

    OpenAIRE

    Kunal Vikas Patil; M.R. Dhage

    2013-01-01

    The vehicular ad hoc network (VANET) is a superior newtechnology. Vehicular ad hoc network (VANET) is a subclassof MANET that is mobile ad hoc networks. Vehicular ad hocnetwork provides wireless communication among vehicles andvehicles to roadside equipments. The communication betweenvehicles is more important for safety and more probably forentertainment as well. The performance of communicationdepends on how better the routing takes place in the network.Routing of data depends on routing pr...

  19. 浅析Ad Hoc网络%A Superficial Analysis of Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    王建宽

    2011-01-01

    Ad Hoc network is a new-type, multi-hop, self-organizing wireless networks, compensating the limited transmission distance of wireless devices by multi-hop technology. Network nodes can be dynamically , ~eely and frequendy joining or quitting the network, so it can broaden the network coverage, and provide users with various services. This article introduces the concept, characteristics, applications and architecture of Ad Hoc networks, and the key technology that the Ad Hoc network requires.%Ad Hoc网络是一种新型、多跳、自组织的无线网络,借助于多跳转发技术弥补无线设备传输距离的有限性。网络节点能够动态地、随意地、频繁地进入和离开网络,从而拓宽了网络的覆盖范围,为用户提供各种服务。文中介绍了Ad Hoc网络的概念、特点、应用领域和体系结构,并指出了Ad Hoc网络需要的关键技术。

  20. Advances in Ad Hoc Network Technology%Ad Hoc网络技术研究进展

    Institute of Scientific and Technical Information of China (English)

    赵耀培; 张福强; 董茜

    2005-01-01

    Ad Hoc 网络现在是非常有吸引力的研究方向.本文介绍了Ad Hoc 网络的定义、特点、体系结构、信道接入协议,最后分析了Ad Hoc 网络面临的问题.希望本文能为进行Ad Hoc 网络技术研究的人们提供一定的方便.

  1. Making friends on the fly advances in ad hoc teamwork

    CERN Document Server

    Barrett, Samuel

    2015-01-01

    This book is devoted to the encounter and interaction of agents such as robots with other agents and describes how they cooperate with their previously unknown teammates, forming an Ad Hoc team. It presents a new algorithm, PLASTIC, that allows agents to quickly adapt to new teammates by reusing knowledge learned from previous teammates.  PLASTIC is instantiated in both a model-based approach, PLASTIC-Model, and a policy-based approach, PLASTIC-Policy.  In addition to reusing knowledge learned from previous teammates, PLASTIC also allows users to provide expert-knowledge and can use transfer learning (such as the new TwoStageTransfer algorithm) to quickly create models of new teammates when it has some information about its new teammates. The effectiveness of the algorithm is demonstrated on three domains, ranging from multi-armed bandits to simulated robot soccer games.

  2. Integrating Mobile Ad Hoc Network to the Internet

    Institute of Scientific and Technical Information of China (English)

    WANG Mao-ning

    2005-01-01

    A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the Internet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the Internet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%.

  3. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.N.Renjith

    2012-12-01

    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  4. Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks

    CERN Document Server

    Hewer, Thomas D

    2008-01-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and location-aware services. The ability to disseminate information in an ad-hoc fashion allows pertinent information to propagate faster through the network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to the receivers of this information. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols for influencing traffic flow, reducing congestion in road networks. The computational experiments presented in this paper show how an intelligent driver model (IDM) and car-following model can be adapted to 'react' to the reception of information. This model also presents the advantages of coupling together traffic modelling tools and network simulation tools.

  5. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    , thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...... issues in MANETs e.g. mobility and unreliable connections. Specially speaking, 1. We first propose a discrete probabilistic process calculus with which we can model in an MANET that the wireless connection is not reliable, and the network topology may undergo changes. We equip each wireless connection......Due to the wide use of communicating mobile devices, mobile ad hoc networks (MANETs) have gained in popularity in recent years. In order that the devices communicate properly, many protocols have been proposed working at different levels. Devices in an MANET are not stationary but may keep moving...

  6. A Distributed Mutual Exclusion Algorithm for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Orhan Dagdeviren

    2012-04-01

    Full Text Available We propose a distributed mutual exclusion algorithm for mobile ad hoc networks. This algorithm requires a ring of cluster coordinators as the underlying topology. The topology is built by first providing clusters of mobile nodes in the first step and then forming a backbone consisting of the cluster heads in a ring as the second step. The modified version of the Ricart-Agrawala Algorithm on top of this topologyprovides analytically and experimentally an order of decrease in message complexity with respect to the original algorithm. We analyze the algorithm, provide performance results of the implementation, discuss the fault tolerance and the other algorithmic extensions, and show that this architecture can be used for other middleware functions in mobile networks.

  7. A Survey: variants of TCP in Ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Komal Zaman

    2013-11-01

    Full Text Available MANET (Mobile Ad-hoc network forms a temporary network of wireless mobile nodes without any infrastructure where all nodes are allowed to move freely, configure themselves and interconnect with its neighbors to perform peer to peer communication and transmission. TCP (Transmission Control Protocol offers reliable, oriented connection and mechanism of end to end delivery. This article provides the review and comparison of existing variants of TCP for instance: The TCP Tahoe, The TCP Reno, The TCP New Reno, The Lite, The Sack, The TCP Vegas, Westwood and The TCP Fack. TCP’s performance depends on the type of its variants due to missing of congestion control or improper activation procedures such as Slow Start, Fast Retransmission, and Congestion Avoidance, Retransmission, Fast Recovery, Selective Acknowledgement mechanism and Congestion Control. This analysis is essential to be aware about a better TCP implementation for a specific scenario and then nominated a suitable one.

  8. M-BOARD IN AN AD-HOC NETWORK ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Sharon Panth

    2013-04-01

    Full Text Available Notice Board is very essential part of any organization. This paper presents the design and implementation of M-Board (Mobile Notice Board for Ad-hoc Network Environment that can be established and made available for an educational or industry environment. The cost-free communication among the mobile phone clients and server takes place with the help of Bluetooth wireless technology. M-Board is particularly developed as an informative application environment to provide the basic information like daily events or timetable to the users. The design is based on the amalgamation of Java ME with other technologies like Java SE, Java EE, PHP and MySQL. The system is designed to provide simple, easy-to-use, cost-free solution in a ubiquitous environment. The system design is easily implemented and extensible allowing the number of clients in Personal Area Network (PAN for information exchange with the hotspot-server.

  9. Precise positioning systems for Vehicular Ad-Hoc Networks

    CERN Document Server

    Mohamed, Samir A Elsagheer; Ansari, Gufran Ahmad

    2012-01-01

    Vehicular Ad Hoc Networks (VANET) is a very promising research venue that can offers many useful and critical applications including the safety applications. Most of these applications require that each vehicle knows precisely its current position in real time. GPS is the most common positioning technique for VANET. However, it is not accurate. Moreover, the GPS signals cannot be received in the tunnels, undergrounds, or near tall buildings. Thus, no positioning service can be obtained in these locations. Even if the Deferential GPS (DGPS) can provide high accuracy, but still no GPS converge in these locations. In this paper, we provide positioning techniques for VANET that can provide accurate positioning service in the areas where GPS signals are hindered by the obstacles. Experimental results show significant improvement in the accuracy. This allows when combined with DGPS the continuity of a precise positioning service that can be used by most of the VANET applications.

  10. Mobile Advertisement in Vehicular Ad-Hoc Networks

    CERN Document Server

    Dobre, Ciprian

    2012-01-01

    Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of WiFi access points that dynamically disseminate data to clients running on the car's smart device. The approach can be considered an alternative to the static advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on specific topics. We present design solutions that use access points as emitters for transmitting messages to wireless-enabled devices equipped on vehicles. We also present implementation details for the evaluation of the proposed solution using a simulator designed for VANET application. The results show that the application can be used for transferring a significant amount of data even under difficult conditions, such as when cars are moving at increased speeds, or the congested Wi-Fi network causes significant packet loss...

  11. On service differentiation in mobile Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清

    2004-01-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  12. Parallel routing in Mobile Ad-Hoc Networks

    CERN Document Server

    Day, Khaled; Arafeh, Bassel; Alzeidi, Nasser; 10.5121/ijcnc.2011.3506

    2011-01-01

    This paper proposes and evaluates a new position-based Parallel Routing Protocol (PRP) for simultaneously routing multiple data packets over disjoint paths in a mobile ad-hoc network (MANET) for higher reliability and reduced communication delays. PRP views the geographical region where the MANET is located as a virtual 2-dimensional grid of cells. Cell-disjoint (parallel) paths between grid cells are constructed and used for building pre-computed routing tables. A single gateway node in each grid cell handles routing through that grid cell reducing routing overheads. Each node maintains updated information about its own location in the virtual grid using GPS. Nodes also keep track of the location of other nodes using a new proposed cell-based broadcasting algorithm. Nodes exchange energy level information with neighbors allowing energy-aware selection of the gateway nodes. Performance evaluation results have been derived showing the attractiveness of the proposed parallel routing protocol from different resp...

  13. On service differentiation in mobile Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清

    2004-01-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the Received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile.Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  14. Optimizing Local Capacity of Wireless Ad Hoc Networks

    CERN Document Server

    Malik, Salman

    2011-01-01

    In this work, we evaluate local capacity of wireless ad hoc networks with several medium access protocols and identify the most optimal protocol. We define local capacity as the average information rate received by a receiver randomly located in the network. We analyzed grid pattern protocols where simultaneous transmitters are positioned in a regular grid pattern, pure ALOHA protocols where simultaneous transmitters are dispatched according to a uniform Poisson distribution and exclusion protocols where simultaneous transmitters are dispatched according to an exclusion rule such as node coloring and carrier sense protocols. Our analysis allows us to conjecture that local capacity is optimal when simultaneous transmitters are positioned in a grid pattern based on equilateral triangles and our results show that this optimal local capacity is at most double the local capacity of simple ALOHA protocol. Our results also show that node coloring and carrier sense protocols approach the optimal local capacity by an ...

  15. On service differentiation in mobile Ad Hoc networks.

    Science.gov (United States)

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks. PMID:15323003

  16. An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on co-operative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. In this paper, we present a cooperative, distributed intrusion detection architecture based on clustering of the nodes that addresses the security vulnerabilities of the network and facilitates accurate detection of attacks. The architecture is organized as a dynamic hierarchy in which the intrusion data is acquired by the nodes and is incrementally aggregated, reduced in volume and analyzed as it flows upwards to the cluster-head. The cluster-heads of adja...

  17. Registration and Aggregate Cache Routing for Ad hoc Network

    Directory of Open Access Journals (Sweden)

    Abdul Samad

    2010-11-01

    Full Text Available A Mobile Ad-hoc Network (MANET is a temporary, infrastructure less wireless network composed of mobile nodes. Due to the limitations in the wireless environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. Since traditional routing protocols cannot be directly applied in the MANET, a lot of routing protocols have been proposed. Though there are many wireless routing protocols developed, there is not a single algorithm to accomplish efficient route in dynamic environment. This paper presents a new routing technique based on registration of newly arrived nodes and checking the local cache for forwarding the packet to the desired destination called Registration and Aggregate Cache (RAC routing algorithm. Theoretically RAC algorithm eliminates the drawback of Table Driven and On Demand routing algorithm.

  18. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  19. Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

    Science.gov (United States)

    Dong, Lei; Wang, Yongchao

    2015-03-01

    In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

  20. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  1. Secure Routing and Data Transmission in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Waleed S. Alnumay

    2014-01-01

    Full Text Available In this paper, we present an identity (ID based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.

  2. SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Ali Dorri

    2015-02-01

    Full Text Available MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.

  3. An Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JingZheng; JinshuSu; KanYang

    2004-01-01

    In mobile ad hoc networks (MANET), nodes move freely and the distribution of access requests changes dynamically. Replica allocation in such a dynamic environment is a significant challenge. In this paoer, a dynamic adaptive replica allocation algorithm that can adapt to the nodes motion is proposed to minimize the communication cost of object access. When changes occur in the access requests of the object or the network topology, each replica node collects access requests from its neighbors and makes decisions locally to expand replica to neighbors or to relinquish the replica. The algorithm dynamically adapts the replica allocation scheme to a local optimal one. Simulation results show that our algorithms efficiently reduce the communication cost of object access in MANET environment.

  4. Vehicular ad hoc networks standards, solutions, and research

    CERN Document Server

    Molinaro, Antonella; Scopigno, Riccardo

    2015-01-01

    This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and fi...

  5. A Smart Booster Approach In Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Anzar Ahmad

    2016-02-01

    Full Text Available Wireless Mobile Ad-hoc network is upcoming next generation technology. The foremost reason to be the popularity of MANET is its infrastructure less nature. MANET is a group of wireless mobile nodes which are connected wirelessly. Nodes may be highly mobile because the beauty of wireless network (like MANET or cellular system lies in mobility. But due to this mobility of nodes, the topology of the node and network changed frequently. This frequent change topology affect to the communication between nodes. If nodes are within the range of each other they can communicate properly but if nodes are not in the range of each other, communication will not be possible smoothly or even ongoing communication may be disrupt or lost. So there is a need to develop and design a mechanism or system that can handle such types of situation and prevent communication failure or frequent link failure. In the present work a novel booster mechanism approach is proposed to overcome such situation or Link failure. In the proposed Approach, the level of the Power at both the Transmitter as well as Receiver is measured in order to maintain communication smooth between the nodes. If one node is moving away from the communicating node then both moving node will measure its receiving power with respect to the distance and if its current power level reaches the threshold level it switched “ON” its Booster and at the same time it send a message to source node which contains received power level of moving node due to this ,that source node also “ON” its Booster and thus both nodes connect together to protect the link failure during that mobility. The Booster Approach is a novel concept in the direction of smooth communication in dynamic or wireless environment in Mobile Ad hoc Network.

  6. Vehicular Ad Hoc and Sensor Networks: Principles and Challenges

    Directory of Open Access Journals (Sweden)

    Mohammad Jalil Piran

    2011-06-01

    Full Text Available The rapid increase of vehicular traffic and congest ion on the highways began hampering the safe and efficient movement of traffic. Consequently, year b y year, we see the ascending rate of car accidents and casualties in most of the countries. Therefore, exp loiting the new technologies, e.g. wireless sensor networks, is required as a solution of reduction of these sad dening and reprehensible statistics. This has motiv ated us to propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. W e coin the vehicular network employing wireless Senso r networks as Vehicular Ad Hoc and Sensor Network, or VASNET in short. The proposed VASNET is particularl y for highway traffic .VASNET is a self-organizing Ad Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of sensor nodes, some are embedded on the vehicles-veh icular nodes- and others are deployed in predetermi ned distances besides the highway road, known as Road S ide Sensor nodes (RSS. The vehicular nodes are use d to sense the velocity of the vehicle for instance. We can have some Base Stations (BS such as Police Tra ffic Station, Firefighting Group and Rescue Team. The ba se stations may be stationary or mobile. VASNET provides capability of wireless communication betwe en vehicular nodes and stationary nodes, to increas e safety and comfort for vehicles on the highway road s. In this paper we explain main fundamentals and challenges of VASNET

  7. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  8. Ad Hoc Network Security Technology%Ad hoc网络安全技术简介

    Institute of Scientific and Technical Information of China (English)

    李俊; 李鑫; 黄红伟

    2011-01-01

    Ad hoc network is a kind of mobile network without fixed infrastructure;all nodes are composed of mobile host.As the mobility of the node leads to network topology changing quickly and node communication is based on wireless links,Ad hoc network is facing greater challenges more than cane network about security.In this paper,according to Ad hoe network security issues,we analysis common attacks in the Ad hoe network,focused on secure routing,key management and other key issues.%Ad hoc网络是一种没有有线基础设施支持的移动网络,网络中的节点均由移动主机构成。由于节点的移动性导致网络拓扑结构不断变化,节点通信完全依靠无线链路,相对于有线网络在安全性上面临更大的挑战。本文根据Ad hoc网络面临的安全问题,分析了Ad hoc网络中常见的攻击方式,并集中讨论了Ad hoc网络的安全路由、密钥管理等关键问题。

  9. A new authentication protocol for revocable anonymity in ad-hoc networks

    OpenAIRE

    Wierzbicki, Adam; Zwierko, Aneta; Kotulski, Zbigniew

    2005-01-01

    This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds th...

  10. A Survey of Multicast Routing Protocols for Vehicular Ad Hoc Networks

    OpenAIRE

    Waqar Farooq; Khan, Muazzam A.; Saad Rehman; Nazar Abbas Saqib

    2015-01-01

    Vehicular Ad Hoc Networks (VANETs) are autonomous and self-configurable wireless ad hoc networks and considered as a subset of Mobile Ad Hoc Networks (MANETs). MANET is composed of self-organizing mobile nodes which communicate through a wireless link without any network infrastructure. A VANET uses vehicles as mobile nodes for creating a network within a range of 100 to 1000 meters. VANET is developed for improving road safety and for providing the latest services of intelligent transport sy...

  11. Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Di Wu; Zhisheng Liu; Yongxin Feng; Guangxing Wang

    2004-01-01

    There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad-Hoc networks has been shown. A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.

  12. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis

    Institute of Scientific and Technical Information of China (English)

    Vasileios Karyotis; Anastasios Kakalis; Symeon Papavassiliou

    2008-01-01

    In this paper, the spreading of malicious software over ad hoe networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes. Because of its nature, the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments. Using the Norton equivalent of the closed queuing network, we obtain analytical results for its steady state behavior, which in turn is used for identifying the critical parameters affecting the operation of the network. Finally, through modeling and simulation, some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present, and regarding the time-dependent evolution and impact of an attack.

  13. Key Establishment Protocols in Ad-Hoc Networks%Ad-Hoc网络中的密钥建立协议

    Institute of Scientific and Technical Information of China (English)

    郎文华; 周明天

    2002-01-01

    In Ad-hoc networks, key establishment protocol is mainly contributory ,Diffie-Hellman based key agree ment protocol. In this paper, Several typical protocols are analysed and evaluated, and then, their suitability is discussed from the point of view of Ad-Hoc networks.

  14. Node Disjoint-Virtual Circuit Approach in Ad Hoc On-Demand Multipath Distance Vector Routing to offer Quality of Service in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B.SREEDEVI,

    2011-04-01

    Full Text Available Multi-path routing represents a promising routing method for wireless mobile ad hoc networks. Multipath routing achieves load balancing and is more resilient to route failures. Numerous multipath routing protocols have been proposed for wireless ad hoc networks and the most important among them is Ad hoc On-demand Multipath Distance Vector (AOMDV. By virtual circuit approach, using the property of node disjointness, its performance is evaluated. The simulation in Network Simulator (ns2 shows that it is good in its throughput with packet delivery ratio with less delay. The results conclude that AOMDV performs well than Ad hoc On-demand Distance Vector (AODV in all above said aspects.

  15. 可信链在Ad Hoc网络的传递%Transitive trusted chain in Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    刘静; 王赜

    2012-01-01

    To further enhance the security of Ad Hoc networks, it presents a novel transitive trusted chain with Trusted Platform Module (TPM) in Ad Hoc networks. A scheme which extends the trusted relationships from the node of Ad Hoc networks to Ad Hoc networks as its design objective is proposed, and the trusted relationships between peers can be evaluated with a trusted model in Ad Hoc networks. Authenticated Routing for Ad hoc Networks (ARAN) is improved by introduction of trusted level and then it selects the routing of highest trusted level. The trusted transfer model in Ad Hoc networks is analyzed.%为了进一步提高Ad Hoc网络的安全性,提出一种利用可信平台模块传递信任链的方案.该方案以将信任关系从Ad Hoc网络节点扩展至Ad Hoc网络为设计目标,利用信任模型评估每个节点的信任度,在ARAN安全路由协议的基础上,结合信任度对ARAN安全路由协议进行了改进,选出一条可信度最高的路由,对可信链传递方案进行性能分析.

  16. TCP Issues in Mobile Ad Hoc Networks: Challenges and Solutions

    Institute of Scientific and Technical Information of China (English)

    Wei-Qiang Xu; Tie-Jun Wu

    2006-01-01

    Mobile ad hoc networks (MANETs) are a kind of very complex distributed communication systems with wireless mobile nodes that can be freely and dynamically self-organized into arbitrary and temporary network topologies. MANETs inherit several limitations of wireless networks, meanwhile make new challenges arising from the specificity of MANETs, such as route failures, hidden terminals and exposed terminals. When TCP is applied in a MANET environment, a number of tough problems have to be dealt with. In this paper, a comprehensive survey on this dynamic field is given. Specifically, for the first time all factors impairing TCP performance are identified based on network protocol hierarchy, I.e., lossy wireless channel at the physical layer; excessive contention and unfair access at the MAC layer; frail routing protocol at the network layer, the MAC layer and the network layer related mobile node; unfit congestion window size at the transport layer and the transport layer related asymmetric path. How these factors degrade TCP performance is clearly explained. Then, based on how to alleviate the impact of each of these factors listed above, the existing solutions are collected as comprehensively as possible and classified into a number of categories, and their advantages and limitations are discussed. Based on the limitations of these solutions, a set of open problems for designing more robust solutions is suggested.

  17. Channel Adaptive Shortest Path Routing for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    TIAN Hui; XIE Fang; HU Jian-dong; ZHANG Ping

    2003-01-01

    Routing in Mobile Ad Hoc Network (MANET) is a challenge owing to the dynamic nature of network topology and the resource constraints. To maximize the channel resource utilization and minimize the network transfer delay along the path, the shortest path with the minimum hops approach is often adopted. However, the quality of wireless channels among the mobile nodes is time varying owing to fading, shadowing and path loss. Considering adaptive channel coding and modulation scheme, the channel state can be characterized by different link throughputs. If routing selection based on the link throughput is implemented, the minimum transfer delay from source to destination and the maximal throughput may be obtained. In this paper, a Channel Adaptive Shortest Path Routing (CASPR) is presented. Based on the adaptive channel coding and modulation, the CASPR transforms the link throughput into the channel quality factor Q and finds the shortest routing according to the Q measure. Simulation results show that the average path length in the proposed routing scheme may be slightly higher than that of the conventional shortest path with the minimum hops approach, but it can reduce the average transfer delay and increase the packet deliver rate.

  18. Securing Mobile Ad hoc Networks:Key Management and Routing

    CERN Document Server

    Chauhan, Kamal Kumar; 10.5121/ijans.2012.2207

    2012-01-01

    Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network's topology causes weak trust relationship among the nodes in the network. In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs ...

  19. Cluster Based Topology Control in Dynamic Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    T. Parameswaran

    2014-05-01

    Full Text Available In Mobile Ad hoc NETworks (MANETs, mobility of nodes, resource constraints and selfish behavior of nodes are important factors which may degrade the performance. Clustering is an effective scheme to improve the performance of MANETs features such as scalability, reliability, and stability. Each cluster member (CM is associated with only one cluster head (CH and can communicate with the CH by single hop communication. Mobility information is used by many existing clustering schemes such as weighted clustering algorithm (WCA Link expiration time prediction scheme and k-hop compound metric based clustering. In scheme 1 the CH election is based on a weighted sum of four different parameters such as node status, neighbor’s distribution, mobility, and remaining energy which brings flexibility but weight factor for each parameter if difficult. In scheme 2 lifetime of a wireless link between a node pair is predicted by GPS location information. In scheme 3 the predicted mobility parameter is combined with the connectivity to create a new compound metric for CH election. Despite various efforts in mobility clustering, not much work has been done specifically for high mobility nodes. Our proposed solution provides secure CH election and incentives to encourage nodes to honestly participating in election process. Mobility strategies are used to handle the various problems caused by node movements such as association losses to current CHs and CH role changes, for extending the connection lifetime and provide more stable clusters. The conducted simulation results shows that the proposed approach outperforms the existing clustering schemes.

  20. Reliability analysis of cluster-based ad-hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Cook, Jason L. [Quality Engineering and System Assurance, Armament Research Development Engineering Center, Picatinny Arsenal, NJ (United States); Ramirez-Marquez, Jose Emmanuel [School of Systems and Enterprises, Stevens Institute of Technology, Castle Point on Hudson, Hoboken, NJ 07030 (United States)], E-mail: Jose.Ramirez-Marquez@stevens.edu

    2008-10-15

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks.

  1. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  2. Design of the next generation cognitive mobile ad hoc networks

    Science.gov (United States)

    Amjad, Ali; Wang, Huiqiang; Chen, Xiaoming

    Cognition capability has been seen by researchers as the way forward for the design of next generation of Mobile Ad Hoc Networks (MANETs). The reason why a cognitive paradigm would be more suited to a MANET is because MANETs are highly dynamic networks. The topology may change very frequently during the operation of a MANET. Traffic patterns in MANETs can vary from time to time depending on the need of the users. The size of a MANET and node density is also very dynamic and may change without any predictable pattern. In a MANET environment, most of these parameters may change very rapidly and keeping track of them manually would be very difficult. Previous studies have shown that the performance of a certain routing approach in MANETs is dependent on the size of the network and node density. The choice of whether to use a reactive or proactive routing approach comes down to the network size parameter. Static or offline approaches to fine tune a MANET to achieve certain performance goals is hence not very productive as a lot of these parameters keep changing during the course of operation of MANETs. Similarly, the performance of MANETs would improve greatly if the MAC layer entity could operate in a more flexible manner. In this paper we propose a cognitive MANET design that will ensure that all these dynamic parameters are automatically monitored and decisions are based on the current status of these parameters.

  3. ADAPTIVE SERVICE PROVISIONING FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Cynthia Jayapal

    2010-09-01

    Full Text Available Providing efficient and scalable service provisioning in Mobile Ad Hoc Network (MANET is a big research challenge. In adaptive service provisioning mechanism an adaptive election procedure is used to select a coordinator node. The role of a service coordinator is crucial in any distributed directory based service provisioning scheme. The existing coordinator election schemes use either the nodeID or a hash function to choose the coordinator. In these schemes, the leader changes are more frequent due to node mobility. We propose an adaptive scheme that makes use of an eligibility factor that is calculated based on the distance to the zone center, remaining battery power and average speed to elect a core node that change according to the network dynamics. We also retain the node with the second highest priority as a backup node. Our algorithm is compared with the existing solution by simulation and the result shows that the core node selected by us is more stable and hence reduces the number of handoffs. This in turn improves the service delivery performance by increasing the packet delivery ratio and decreasing the delay, the overhead and the forwarding cost.

  4. Load-aware Flooding for Streaming over Ad Hoc Networks

    Science.gov (United States)

    Utsu, Keisuke; Ishii, Hiroshi

    This paper discusses the streaming of high rate media such as video or audio information over ad hoc networks in disaster situations or for temporary events when it is difficult to use fixed infrastructure. The conventional simple flooding is not applicable for this application because it generates a large number of redundant rebroadcast and heavy traffic load to the network. To restrain redundant rebroadcast messages, several methods have been proposed. But since those studies do not take into account the actual load condition at each node that will affect network efficiency, they cannot achieve both ensuring the high message reachability and reducing redundant rebroadcast. In this paper, we propose two novel load-aware flooding methods using the MAC transmission queue information at each node to make the decision about whether rebroadcast messages should be sent or not. Through network simulations, we evaluate and show the effectiveness of our proposals. The result shows that our proposals achieve both ensuring high message reachability and restraint of redundant rebroadcast comparing with existing methods.

  5. Algorithmic aspects of topology control problems for ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Liu, R. (Rui); Lloyd, E. L. (Errol L.); Marathe, M. V. (Madhav V.); Ramanathan, R. (Ram); Ravi, S. S.

    2002-01-01

    Topology control problems are concerned with the assignment of power values to nodes of an ad hoc network so that the power assignment leads to a graph topology satisfying some specified properties. This paper considers such problems under several optimization objectives, including minimizing the maximum power and minimizing the total power. A general approach leading to a polynomial algorithm is presented for minimizing maximum power for a class of graph properties, called monotone properties. The difficulty of generalizing the approach to properties that are not monoione is pointed out. Problems involving the minimization of total power are known to be NP-complete even for simple graph properties. A general approach that leads to an approximation algorithm for minimizing the total power for some monotone properties is presented. Using this approach, a new approximation algorithm for the problem of minimizing the total power for obtaining a 2-node-connected graph is obtained. It is shown that this algorithm provides a constant performance guarantee. Experimental results from an implementation of the approximation algorithm are also presented.

  6. Scaling of critical connectivity of mobile ad hoc networks.

    Science.gov (United States)

    Wang, Li; Zhu, Chen-Ping; Gu, Zhi-Ming

    2008-12-01

    In this paper, critical global connectivity of mobile ad hoc networks (MANETs) is investigated. We model the two-dimensional plane on which nodes move randomly with a triangular lattice. Demanding the best communication of the network, we account the global connectivity eta as a function of occupancy sigma of sites in the lattice by mobile nodes. Critical phenomena of the connectivity for different transmission ranges r are revealed by numerical simulations, and these results fit well to the analysis based on the assumption of homogeneous mixing. Scaling behavior of the connectivity is found as eta approximately f(R;{beta}sigma) , where R=(r-r_{0})r_{0} , r_{0} is the length unit of the triangular lattice, and beta is the scaling index in the universal function f(x) . The model serves as a sort of geometric distance-dependent site percolation on dynamic complex networks. Moreover, near each critical sigma_{c}(r) corresponding to certain transmission range r , there exists a cutoff degree k_{c} below which the clustering coefficient of such self-organized networks keeps a constant while the averaged nearest-neighbor degree exhibits a unique linear variation with the degree k , which may be useful to the designation of real MANETs. PMID:19256905

  7. Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues

    Directory of Open Access Journals (Sweden)

    Muneer Bani Yassein

    2016-06-01

    Full Text Available Flying Ad-Hoc Networks (FANETs is a group of Unmanned Air Vehicles (UAVs which completed their work without human intervention. There are some problems in this kind of networks: the first one is the communication between (UAVs. Various routing protocols introduced classified into three categories, static, proactive, reactive routing protocols in order to solve this problem. The second problem is the network design, which depends on the network mobility, in which is the process of cooperation and collaboration between the UAV. Mobility model of FANET is introduced in order to solve this problem. In Mobility Model, the path and speed variations of the UAV and represents their position are defined. As of today, Random Way Point Model is utilized as manufactured one for Mobility in the greater part of recreation situations. The Arbitrary Way Point model is not relevant for the UAV in light of the fact that UAV do not alter their course and versatility, speed quickly at one time because of this reason, we consider more practical models, called Semi-Random Circular Movement (SRCM Mobility Model. Also, we consider different portability models, Mission Plan-Based (MPB Mobility Model, Pheromone-Based Model. Moreover, Paparazzi Mobility Model (PPRZM. This paper presented and discussed the main routing protocols and main mobility models used to solve the communication, cooperation, and collaboration in FANET networks.

  8. Two Dimensional Connectivity for Vehicular Ad-Hoc Networks

    CERN Document Server

    Farivar, Masoud; Ashtiani, Farid

    2008-01-01

    In this paper, we focus on two-dimensional connectivity in sparse vehicular ad hoc networks (VANETs). In this respect, we find thresholds for the arrival rates of vehicles at entrances of a block of streets such that the connectivity is guaranteed for any desired probability. To this end, we exploit a mobility model recently proposed for sparse VANETs, based on BCMP open queuing networks and solve the related traffic equations to find the traffic characteristics of each street and use the results to compute the exact probability of connectivity along these streets. Then, we use the results from percolation theory and the proposed fast algorithms for evaluation of bond percolation problem in a random graph corresponding to the block of the streets. We then find sufficiently accurate two dimensional connectivity-related parameters, such as the average number of intersections connected to each other and the size of the largest set of inter-connected intersections. We have also proposed lower bounds for the case ...

  9. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  10. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    Science.gov (United States)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  11. Intelligent Information Dissemination Scheme for Urban Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinsheng Yang

    2015-01-01

    Full Text Available In vehicular ad hoc networks (VANETs, a hotspot, such as a parking lot, is an information source and will receive inquiries from many vehicles for seeking any possible free parking space. According to the routing protocols in literature, each of the vehicles needs to flood its route discovery (RD packets to discover a route to the hotspot before sending inquiring packets to the parking lot. As a result, the VANET nearby an urban area or city center may incur the problem of broadcast storm due to so many flooding RD packets during rush hours. To avoid the broadcast storm problem, this paper presents a hotspot-enabled routing-tree based data forwarding method, called the intelligent information dissemination scheme (IID. Our method can let the hotspot automatically decide when to build the routing-tree for proactive information transmissions under the condition that the number of vehicle routing discoveries during a given period exceeds a certain threshold which is calculated through our developed analytical packet delivery model. The routing information will be dynamically maintained by vehicles located at each intersection near the hotspot if the maintaining cost is less than that of allowing vehicles to discover routes themselves. Simulation results show that this method can minimize routing delays for vehicles with lower packets delivery overheads.

  12. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  13. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Omprakash Kaiwartya

    2014-11-01

    Full Text Available Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs. Recently, different Geographic Distance Routing (GEDIR protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV. Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR. The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  14. Estimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks

    OpenAIRE

    TilotmaYadav; Partha Pratim Bhattacharya

    2013-01-01

    In this paper, system operating margin (SOM) is estimated for vehicular ad-hoc networks in absence and presence of Rayleigh fading. The Ad-hoc IEEE 802.11 model is considered for estimating the signal strength and system operating margin. Rayleigh fading was then simulated and system operating margin are estimated in Rayleigh fading environment for different standard modulation schemes.

  15. The effect of mobility on local service discovery in the Ahoy ad-hoc network system

    NARCIS (Netherlands)

    Goering, Patrick; Heijenk, Geert; Haverkort, Boudewijn; Haarman, Robbert

    2007-01-01

    Ahoy, a protocol to perform local service discovery in ad-hoc networks is described in this paper. The protocol has been implemented in a discreteevent simulator to study its performance in case of a multihop mobile ad-hoc network. Especially the effect of mobility on the network load and the probab

  16. Ad-hoc network DOA tracking via sequential Monte Carlo filtering

    Institute of Scientific and Technical Information of China (English)

    GUO Li; GUO Yan; LIN Jia-ru; LI Ning

    2007-01-01

    A novel sequential Monte Carlo (SMC) algorithm is provided for the multiple maneuvering Ad-hoc network terminals direction of arrival (DOA) tracking. A nonlinear mobility and observation model is adopted, which can describe the motion features of the Ad-hoc network terminal more practically. The algorithm does not need any additional measurement equipment. Simulation result shows its significant tracking accuracy.

  17. Ad-hoc Network Based on ARM-Linux%基于ARM-Linux的Ad-hoc组网

    Institute of Scientific and Technical Information of China (English)

    王晓华; 贾继洋

    2014-01-01

    Aiming to solve the problem of the contemporary communication system in the absence of any network, a new scheme of the Ad-hoc network based on ARM-Linux system is designed. Firstly, this paper introduces the transportation of the Linux2.6.36 and the driver of RT3070 on ARM11 platform. Then based on socket programming in TCP/IP, program designing of communication and tests are conducted on the ARM-Linux platform. Results have proved that the Ad-hoc network can use the least resources and costs to achieve reliable high rate communication. It is significant for practical application.%针对传统通信系统不能满足在无任何网络情况下的通信需求现状,设计并实现了一种由 ARM-Linux 系统及其外围部件组成的无线自组网(Ad-hoc)的通信方案.在 ARM11平台上完成了 Linux2.6.36操作系统和RT3070无线通信模块的驱动程序移植.利用基于TCP/IP协议的socket编程,编写测试程序,进行节点间无线通信传输实验.实验结果表明:本文搭建的Ad-hoc网络,可以用最少的资源和成本,实现节点间可靠的无线高速率通信,具有现实应用意义.

  18. A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    C. Sreedhar

    2010-03-01

    Full Text Available An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and nonrepudiation, the ad hoc routing protocols should also addresslocation confidentiality, cooperation fairness and absence oftraffic diversion. In this paper we attempt to analyze threatsfaced by the ad hoc network environment and provide a classification of the various security mechanisms.

  19. An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Tapan Kumar Godder

    2011-05-01

    Full Text Available Ad-hoc network is set up with multiple wireless devices without any infrastructure. Its employment is favored in many environments. Quality of Service (QoS is one of the main issues for any network and due to bandwidth constraint and dynamic topology of mobile ad hoc networks, supporting Quality of Service (QoS is extremely a challenging task. It is modeled as a multi-layer problem and is considered in both Medium Access Control (MAC and routing layers for ad hoc networks. Ad-hoc On-demand Distance Vector (AODV routing protocol is one of the most used and popular reactive routing protocols in ad-hoc networks. This paper proposed a new protocol QoS based AODV (QAODV which is a modified version of AODV.

  20. LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Senthil Murugan Tamilarasan

    2013-01-01

    Full Text Available Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access point. The MANET protocols can be classified as proactive and reactive routing protocol. The proactive routing protocols, all nodes which participated in network have routing table. This table updated periodically and is used to find the path between source and destination. The reactive routing protocol, nodes are initiate route discovery procedure when on-demand routes. In order to find the better route in MANET, many routing protocols are designed in the recent years. But those protocols are not concentrating about communication links and battery energy. Communication links between nodes and energy of nodes are very important factor for improving quality of routing protocols. This study presents innovative Link Stability with Energy Aware (LSEA multipath routing protocol. The key idea of the protocol is find the link quality, maximum remaining energy and lower delay. Reflections of these factors are increasing the qualities like packet delivery ratio, throughputs and reduce end-to-end delay. The LSEAMRP was simulated on NS-2 and evaluation results also shown.

  1. Cognitive radio ad hoc networks (CRAHNs): Cognitive radio ad hoc networks (CRAHNs): Resource allocation techniques based on Bio-inspired computing

    CERN Document Server

    Singh, Santosh Kumar

    2010-01-01

    Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled spectrum (this is nothing but the "common carrier principle" adopted in oil/gas/electricity pipelines/networks.), since all ad hoc networks share a common pool of channels, exhausting the available channels will force ad hoc networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. CR network proved to next generation wireless communication system that proposed as a way to reuse under-utilised spectrum of licensee user (primary network) in an opportunistic and non-interfering basis. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. Adding this layer of such intelligence to the ad hoc network by looking at the overall geography of the network known as cogni...

  2. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    Directory of Open Access Journals (Sweden)

    Márcio A. M. Truffa

    2015-11-01

    Full Text Available Background:Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention.Objective:To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedureMethods:The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated.Results:A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320 or staged percutaneous coronary intervention (n = 248. On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035, dyslipidemia (57.8% vs. 67.7%; p = 0.02 and three-vessel disease (38.8% vs. 50.4%; p = 0.015. The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm2, while the staged group, to 139.2 ± 75.3 Gycm2 (p < 0.001.Conclusion:Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times.

  3. Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-hoc Network Environment

    Directory of Open Access Journals (Sweden)

    Vaishali D. Khairnar

    2012-03-01

    Full Text Available A Vehicular Ad hoc Network (VANET consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort and entertainment. The performance of communication depends on how better routing takes place in the network. Routing data between the source and destination vehicle depends on the routing protocols being used in vehicular ad-hoc network. In this simulation based study we investigated about different ad hoc routing protocols for vehicular ad-hoc network (VANET. The main goal of our study was to identify which ad hoc routing protocol has better performance in highly mobile environment of vehicular ad-hoc network. We have measured the performance of routing protocols using 802.11p in vehicular ad-hoc network in which we considered the scenario of city (i.e. Route between Nerul and Vashi where we have take 1200 different types of vehicles and checked their performance. Routing protocols are selected after the literature review. The selected protocols are then evaluated through simulation under 802.11p in terms of performance metrics (i.e PDR & E2E delay

  4. Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks

    CERN Document Server

    Ali, Redouane; Rio, Miguel

    2009-01-01

    This paper proposes an adaptation of two network size estimation methods: random tour and gossip-based aggregation to suit master/slave mobile ad hoc networks. We show that it is feasible to accurately estimate the size of ad hoc networks when topology changes due to mobility using both methods. The algorithms were modified to account for the specific constraints of master/slave ad hoc networks and the results show that the proposed modifications perform better on these networks than the original protocols. Each of the two algorithms presents strengths and weaknesses and these are outlined in this paper.

  5. A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas

    Directory of Open Access Journals (Sweden)

    Himadri Nath Saha

    2012-04-01

    Full Text Available Many security schemes for mobile ad-hoc network(MANET have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA. Our simulation results show how cellular automata(CA is implemented for user authentication and secure transmission in MANET.

  6. SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    SHEENU SHARMA

    2009-06-01

    Full Text Available A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Blackhole attacks on the network performance. We simulated Blackhole attacks in Qualnet Simulator and measured the packet loss in the network with and without a blackhole. The simulation is done on AODV (Ad hoc On Demand Distance Vector Routing Protocol. The network performance in the presence of a blackhole is reduced up to 26%.

  7. A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Binod Kumar Pattanayak

    2014-01-01

    Full Text Available Applications of Mobile Ad Hoc Networks (MANETs have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, we introduce a mobile agent based intrusion detection and prevention architecture for a clustered MANET. Here, a mobile agent resides in each cluster of the ad hoc network and each cluster runs a specific application at any point of time. This application specific approach makes the network more robust to external intrusions directed at the nodes in an ad hoc network.

  8. Using Ad Hoc Transient Communities to Strengthen Social Capital: Design Considerations

    NARCIS (Netherlands)

    Fetter, Sibren; Berlanga, Adriana; Sloep, Peter

    2010-01-01

    Fetter, S., Berlanga, A. J., & Sloep, P. B. (2010, 3-4 May). Using Ad Hoc Transient Communities to Strengthen Social Capital: Design Considerations. Presented at the 7th International Conference on Networked Learning (NLC-2010), Aalborg, Denmark.

  9. A group based key sharing and management algorithm for vehicular ad hoc networks.

    Science.gov (United States)

    Khan, Zeeshan Shafi; Moharram, Mohammed Morsi; Alaraj, Abdullah; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  10. Ad-hoc Content-based Queries and Data Analysis for Virtual Observatories Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Aquilent, Inc. proposes to support ad-hoc, content-based query and data retrieval from virtual observatories (VxO) by developing 1) Higher Order Query Services that...

  11. Modeling of Ad-hoc and Infrastructure Dual Mode Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Yi-Hung Chen; Hui-Nien Hung; Yi-Bing Lin; Nan-Fu Peng

    2005-01-01

    This paper investigates a mobile telecommunications system that supports both ad hoc and infrastructure mode operations. Based on analytic and simulation models, our study investigates how base station (BS) and ad hoc channel capacity, and the mobility and locality of mobile stations affect the performance of a dual mode system. We show that a dual mode system can significantly outperform a single mode (infrastructure) system when the degree of locality is high. Furthermore, a dual mode system can support much faster mobile users with less BS channels in comparison to an infrastructure mode system. Our study quantitatively identifies the threshold value for the number of ad hoc channels such that beyond this threshold, increasing ad hoc channel capacity will not improve the performance of a dual mode system.

  12. DESAIN ALGORITMA DAN SIMULASI ROUTING UNTUK GATEWAY AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Nixson Meok

    2009-12-01

    Full Text Available   Routing protocol to the wireless ad hoc networks is very needed in the communication process between some terminals, to send the data packet through one or several node(s to the destination address where the network typology is always changing. Many previous works that discussed about routing ad hoc both for manet (mobile ad hoc networks and wireless networks, but the emphasis have more focus on comparing the performance of several routing ad hoc. While in this work, there is a bulding of routing algorithm model to gateway in land to the nodes that analogized as a boat that move on the sea. With the assumption that the communication inter terminals to radio band of Very High Frequency, thus algorithm that built in the simulation based on the range gap of the HF frequency. The result of this simulation will be developed as the platform to implement the service development of multiuser communication

  13. HEAD: A Hybrid Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    QUO Jianli; LIU Hongwei; DONG Jian; YANG Xiaozong

    2007-01-01

    Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding. However, it may not be advantageous for individual nodes to cooperate. In order to make the mobile ad hoc network more robust, we propose a scheme called HEAD (a hybrid mechanism to enforce node cooperation in mobile ad hoc networks) to make the misbehavior unattractive. HEAD is an improvement to OCEAN (observation-based cooperation enforcement in ad hoc networks). It employs only first hand information and works on the top of DSR (dynamic source routing) protocol. By interacting with the DSR, HEAD can detect the misbehavior nodes in the packet forwarding process and isolate them in the route discovery process. In order to detect the misbehavior nodes quickly, HEAD introduces the warning message. In this paper, we also classify the misbehavior nodes into three types: malicious nodes, misleading nodes, and selfish nodes. They all can be detected by HEAD, and isolated from the network.

  14. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  15. A novel technique for node authentication in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Srinivas Aluvala

    2016-09-01

    Full Text Available Mobile ad hoc network is a collection of nodes in mobility that communicate to one another forming a network through wireless links, in which each node acts a router and forward packets to destinations. The dynamic topology and self-organizing of the nodes make them more vulnerable to the network. In MANET, the major challenging task is to provide security during the routing of data packets. Various kinds of attacks have been studied in ad hoc networks, but no proper solution found for these attacks. So, preventing the malicious nodes from destroying the network plays vital role in ad hoc networks. In this paper, a novel technique has been proposed to provide node authentication while a new node joining into the network and before initiating route discovery process in mobile ad hoc networks. Also shown how the proposed technique mitigates the impact of attacks on nodes.

  16. Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Chaudhary

    2014-01-01

    Full Text Available Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gateway based security mechanisms cannot be applied on it. That’s why intrusion detection systems are used as keystone in these networks. Many number of intrusion detection systems have been discovered to handle the uncertain activity in mobile ad hoc networks. This paper emphasized on proposed fuzzy based intrusion detection systems in mobile ad hoc networks and presented their effectiveness to identify the intrusions. This paper also examines the drawbacks of fuzzy based intrusion detection systems and discussed the future directions in the field of intrusion detection for mobile ad hoc networks.

  17. Inter-vehicle-communications based on ad hoc networking principles. The FleetNet Project

    OpenAIRE

    Franz, Walter; Hartenstein, Hannes; Mauve, Martin

    2005-01-01

    Vehicular Ad Hoc Networks (VANETs) represent an emerging topic in wireless communication and networking. VANETs are currently receiving a lot of attention due to their promise of considerably increasing safety and comfort while being on the road. High mobility, adverse channel conditions, and market introduction are some of the key challenges one has to deal with when designing these spontaneous networks. Inter-Vehicle-Communications Based on Ad Hoc Networking Principles covers results and ac...

  18. Studying Vehicle Movements on Highways and their Impact on Ad-Hoc Connectivity

    OpenAIRE

    Füßler, Holger; Torrent-Moreno, Marc; Krüger, Roland; Transier, Matthias; Hartenstein, Hannes; Effelsberg, Wolfgang

    2005-01-01

    While Mobile Ad-Hoc Networks are generally studied using a randomized node movement model such as the Random Way-Point model [8], Vehicular Ad-Hoc Networks deal with street-bound vehicles following a completely different movement pattern. This results - among other things - in a completely different connectivity situation and new challenges for data dissemination or routing/forwarding algorithms. Thus, researchers need a) suitable movement patterns for simulation, and b) a solid statistical u...

  19. PERFORMANCE EVALUATION OF WORMHOLE SECURITY APPROACHES FOR AD-HOC NETWORKS

    OpenAIRE

    Ismail Hababeh; Issa Khalil; Abdallah Khreishah; Samir Bataineh

    2013-01-01

    Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we wi...

  20. Simulation-Based Performance Evaluation of Routing Protocols in Vehicular Ad-hoc Network

    OpenAIRE

    Vaishali D. Khairnar; Kotecha, Dr. Ketan

    2013-01-01

    A Vehicular Ad-hoc Network (VANET) is a collection of wireless vehicle nodes forming a temporary network without using any centralized Road Side Unit (RSU). VANET protocols have to face high challenges due to dynamically changing topologies and symmetric links of networks. A suitable and effective routing mechanism helps to extend the successful deployment of vehicular ad-hoc networks. An attempt has been made to compare the performance of two On-demand reactive routing protocols namely AODV ...

  1. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  2. Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems

    OpenAIRE

    Shrikant Pujar; Prof. Vasudev K Parvati

    2013-01-01

    In this Paper, We are dealing with the Current Qos Models for MANETs. We have proposed theExtension of Stateless Wireless Ad Hoc Network (SWAN) in order to improve Qos by using the schedulingModule Stateless network model which uses Rate Control Algorithm to deliver service differentiation inmobile wireless ad hoc network in a simple, scalable manner. In the Results we have shown the CongestionFree Routing between two different nodes of a Network through Router.

  3. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    OpenAIRE

    Reshmi, B. M.; Manvi, S. S.; Bhagyavati

    2006-01-01

    Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and r...

  4. Protection of an intrusion detection engine with watermarking in ad hoc networks

    OpenAIRE

    Mitrokotsa, A.; Komninos, N.; Douligeris, C.

    2010-01-01

    Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detecti...

  5. DelPHI: wormhole detection mechanism for ad hoc wireless networks

    OpenAIRE

    Chiu, HS; Wong Lui, KS

    2006-01-01

    In mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding rou...

  6. The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security

    OpenAIRE

    Parveen Kumar

    2012-01-01

    In VANET, or Intelligent Vehicular Ad-HocNetworking, defines an intelligent way of usingVehicular Networking. In VANET integrates onmultiple ad-hoc networking technologies such as WIFIIEEE 802.11p, WAVE IEEE 1609, WIMAX IEEE802.16, Bluetooth, IRA, and ZIGBEE for easy,accurate, effective and simple communication betweenvehicles on dynamic mobility. Effective measuressuch as media communication between vehicles canbe enabled as well as methods to track the automotivevehicles. In VANET helps in ...

  7. A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques

    CERN Document Server

    Kayarkar, Harshavardhan

    2012-01-01

    Mobile Ad hoc Networks (MANETS) are transient networks of mobile nodes, connected through wireless links, without any fixed infrastructure or central management. Due to the self-configuring nature of these networks, the topology is highly dynamic. This makes the Ad Hoc Routing Protocols in MANETS highly vulnerable to serious security issues. In this paper, we survey the common security threats and attacks and summarize the solutions suggested in the survey to mitigate these security vulnerabilities.

  8. An Optimal Path Management Strategy in Mobile Ad Hoc Network Using Fuzzy and Rough Set Theory

    OpenAIRE

    P. Seethalakshmi; M. J.A. Jude; Rajendran, G

    2011-01-01

    Problem statement: Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically forms a network. Most of the existing ad-hoc routing algorithms select the shortest path using various resources. However the selected path may not consider all the network parameters and this would result in link instability in the network. The problems with existing methods are frequent route change with respect to change in topology, congestion as result of traffic and battery limitat...

  9. Ad hoc distributed mutual exclusion algorithm based on token-asking

    Institute of Scientific and Technical Information of China (English)

    Wang Zheng; Liu Xin song; Li Mei'an

    2007-01-01

    The solution of distributed mutual exclusion is difficult in Ad hoc networks owing to dynamic topologies and mobility.Based on the analysis of the properties of Ad hoc networks and the disadvantages of the traditional algorithms, an improved Ad hoc system model was given and a novel algorithm was presented as AHDME (Ad Hoc Distributed Mutual Exclusion); it was based on the token-asking algorithms.It utilized broadcast to search for the token and to decrease the message complexity of multi-hop Ad hoc networks.Lamport's timestamp was improved to ensure the time sequence and to prevent nodes from starvation.When compared to traditional algorithms, AHDME does not require the fixed size of request queues and the global system information, which adapts itself to the frequent arrival/departures and the limited computing capability of nodes in Ad hoc networks.Performance analysis and simulation results show that the AHDME algorithm has low message complexity, small space complexity, and short response delay.

  10. COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hatem S. A. Hamatta

    2016-04-01

    Full Text Available Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the last decade. it surrounded by much challenges that should be solved the improve establishment of such networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc Networks (MANETs. As this type of networks does not require any pre-exist hardware. As well as, every node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the network internal structure will be unpredictably changed frequently according to continuous activities between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are designed for mobile ad-hoc networks by describing their structures, operations, features and then comparing their various characteristics.

  11. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  12. The May 26, 1999 Resolution of the Joint Meeting of the Board of the Radiation Diagnosis and Radiation Therapy Section, Academic Council, Ministry of Health of Russia, the X-ray Diagnosis Ad Hoc Commission, Interdepartmental Scientific Council for Medical Radiology and Radiation Medicine, Russian Academy of Medical Sciences, and the Executive Committee, Russian Association of Radiologists

    International Nuclear Information System (INIS)

    The text of the May 26, 1999 Resolution of the joint meeting of the Board of the Radiation Diagnosis and Radiation Therapy Section of the Ministry of Health of Russia with the X-ray Diagnostics Ad Hoc Problem Commission of the Intergovernmental Scientific Council for Medical Radiology and Radiation Medicine of the Russian Academy of Medical Sciences and the Executive Committee of Russian Association of Radiologists is presented. It is noted that in spite of the fact that the intervention radiology as an independent branch has not yet been formed, separate developments, aimed at application of invasive interventions under the control of radiodiagnostic methods are carried out in the area of bronco pulmonology, gastroenterology, mammology, gynecology, urology, oncology above 30 years and steps in legalization of this trend are also undertaken. Absence of statistical documentation on technical and staff provision of therapeutical-prophylactic establishments as well as unified terminology is noted. The tasks aimed at broader introduction of intervention radiology in Russia are set up

  13. Review Strategies and Analysis of Mobile Ad Hoc Network- Internet Integration Solutions

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar

    2010-07-01

    Full Text Available The desire to be connected anytime and anywhere has led to the development of wireless networks, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad Hoc Networks (MANETs use portable devices such as mobile phones, laptops or personal digital assistants (PDAs for spontaneous establishment of communication. Most existing research in the area of mobile Ad Hoc Networks is limited to stand-alone isolated networks. But connectivity of a mobile Ad Hoc network to the Internet is also desirable as more and more applications and services in our society now depend on fixed infrastructure networks. It is therefore important that dynamically deployed wireless Ad Hoc networks should also gain access to these fixed networks and their services. The integration of MANETs into Internet increases the networking flexibility and coverage of existing infrastructure networks. Although researchers have proposed many solutions, but it is still unclear which one offer the best performance compared to the others. When an Ad Hoc network is connected to Internet, it is important for the mobile nodes to detect efficiently available Internet gateways providing access to the Internet. Internet gateway discovery time and handover delay have strong influence on packet delay and throughput. The key challenge in providing connectivity is to minimize the overhead of mobile IP and Ad Hoc routing protocol between Internet and Ad Hoc networks. There, this paper focuses on proposed technical solutions on Internet gateway discovery and also we briefly describe different ways to provide global Internet access for MANETs. Finally, some challenges are also mentioned which need in depth investigation.

  14. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  15. E2AODV Protocol for Load Balancing in Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. S.D. Wahida Banu

    2012-01-01

    Full Text Available Problem statement: In mobile ad hoc networks there are a number of challenges in providing quality of service routing with energy efficiency and load balancing. Most routing protocols do not consider the problem of load balance. A routing protocol called energy Efficient Ad-hoc on Demand Vector (E2AODV is proposed. It addresses the quality of service issues such as throughput, end to end delay, load distribution and energy. Approach: This study presents a scheme to balance the load with energy efficiency considering both congestion and the nodes energy usage. A threshold value was used to judge if intermediate node was overloaded, variable and changing along with nodes interface queue length around the backward path. Results: The routing protocol called energy Efficient Ad hoc on Demand Vector (E2AODV that is intended to provide a reliable transmission with low energy consumption was compared with Ad-hoc on Demand Vector (AODV in terms of the packet delivery ratio, average end to end delay, load distribution and node energy consumption. Conclusion/Recommendation: E2AODV protocol chooses an optimum path with low energy usage. It provides a better scheme to balance the load with energy efficiency and packet delivery ratio. It can be further enhanced as a secure routing protocol for mobile ad-hoc networks.

  16. Similarity-Based Clustering Strategy for Mobile Ad Hoc Multimedia Databases

    Directory of Open Access Journals (Sweden)

    Bo Yang

    2005-01-01

    Full Text Available Multimedia data are becoming popular in wireless ad hoc environments. However, the traditional content-based retrieval techniques are inefficient in ad hoc networks due to the multiple limitations such as node mobility, computation capability, memory space, network bandwidth, and data heterogeneity. To provide an efficient platform for multimedia retrieval, we propose to cluster ad hoc multimedia databases based on their semantic contents, and construct a virtual hierarchical indexing infrastructure overlaid on the mobile databases. This content-aware clustering scheme uses a semantic-aware framework as the theoretical foundation for data organization. Several novel techniques are presented to facilitate the representation and manipulation of multimedia data in ad hoc networks: 1 using concise distribution expressions to represent the semantic similarity of multimedia data, 2 constructing clusters based on the semantic relationships between multimedia entities, 3 reducing the cost of content-based multimedia retrieval through the restriction of semantic distances, and 4 employing a self-adaptive mechanism that dynamically adjusts to the content and topology changes of the ad hoc networks. The proposed scheme is scalable, fault-tolerant, and efficient in performing content-based multimedia retrieval as demonstrated in our combination of theoretical analysis and extensive experimental studies.

  17. QoS-aware multicast routing protocol for Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Sun Baolin; Li Layuan

    2006-01-01

    Ad hoc wireless networks consist of mobile nodes interconnected by multihop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. Due to bandwidth constraint and dynamic topology of mobile ad hoc networks, supporting Quality of Service (QoS) is an inherently complex, difficult issue and very important research issue. MAODV (Multicast Ad hoc Ondemand Distance Vector) routing protocol provides fast and efficient route establishment between mobile nodes that need to communicate with each other. MAODV has minimal control overhead and route acquisition latency. In addition to unicast routing, MAODV supports multicast and broadcast as well.The multicast routing problem with multiple QoS constraints, which may deal with the delay, bandwidth and packet loss measurements is discussed, and a network model for researching the ad hoc network QoS multicast routing problem is described. It presents a complete solution for QoS multicast routing based on an extension of the MAODV routing protocol that deals with delay, bandwidth and packet loss measurements. The solution is based on lower layer specifics. Simulation results show that, with the proposed QoS multicast routing protocol, end-to-end delay, bandwidth and packet loss on a route can be improved in most of cases. It is an available approach to multicast routing decision with multiple QoS constraints.

  18. Review of Artificial Immune System to Enhance Security in Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Tarun Dalal

    2012-04-01

    Full Text Available Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not fixed in a Mobile Adhoc Network; due to host mobility topology can change any time. Mobile Ad-hoc Networks are much more vulnerable to security attacks. Current research works on securing Mobile Adhoc Networks mainly focus on confidentiality, integrity,authentication, availability, and fairness. Design of routingprotocols is very much crucial in Mobile Ad-hoc Network. There are various techniques for securing Mobile Ad-hoc Network i.e. cryptography. Cryptography provides efficient mechanism to provide security, but it creates very much overhead. So, an approach is used which is analogous to Biological Immune System, known as Artificial Immune System (AIS. There is a reason of AIS to be used for security purposes because the Human Immune System (HIS protects the body against damage from an extremely large number of harmfulbacteria, viruses, parasites and fungi, termed pathogens. It doesthis largely without prior knowledge of the structure of thesepathogens. AIS provide security by determining non-trusted nodes and eliminate all non-trusted nodes from the network.

  19. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    Science.gov (United States)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  20. RESEARCH ON ANONYMOUS COMMUNICATION TECHNOLOGIES IN AD HOC NETWORKS%无线 Ad hoc 网络匿名通信技术研究

    Institute of Scientific and Technical Information of China (English)

    王秀芝; 石志东; 房卫东; 张小珑; 单联海

    2016-01-01

    无线 Ad hoc 网络(MANET)的多跳、自组织、无固定设施以及运算资源有限等特性,使得传统网络中复杂度高的安全算法难以应用于其中。而采用与匿名技术相结合的安全机制,可较好地解决节点隐私和通信关系保密的安全问题。针对现有的匿名技术,采用对比分析的方法,对传统网络的匿名技术进行分析,总结技术上的优缺点,研究 Ad hoc 网络的匿名技术,并对比分析各种匿名通信协议的安全性能,为后续的研究与应用提供帮助。%Due to the features of Ad hoc networks such as multi-hop,self-organisation,non-infrastructure and limited resource,the security algorithms with high complexity in traditional networks are hard to be used in it.However to use the security mechanism combining with anonymous technology can well solve the security problem in regard to nodes’privacy and communication relationship secret.In this paper,targeted at existing anonymous technologies,we analyse their use in traditional networks with the method of comparative analysis, summarise the advantages and disadvantages in terms of technology,and meanwhile study the anonymous technologies used in Ad hoc networks,as well as compare and analyse the security performances of various anonymous communication protocol,these provide the help for subsequent researches and applications.

  1. Study of Impact of Mobile Ad hoc Networking and its Future Applications

    Directory of Open Access Journals (Sweden)

    Ashema Hasti

    2012-01-01

    Full Text Available Today, many people carry numerous portable devices, such as laptops, mobile phones, PDAs and mp3 players, for use in their professional and private lives. For the most part, these devices are used separately-that is, their applications do not interact. Imagine, however, if they could interact directly: participants at a meeting could share documents or presentations; all communication could automatically be routed through the wireless corporate campus network. These examples of spontaneous, ad hoc wireless communication between devices might be loosely defined as a scheme, often referred to as ad hoc networking, which allows devices to establish communication, anytime and anywhere without the aid of a central infrastructure. This paper describes the concept of mobile ad hoc networking (MANET and points out some of its applications that can be envisioned for future. Also, the paper presents two of the technical challenges MANET poses, which include Geocasting and QoS.

  2. Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols - Quantitative Study

    Directory of Open Access Journals (Sweden)

    Tamilarasan S

    2012-11-01

    Full Text Available Wireless ad-hoc network is emerging network and form temporary networks. Due to its spontaneous nature the topology is frequently changes. Protocols selection and set up routing between any pair of nodes are the primary goal design for any wireless network. Several protocols are proposed in Mobile Ad-hoc Network (MANET and selected protocol must provide best capability of data delivery and data integrity. In this paper, we are study and analysis the performance and characteristic of Ad-hoc On-demand Distance Vector (AODV, Dynamic Source Routing (DSR, Optimized Link State Routing (OLSR and Destination Sequenced Distance Vector (DSDV protocols using NS2 simulator. We are comparing the above said protocols based on the delay, throughput, control overhead and packet delivery ratio.

  3. ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests

    CERN Document Server

    Kataria, Jayesh; Sanyal, Sugata

    2010-01-01

    Reactive routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR)in Ad-Hoc Wireless Networks which are used in Mobile and Ad Hoc Networks (MANETs) work by flooding the network with control packets. There is generally a limit on the number of these packets that can be generated or forwarded. But a malicious node can disregard this limit and flood the network with fake control packets. These packets hog the limited bandwidth and processing power of genuine nodes in the network while being forwarded. Due to this, genuine route requests suffer and many routes either do not get a chance to materialize or they end up being longer than otherwise. In this paper we propose a non cryptographic solution to the above problem and prove its efficiency by means of simulation.

  4. Routing in wireless ad hoc and sensor network underground with sensor data in real-time

    Science.gov (United States)

    Odei-Lartey, Emmanuel; Hartmann, Klaus; Ahmadian, Hamidreza

    2012-05-01

    This paper first describes the innovative topology and structure of a wireless ad hoc and sensor network in a so called line-in-the-underground formation and the feasibility of achieving a reliable wireless connection underground with regards to a borehole telemetry system. It further describes a routing algorithm/protocol implementation based on a modification of the ad hoc on-demand distance vector protocol to achieve a reliable underground communication scheme for the wireless ad hoc network deployed underground for sensor data acquisition in real time as applied in the borehole telemetry system. Simulations and experiments are conducted to investigate and verify the effectiveness of this routing technique and the performance results are shown.

  5. Throughput Enhancement Using Multiple Antennas in OFDM-based Ad Hoc Networks under Transceiver Impairments

    CERN Document Server

    Zhao, Pengkai

    2010-01-01

    Transceiver impairments, including phase noise, residual frequency offset, and imperfect channel estimation, significantly affect the performance of Multiple-Input Multiple-Output (MIMO) system. However, these impairments are not well addressed when analyzing the throughput performance of MIMO Ad Hoc networks. In this paper, we present an analytical framework to evaluate the throughput of MIMO OFDM system under the impairments of phase noise, residual frequency offset, and imperfect channel estimation. Using this framework, we evaluate the Maximum Sum Throughput (MST) in Ad Hoc networks by optimizing the power and modulation schemes of each user. Simulations are conducted to demonstrate not only the improvement in the MST from using multiple antennas, but also the loss in the MST due to the transceiver impairments. The proposed analytical framework is further applied for the distributed implementation of MST in Ad Hoc networks, where the loss caused by impairments is also evaluated.

  6. A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2014-12-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  7. Location Based Throughput Maximization Routing in Energy Constrained Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    V. Sumathy

    2006-01-01

    Full Text Available In wireless Ad-hoc network, power consumption becomes an important issue due to limited battery power. One of the reasons for energy expenditure in this network is irregularly distributed node pattern, which impose large interference range in certain area. To maximize the lifetime of ad-hoc mobile network, the power consumption rate of each node must be evenly distributed and the over all transmission range of each node must be minimized. Our protocol, Location based throughput maximization routing in energy constrained Ad-hoc network finds routing paths, which maximize the lifetime of individual nodes and minimize the total transmission energy consumption. The life of the entire network is increased and the network throughput is also increased. The reliability of the path is also increased. Location based energy constrained routing finds the distance between the nodes. Based on the distance the transmission power required is calculated and dynamically reduces the total transmission energy.

  8. A Distributed Authentication Algorithm Based on GQ Signature for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    YAO Jun; ZENG Gui-hua

    2006-01-01

    Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.

  9. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  10. A QoS Routing Protocol based on Available Bandwidth Estimation for Wireless Ad Hoc Networks

    CERN Document Server

    Kaaniche, Heni; Frikha, Mounir; Kamoun, Farouk

    2011-01-01

    At the same time as the emergence of multimedia in mobile Ad hoc networks, research for the introduction of the quality of service (QoS) has received much attention. However, when designing a QoS solution, the estimation of the available resources still represents one of the main issues. This paper suggests an approach to estimate available resources on a node. This approach is based on the estimation of the busy ratio of the shared canal. We consider in our estimation the several constraints related to the Ad hoc transmission mode such as Interference phenomena. This approach is implemented on the AODV routing protocol. We call AODVwithQOS our new routing protocol. We also performed a performance evaluation by simulations using NS2 simulator. The results confirm that AODVwithQoS provides QoS support in ad hoc wireless networks with good performance and low overhead.

  11. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    Science.gov (United States)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  12. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  13. A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaime Lloret

    2009-08-01

    Full Text Available It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads while allows to scale the network considerably. Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based on groups. In this paper, after a review of group based architectures and of neighbor selection strategies, a planar group-based network architecture is proposed. In the proposal, the network is formed by several groups of ad-hoc devices or sensors. Connections between groups are established as a function of the proximity and the neighbor's available capacity (based on the ad-hoc device or sensor’s energy. The messages that are needed to the proper operation are shown. It is also simulated how much time is needed to propagate information between groups and it is calculated the diameter for different topologies

  14. The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks

    Directory of Open Access Journals (Sweden)

    V.S.Dhaka

    2014-04-01

    Full Text Available In recent years, continuous progress in wireless communication has opened a new research field in computer networks. Now a day’s wireless ad-hoc networking is an emerging research technology that needs attention of the industry people and the academicians. A vehicular ad-hoc network uses vehicles as mobile nodes to create mobility in a network. It’s a challenge to generate realistic mobility for Indian networks as no TIGER or Shapefile map is available for Indian Automotive Networks. This paper simulates the realistic mobility of the Vehicular Ad-hoc Networks (VANETs. The key feature of this work is the realistic mobility generation for the Indian Automotive Intelligent Transport System (ITS and also to analyze the throughput, packet delivery fraction (PDF and packet loss for realistic scenario. The experimental analysis helps in providing effective communication for safety to the driver and passengers.

  15. A Secure and Pragmatic Routing Protocol for Mobile Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LIU Zhi-yuan

    2008-01-01

    An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Because of node mobility and power limitations, the network topology changes frequently. Routing protocol plays an important role in the ad hoc network. A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. As an optimization for the current Dynamic Source Routing Protocol, a secure and pragmatic routes selection scheme based on Reputation Systems was proposed. We design the Secure and Pragmatic Routing protocol and implement simulation models using GloMoSim. Simulation results show that the Secure and Pragmatic Routing protocol provides better experimental results on packet delivery ratio, power consumption and system throughput than Dynamic Source Routing Protocol.

  16. A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    HU Zhi-gang; MA Hao; WANG Guo-jun; LIAO Lin

    2005-01-01

    A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad hoc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol.

  17. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    Science.gov (United States)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  18. Decentralized Dynamic Load Balancing and Intersection Trust in Mobile Ad Hoc Grids

    Directory of Open Access Journals (Sweden)

    Don Abraham

    2011-07-01

    Full Text Available A mobile ad hoc network is an autonomous system connected through wireless links. It does not have any fixed infrastructure, and the mobile nodes in the network coordinate among themselves for communication. This network can be formed by heterogeneous mobile devices like laptops, PDAs, cell phones etc. Highly capable device provides some services to low capability device and this will bring in a grid environment into the mobile ad hoc networks. A balanced allocation of load is a critical issue in such grids, considering its limitations in terms of power and availability. A decentralized approach is favored for a dispersed functioning of the grid, without draining a single chosen node. It is also essential to augment the resource allocation with an effective authorization mechanism, as the ad hoc grids lack permanent trusted central authority. In this paper, dynamic virtual organizations are constructed within this grid based on the resource commonalities of devices.

  19. Design and Implementation of Anycast Services in Ad Hoc Networks Connected to IPv6 Networks

    Directory of Open Access Journals (Sweden)

    Xiaonan Wang

    2010-04-01

    Full Text Available The paper proposes a communication model of implementing an Anycast service in an Ad Hoc network which is connected to IPv6 networks where IPv6 nodes can obtain the Anycast service provided by the Ad hoc network. In this model when an Anycast mobile member in an Ad hoc network moves it can keep the existing communications with its corresponding nodes to continue providing the Anycast services with good quality of service to IPv6 nodes. This model creates a new kind of IPv6 address auto-configuration scheme which does not need the address duplication detection. This paper deeply discusses and analyzes the model and the experimental data prove its validity and efficiency.

  20. Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm

    CERN Document Server

    Prasanth, K; Jayasudha, K; Chandrasekar, C

    2010-01-01

    VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing), a reliable greedy position based routing approach to forward packets to the node present in the edge of the transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that packet delivery ratio is improved considerably compared to other routing techniques of V...

  1. Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm

    Directory of Open Access Journals (Sweden)

    K. Jayasudha

    2010-01-01

    Full Text Available VANETs (Vehicular Ad hoc Networks are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing, a reliable greedy position based routing approach to forward packets to the node present in the edge of the transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that packet delivery ratio is improved considerably compared to other routing techniques of VANET.

  2. Wireless Ad-hoc Network Model for Video Transmission in the Tunnel of Mine

    Directory of Open Access Journals (Sweden)

    Zhao Xu

    2011-01-01

    Full Text Available Wireless ad hoc networks have been widely used for its flexibility and quick development, especially in emergent conditions. Recently they are introduced to coal mines underground for rescuing after disasters such as gas explosions. Significantly, we construct a network model named Chain Model to simulate the special circumstance in the tunnel of the mine. Moreover, for studying effects of different routing protocols used in this model when transmitting video data, Dynamic Destination-Sequenced Distance-Vector (DSDV, Dynamic Source Routing (DSR and Ad hoc On Demand Distance Vector (AODV are compared with each other in the experiment based on our model. The result indicates that AODV performs best among the three protocols in this model in terms of packet loss ratio, end-to-end delay time and throughput, which is significant for our future research on ad hoc networks for rescuing in coal mines underground.

  3. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  4. Sea Training at Maritime Academies Oversight. Hearings Before the Ad Hoc Select Subcommittee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, House of Representatives, Ninety-Sixth Congress, Second Session on Sea Training of United States Merchant Marine Officers and Different Ways of Satisfying This Requirement at the Various Maritime Academies.

    Science.gov (United States)

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    Recorded are minutes of hearings before the House Ad Hoc Select Subcommittee on Maritime Education and Training regarding the sea training of United States Merchant Marine officers. Examined are various approaches to meeting the sea training requirement, especially the options of maritime academy training vessels, sailing on U.S.-flag merchant…

  5. SPIZ: An Effective Service Discovery Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Noh Donggeon

    2007-01-01

    Full Text Available The characteristics of mobile ad hoc networks (MANETs require special care in the handling of service advertisement and discovery (Ad/D. In this paper, we propose a noble service Ad/D technique for MANETs. Our scheme avoids redundant flooding and reduces the system overhead by integrating Ad/D with routing layer. It also tracks changing conditions, such as traffic and service popularity levels. Based on a variable zone radius, we have combined push-based Ad/D with a pull-based Ad/D strategy.

  6. SPIZ: An Effective Service Discovery Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Donggeon Noh

    2006-11-01

    Full Text Available The characteristics of mobile ad hoc networks (MANETs require special care in the handling of service advertisement and discovery (Ad/D. In this paper, we propose a noble service Ad/D technique for MANETs. Our scheme avoids redundant flooding and reduces the system overhead by integrating Ad/D with routing layer. It also tracks changing conditions, such as traffic and service popularity levels. Based on a variable zone radius, we have combined push-based Ad/D with a pull-based Ad/D strategy.

  7. Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ipsa De

    2011-01-01

    Full Text Available In recent years, the use of mobile ad hoc networks (MANETs has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards allthe more difficult. The security issue is becoming a major concern and bottle neck in the application of MANET. In this paper, an attempt has been made to thoroughly study the blackhole attack which is one ofthe possible attacks in ad hoc networks in routing protocol AODV with possible solution to blackhole attack detection.

  8. Two-Way Transmission Capacity of Wireless Ad-hoc Networks

    OpenAIRE

    Vaze, Rahul; Kien T. Truong; Weber, Steven; Heath Jr, Robert W.

    2010-01-01

    The transmission capacity of an ad-hoc network is the maximum density of active transmitters per unit area, given an outage constraint at each receiver for a fixed rate of transmission. Most prior work on finding the transmission capacity of ad-hoc networks has focused only on one-way communication where a source communicates with a destination and no data is sent from the destination to the source. In practice, however, two-way or bidirectional data transmission is required to support contro...

  9. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  10. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  11. Analysis of Efficient Address Allocation Schemes In Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.Zahoor Ul Huq

    2010-03-01

    Full Text Available A Mobile Ad-hoc Network (MANET can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to provide autonomous networking and self-management. In this paper we take into account various parameters for designing an efficient address allocation scheme in MANETs and consider the best of them to build an efficient protocol for Address allocation in MANETs.

  12. A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. R. Biradar

    2010-03-01

    Full Text Available We describe a variant of TCP (Tahoe, Vegas, TCP is most widely used transport protocol in both wired and wireless networks. In mobile ad hoc networks, the topology changes frequently due to mobile nodes, this leads to significant packet losses and network throughput degradation. This is due to the fact that TCP fails to distinguish the path failure and network congestion. In this paper, the performances of TCP over different routing (DSR, AODV and DSDV protocols in ad hoc networks wasstudied by simulation experiments and results are reported.

  13. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...... core network in assigning network address prefixes to gateways in mobile ad-hoc networks. This paper focuses on how CP-nets and the CPN computer tools have been applied in the development of ERDP. A CPN model has been constructed that constitutes a formal executable specification of ERDP. Simulation...

  14. Topology-Transparent Transmission Scheduling Algorithms in Wireless Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    MA Xiao-lei; WANG Chun-jiang; LIU Yuan-an; MA Lei-lei

    2005-01-01

    In order to maximize the average throughput and minimize the transmission slot delay in wireless Ad Hoc networks,an optimal topology-transparent transmission scheduling algorithm-multichannel Time-Spread Multiple Access(TSMA)is proposed.Further analysis is shown that the maximum degree is very sensitive to the network performance for a wireless Ad Hoc networks with N mobile nodes.Moreover,the proposed multichannel TSMA can improve the average throughput M times and decrease the average transmission slot delay M times,as compared with singlechannel TSMA when M channels are available.

  15. Calculation and Analysis of Destination Buffer for Multimedia Service in Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    ZHOU Zhong; MAO Yu-ming; JIANG Zhi-qong

    2005-01-01

    Jitter is one of the most important issues for multimedia real time services in future mobile ad hoc networks(MANET). A thorough theoretical analysis of the destination buffer for smoothing the jitter of the real time service in MANET is given. The theoretical results are applied in moderate populated ad hoc networks in our simulation, the simulation results show that by predicting and adjusting destination buffer in our way, Jitter will be alleviated in large part and this will contribute much to the quality of service (QOS) in MANET.

  16. A secure and lightweight ad-hoc routing algorithm for personal networks

    OpenAIRE

    A. Jehangir; Heemstra de Groot, S.M.

    2005-01-01

    Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services. This interest is a consequence of the widespread use of mobile devices such as laptops, mobile phones, PDAs, digital cameras, wireless headsets, etc. to carry out a variety of user-centric tasks. The PAN itself is built upon an ad-hoc network where devices trust their neighbors to route their packets. The cooperative nature of ad-hoc netwo...

  17. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  18. Centralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.;

    2010-01-01

    Disaster relief networks have to be highly adaptable and resilient. Cognitive radio enhanced ad-hoc architecture have been put forward as a candidate to enable such networks. Spectrum sensing is the cornerstone of the cognitive radio paradigm, and it has been the target of intensive research....... The main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, spectrum sensing cooperative schemes are paramount. A centralized cluster...

  19. Decentralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.;

    2010-01-01

    Disaster relief networks need to be highly adaptable and resilient in order to encompass the emergency service demands. Cognitive Radio enhanced ad-hoc architecture have been put forward as candidate to enable such networks. Spectrum sensing, the cornerstone of the Cognitive Radio paradigm, has...... been the target of intensive research, of which the main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, the use of spectrum sensing...

  20. Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-hoc Networks

    OpenAIRE

    Geetha, D; T SARIKA

    2013-01-01

    Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new ro...

  1. Novel multi-path routing scheme for UWB Ad hoc network

    Institute of Scientific and Technical Information of China (English)

    XU Ping-ping; YANG Cai-yu; SONG Shu-qing; BI Guang-guo

    2005-01-01

    The routing protocols play an important role for ad hoc networks performance. As some problems with DSR,SMR, and AMR protocols were analyzed, a new routing protocol suitable for UWB Ad hoc networks was proposed in this paper. The new routing protocol utilize an act of orientation of UWB and tries to get sufficient route information and decrease the network load caused by route discovery at the same time. Simulation results show that the routing load of the new protocol is lower and throughput is higher than that of DSR. While the node's mobility increases, these advantages become more obvious.

  2. 移动Ad Hoc网络技术的分析%Analysis of mobile Ad Hoc Networks technology

    Institute of Scientific and Technical Information of China (English)

    刘巧平; 王建望

    2014-01-01

    移动Ad Hoc网络,它是Mobile Ad Hoc Networks的简称,它不会受到空间与时间的制约,更加快捷和方便,不但能够在危险环境、远距离、战场、会议和救援等环境当中应用,而且还能够扩展末端网络,它的应用具有普遍性。为此,本文论述了移动Ad Hoc网络的基本概念和特点,接着分析了移动Ad Hoc网络设计面临的挑战,最后讨论了它的应用。%It would not be space and time constraints,more efficient and convenient,not only in hazardous environments,remote battlefield,conferences and rescue environment in which applications,but also to extend the end of the network,its application is universal.Therefore,this article discusses the basic concepts and features of Mobile Ad Hoc Networks,and then analyzes the challenges faced by mobile Ad Hoc network design, it is best to discuss its applications.

  3. Performance Evaluation of Distributed Synchronous Greedy Graph Coloring Algorithms on Wireless Ad Hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Esra Ruzgar

    2013-04-01

    Full Text Available Graph coloring is a widely used technique for allocation of time and frequency slots to nodes, for formingclusters, for constructing independent sets and dominating sets on wireless ad hoc and sensor networks. Agood coloring approach should produce low color count as possible. Besides, since the nodes of a wirelessad hoc and sensor network operate with limited bandwidth, energy and computing resources, the coloringshould be computed with few message passing and computational steps. In this paper, we provide aperformance evaluation of distributed synchronous greedy graph coloring algorithms on ad hoc and sensornetworks. We provide both theoretical and practical evaluations of distributed largest first and thedistributed version of Brelaz’s algorithm. We showed that although distributed version of Brelaz’salgorithm produces less color count, its resource consumption is worse than distributed largest firstalgorithm.

  4. Collision Avoidance Using Inter-Vehicle Ad-hoc Communication

    Directory of Open Access Journals (Sweden)

    Mahesh Panjwani

    2013-04-01

    Full Text Available The automobile industry is experiencing an exponential rise indemand, but its sustainability is an issue due to the dynamicnature of the market and environmental conditions. This paperdeals with the development of a system dynamic model tosimulate Indian automobile market dynamics. The focus of thepaper is to study the influence of three major dynamic factorsviz., accidents, ease of use, durability. The model has been usedto simulate the influence of these dynamic factors for a quarterof a century. As sustainability of the automobile industry isdependent to a great extent on these factors, the study resultprojects the future scenario. The result obtained would providesignificant leads to the manufacturers of automobile andinfrastructure providers, as it studies the cumulative effect of thecritical factors. Even though the result is at the project level, theconcept can be extended further, to provide efficient way forautomotive control.Automotive engine control systems must satisfy diverse andoften conflicting requirements. These include regulating to meetincreasingly stringent standards without sacrificing gooddrivability to satisfy customer desires and to comply withregulations and delivering these performance objectives at lowcost with the minimum set of sensors and actuators. Thedramatic evolution in vehicle electronic control systems over thepast two decades is substantially in response to theserequirements. It is the capacity and flexibility of microprocessorbased digital control systems, introduced in 1970’s to addressthe problem of automotive control which have resulted in theimproved function and added convenience, safety andperformance features that distinguish the modern automobile.

  5. A Layer-Cluster Key Agreement Protocol for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Li-ping; CUI Guo-hua; LEI Jian-yun; XU Jing-fang; LU She-jie

    2008-01-01

    Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoc networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols.

  6. Neuroprotection as initial therapy in acute stroke - Third report of an Ad Hoc Consensus Group Meeting

    NARCIS (Netherlands)

    Bogousslavsky, J; De Keyser, J; Diener, HC; Fieschi, C; Hacke, W; Kaste, M; Orgogozo, JM; Pulsinelli, W; Wahlgren, NG

    1998-01-01

    Although a considerable body of scientific data is now available on neuroprotection in acute ischaemic stroke, this field is not yet established in clinical practice. At its third meeting, the European Ad Hoc Consensus Group considered the potential for neuroprotection in acute stroke and the practi

  7. The impact of interference on optimal multi-path routing in ad hoc networks

    NARCIS (Netherlands)

    Haan, de R.; Boucherie, R.J.; Ommeren, van J.C.W.

    2007-01-01

    We develop a queueing model characterizing explicitly the impact of interference on end-to-end performance measures such as throughput in ad hoc networks, emphasizing the performance trade-off between single-path and multi-path routing. It may seem attractive to employ multi-path routing, but as all

  8. Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Manu Sood

    2012-10-01

    Full Text Available It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature,dynamically changing topology, lack of infrastructure and central management. A particular harmfulattack that takes the advantage of these characteristics is the Sybil attack, in which a malicious nodeillegitimately claims multiple identities. This attack can exceedingly disrupt various operations of themobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehaviordetection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybilattack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to theserouting protocols, we show in this paper that the Sybil attack can also disrupt the head selectionmechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for thefirst time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, weillustrate to have introduced a category of Sybil attack in which the malicious node varies itstransmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose ofcommunication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmissionpower makes the Sybil attack more deadly and difficult to be detected.

  9. A Multicast Routing Mechanism in Mobile Ad Hoc Network Through Label Switching

    Directory of Open Access Journals (Sweden)

    Li MengYang

    2011-10-01

    Full Text Available Merging MPLS into multicast routing protocol in Mobile Ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast Routing Protocol (LSMRP is presented in this paper.

  10. Knowledge dating and knowledge sharing in ad-hoc transient communities

    NARCIS (Netherlands)

    Kester, Liesbeth; Sloep, Peter

    2009-01-01

    The original publication is available from www.springerlink.com. Kester, L., & Sloep, P. B. (2009). Knowledge dating and knowledge sharing in ad-hoc transient communities. In R. Koper (Ed.), Learning Network Services for Professional Development (pp. 43-56). Berlin, Germany: Springer Verlag.

  11. Ad-hoc transient communities in Learning Networks Connecting and supporting the learner

    NARCIS (Netherlands)

    Brouns, Francis

    2009-01-01

    Brouns, F. (2009). Ad-hoc transient communities in Learning Networks Connecting and supporting the learner. Presentation given for Korean delegation of Chonnam National University and Dankook University (researchers dr. Jeeheon Ryu and dr. Minjeong Kim and a Group of PhD and Master students). August

  12. Fostering Sociability in Learning Networks through Ad-Hoc Transient Communities

    NARCIS (Netherlands)

    Sloep, Peter

    2008-01-01

    Sloep, P. B. (2009). Fostering Sociability in Learning Networks through Ad-Hoc Transient Communities. In M. Purvis & B. T. R. Savarimuthu (Eds.), Computer-Mediated Social Networking. First International Conference, ICCMSN 2008, LNAI 5322 (pp. 62-75). Heidelberg, Germany: Springer. June, 11-13, 2008,

  13. On the Geometrical Characteristics of Three-Dimensional Wireless Ad Hoc Networks and Their Applications

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available In a wireless ad hoc network, messages are transmitted, received, and forwarded in a finite geometrical region and the transmission of messages is highly dependent on the locations of the nodes. Therefore the study of geometrical relationship between nodes in wireless ad hoc networks is of fundamental importance in the network architecture design and performance evaluation. However, most previous works concentrated on the networks deployed in the two-dimensional region or in the infinite three-dimensional space, while in many cases wireless ad hoc networks are deployed in the finite three-dimensional space. In this paper, we analyze the geometrical characteristics of the three-dimensional wireless ad hoc network in a finite space in the framework of random graph and deduce an expression to calculate the distance probability distribution between network nodes that are independently and uniformly distributed in a finite cuboid space. Based on the theoretical result, we present some meaningful results on the finite three-dimensional network performance, including the node degree and the max-flow capacity. Furthermore, we investigate some approximation properties of the distance probability distribution function derived in the paper.

  14. A survey of message diffusion portocols in mobile ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, A.M.; Ibrahim, M.; Simon, V.; Varga, E.; Carreras, I.

    2008-01-01

    For the last twenty years, mobile communications have experienced an explosive growth. In particular, one area of mobile communication, the Mobile Ad hoc Networks (MANETs), has attracted significant attention due to its multiple applications and its challenging research problems. On the other hand,

  15. Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme

    Institute of Scientific and Technical Information of China (English)

    Yueh-Min Huang; Hua-Yi Lin; Tzone-I Wang

    2006-01-01

    Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide on-line access to a trusted authority server. Therefore,applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities.This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed.The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.

  16. Context discovery using attenuated Bloom filters in ad-hoc networks

    NARCIS (Netherlands)

    Liu, Fei; Heijenk, Geert

    2007-01-01

    A novel approach to performing context discovery in ad-hoc networks based on the use of attenuated Bloom filters is proposed in this paper. A Bloom filter is an efficient spacesaving data structure to represent context information. Attenuated Bloom filters are used to advertise the availability of c

  17. Incentive-based control of ad hoc networks: a performance study

    NARCIS (Netherlands)

    Göbel, F.; Kresinski, A.E.; Mandjes, M.R.H.

    2009-01-01

    Ad hoc networks are self-configuring networks of mobile nodes, connected by wireless links. If a destination node is beyond the transmission range of an origin node, then the nodes must cooperate to provide a multi-hop route. Any node can act as a sender, receiver or transit node. It is clear that i

  18. BLESSED with opportunistic beacons: a lightweight data dissemination model for smart mobile ad-hoc networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a ubiq

  19. Bridging Context Management Systems in the ad hoc and mobile environments

    NARCIS (Netherlands)

    Pawar, Pravin; Boros, Hanga; Liu, Fei; Heijenk, Geert; Beijnum, van Bert-Jan

    2009-01-01

    The pervasive computing world in which the context-aware applications are aimed at is constituted of multiple network environments, e.g. ad hoc, mobile and fixed. There exist specialized Context Management Systems (CMSs) addressing context management needs of every network environment and the existe

  20. Performance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Nain, Philippe; Altman, Eitan

    2006-01-01

    Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay nodes are assumed to have a limited lifetime in the network. All nodes are moving inside a bounded region according to some ra

  1. Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

    Directory of Open Access Journals (Sweden)

    Marimuthu Murugesan

    2011-01-01

    Full Text Available Problem statement: Network wide broadcasting is a fundamental operation in ad hoc networks. In broadcasting, a source node sends a message to all the other nodes in the network. Unlike in a wired network, a packet transmitted by a node in ad hoc wireless network can reach all neighbors. Therefore, the total number of transmissions (Forwarding nodes used as the cost criterion for broadcasting. Approach: This study proposes a reliable and efficient broadcasting algorithm using minimized forward node list algorithm which uses 2-hop neighborhood information more effectively to reduce redundant transmissions in asymmetric Mobile Ad hoc networks that guarantees full delivery. Among the 1-hop neighbors of the sender, only selected forwarding nodes retransmit the broadcast message. Forwarding nodes are selected such a way that to cover the uncovered 2-hop neighbors. Results: Simulation results show that the proposed broadcasting algorithm provides high delivery ratio, low broadcast forward ratio, low overhead and minimized delay. Conclusion: In this study, reliable and efficient broadcasting algorithm in asymmetric Mobile Ad Hoc Networks using minimized forward node list algorithm has been proposed which provides low forward ratio, high delivery ratio while suppressing broadcast redundancy.

  2. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...

  3. Ad hoc modeling in agronomy: What have we learned in the last 15 years?

    NARCIS (Netherlands)

    Affholder, F.; Tittonell, P.A.; Corbeels, M.; Roux, S.; Motisi, N.; Tixier, P.; Wery, J.

    2012-01-01

    The “Use and Abuse of Crop Simulation Models” special issue of Agronomy Journal published in 1996 ended with the myth of the universal crop model. Sinclair and Seligman consequently recommended tailoring models to specific problems. This paper reviews the fate of the idea of such ad hoc approaches t

  4. A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, A.M.; Haan, de R.; Boucherie, R.J.; Ommeren, van J.C.W.

    2008-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-tolerant networking which exploits the mobility of the nodes by letting them operate as relays according to the store-carry-a

  5. An Economic Framework for Resource Allocation in Ad-hoc Grids

    NARCIS (Netherlands)

    Pourebrahimi , B.

    2009-01-01

    In this dissertation, we present an economic framework to study and develop different market-based mechanisms for resource allocation in an ad-hoc Grid. Such an economic framework helps to understand the impact of certain choices and explores what are the suitable mechanisms from Grid user/owner per

  6. A tandem queueing model for delay analysis in disconnected ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, A.M.; Haan, de R.; Boucherie, R.J.; Ommeren, van J.C.W.

    2007-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called opportunistic networking which exploits the mobility of the nodes by letting them operate as relays according to the store-carry-an

  7. Performance Modeling of a Bottleneck Node in an IEEE 802.11 Ad-hoc Network

    NARCIS (Netherlands)

    Berg, van den Hans; Roijers, Frank; Mandjes, Michel R.H.; Kunz, T.; Ravi, S.S.

    2006-01-01

    The IEEE 802.11 MAC protocol, often used in ad-hoc networks, has the tendency to share the capacity equally amongst the active nodes, irrespective of their loads. An inherent drawback of this fair-sharing policy is that a node that serves as a relay-node for multiple flows is likely to become a bott

  8. Performance modelieg of a bottleneck node in an IEEE 802.11 ad-hoc network

    NARCIS (Netherlands)

    Berg, J.L. van den; Mandjes, M.; Roijers, F.

    2006-01-01

    The IEEE 802.11 MAC-protocol, often used in ad-hoc networks, has the tendency to share the capacity equally amongst the active nodes, irrespective of their loads. An inherent drawback of this fair-sharing policy is that a node that serves as a relay-node for multiple flows is likely to become a bott

  9. Performance evaluation of fingerprint image processing for high Security Ad-hoc network

    Directory of Open Access Journals (Sweden)

    P.Velayutham

    2010-06-01

    Full Text Available With the rapid development of wireless technology, various mobile devices have been developed for military and civilian applications. Defense research and development has shown increasing interest in ad-hoc networks because a military has to be mobile peer-to-peer is a good architecture for mobile communication in coalition operations. In this paper, the methodology proposed is an novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireless networks. This is a difficult problem in ad-hoc network, as it involves bootstrapping trust between the devices. This journal would present a solution, which provides fingerprint authentication techniques to share their communication in ad-hoc network. In this approach, devices exchange a corresponding fingerprint with master device for mutual communication, which will then allow them to complete an authenticated key exchange protocol over the wireless link. The solution based on authenticating user fingerprint through the master device, and this master device handshakes with the corresponding slave device for authenticating the fingerprint all attacks on the wireless link, and directly captures the user's device that was proposed to talk to a particular unknown device mentioned previously in their physical proximity. The system is implemented in C# and the user node for a variety of different devices with Matlab.

  10. Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

    Directory of Open Access Journals (Sweden)

    Kumar Roshan

    2012-06-01

    Full Text Available Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.

  11. Design of a Smart Antenna for Mobile Ad Hoc Network Applications

    OpenAIRE

    Marco Di Filippo; Leonardo Lucci; Dania Marabissi; Stefano Selleri

    2015-01-01

    Among the mobile ad hoc networks appealing characteristics there are network reconfigurability and flexibility. In this context a smart antenna capable of self-configuring multiple high-directivity beams provides a major advantage in terms of power saving, increased range, and spatial reuse of channels. In this paper a smart antenna made of a cylindrical array of patches suitable for MANETs is presented.

  12. Abiding Geocast for Warning Message Dissemination in Vehicular Ad Hoc Networks

    NARCIS (Netherlands)

    Yu, Qiangyuan; Heijenk, Geert

    2008-01-01

    Vehicular ad hoc networks (VANETs) are emerging as a new network environment for intelligent transportation systems (ITS). In many applications envisaged for VANETs, traffic information needs to be disseminated to a group of relevant vehicles and maintained for a duration of time. Here a system of a

  13. A QoS Based MAC Protocol For Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Vandana khare

    2011-03-01

    Full Text Available Multimedia communication over wireless Ad-hoc networks has become the drivingtechnology for many of the important applications, experiencing dramatic market growth and promisingrevolutionary experiences in personal communication, gaming, entertainment, military, security,environment monitoring, and more. The advances in wireless communications and growth of real-timeapplications have necessitated the development of wireless networks that can support high Quality ofService (QoS and power control. A node in an ad hoc network is normally battery operated which posesa huge constraint on the power consumption of such a node. Hence, designing a power efficient MACprotocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA basedpower controlled medium access protocol for mobile and ad hoc network (MNA. The protocol conservespower and provides QoS guarantees for multimedia traffics. In that network one of the fundamentalchallenger in MANETs is how to increase the overall network throughputs well as reading the delaywhile maintaining how energy consumption for packet processing in communication. simulation resultsshows that the performance of the protocol with increase in traffic while QoS is better in terms of Energyconsumption, throughput, & communication delay than existing protocol.

  14. Enhancing the Social Capital of Learning Communities by Using an Ad Hoc Transient Communities Service

    NARCIS (Netherlands)

    Fetter, Sibren

    2009-01-01

    Fetter, S. (2009). Enhancing the Social Capital of Learning Communities by Using an Ad Hoc Transient Communities Service. Presentation at the 8th International Conference Advances in Web based Learning - ICWL 2009. August, 19-21, 2009, Aachen, Germany: RWTH Aachen University.

  15. Improving the Usability of OCL as an Ad-hoc Model Querying Language

    DEFF Research Database (Denmark)

    Störrle, Harald

    2013-01-01

    from our research and make it accessible to the OCL community, we propose the OCL Query API (OQAPI), a library of query-predicates to improve the user-friendliness of OCL for ad-hoc querying. The usability of OQAPI is studied using controlled experiments. We nd considerable evidence to support our...

  16. Cluster head Election for CGSR Routing Protocol Using Fuzzy Logic Controller for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    K. Venkata Subbaiah

    2010-01-01

    Full Text Available The nodes in the mobile ad hoc networks act as router and host, the routing protocol is the primary issue and has to be supported before any applications can be deployed for mobile ad hoc networks. In recent many research protocols are proposed for finding an efficient route between the nodes. But most of the protocol’s that uses conventional techniques in routing; CBRP is a routing protocol that has a hierarchical-based design. This protocol divides the network area into several smaller areas called cluster. We propose a fuzzy logic based cluster head election using energy concept forcluster head routing protocol in MANET’S. Selecting an appropriate cluster head can save power for the whole mobile ad hoc network. Generally, Cluster Head election for mobile ad hoc network is based on the distance to the centroid of a cluster, and the closest one is elected as the cluster head'; or pick a node with the maximum battery capacity as the cluster head. In this paper, we present a cluster head election scheme using fuzzy logic system (FLS for mobile ad hoc networks. Three descriptors are used: distance of a node to the cluster centroid, its remaining battery capacity, and its degree of mobility. The linguistic knowledge of cluster head election based on these three descriptors is obtained from a group of network experts. 27 FLS rules are set up based on the linguistic knowledge. The output of the FLS provides a cluster head possibility, and node with the highest possibility is elected as the cluster head. The performance of fuzzy cluster head selection is evaluated using simulation, and is compared to LEACH protocol with out fuzzy cluster head election procedures and showed the proposed work is efficient than the previous one.

  17. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    Science.gov (United States)

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  18. A Globally Accessible List (GAL Based Recovery Concept In Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    A.K.Daniel,

    2011-04-01

    Full Text Available A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network.However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Modern communication network is becoming increasing & diverse. This is the consequence of an increasing array of devices & services both wired & wireless. There are various protocols to facilitate communication in ad hoc network like DSR and TORA. However these approaches end up in the inefficient utilization of resources after link failure and congestion. This paper proposes an approach to get over this problem .We have added some static nodes which only keeps information related to the current working path and also helps in quick recovery in case of link failure .

  19. 基于Ad hoc网络监控系统研究%Study of monitoring system based on Ad hoc network

    Institute of Scientific and Technical Information of China (English)

    詹旭; 杜玲艳; 雷跃荣; 陈健陵

    2012-01-01

    In view of the safety of Ad hoc network and the study of Ad hoc network,a monitoring system based on Ad hoc network was designed.Also the evaluation method of network node trust value was proposed,which can effectively prevent the malicious node and ensure the security of Ad hoc network.%针对Ad hoc网络安全问题研究Ad hoc网络,设计一个Ad hoc网络监控系统,同时提出一种对入网节点进行信任值评估的方法,能有效地防止恶意节点出现,确保Ad hoc网络安全.

  20. Analysis of AODV and DSR in Presence of Wormhole Attack in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    VIVEK SHARMA,

    2010-11-01

    Full Text Available An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe security attack in ad hocnetworks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits at one location in the network, tunnels them (possiblyselectively to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and locationbased wireless security systems. This paper analyses the performance of AODV and DSR routing protocols with and without wormhole attack. This would be a great help for the people conducting research on real world problems in MANET security.

  1. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  2. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  3. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  4. 基于 MIMO 技术和“双环”技术的 Ad Hoc 网络路由协议%Ad Hoc network routing protocol based on MIMO technology and double loop technology

    Institute of Scientific and Technical Information of China (English)

    李艳霞

    2014-01-01

    According to the drawbacks of previous Ad Hoc network , this paper puts forward Ad Hoc network routing protocol based on MIMO technology and double loop technology .Under the support of MIMO technology and double loop technology , the new Ad Hoc net-work routing protocol adopts diversity link and reuse link to give play to the advantage of DZR protocol and ZRP protocol .With OPNET simulation as the platform, it is optimized.%针对以往的 Ad Hoc 网络的缺陷,提出了一种基于 MIMO 技术和“双环”技术的 Ad Hoc 网络路由协议方案。在MIMO 技术、“双环”技术的支持下,新的 Ad Hoc 网络路由协议中采用了分集链路与复用链路,发挥了 DZR 协议与 ZRP协议的优势,以 OPNET 仿真工具为平台,从而实现了新 Ad Hoc 网络路由协议的最优化。

  5. LAR VS DSR: EVALUATION OF AD HOC NETWORK PROTOCOLS IN PRACTICAL MANAGEMENT OF COMMUNICATION OF ROBOTS

    Directory of Open Access Journals (Sweden)

    HANIEH MOVAHEDI

    2014-12-01

    Full Text Available Controlling and managing of robots and their information communication to each other is an important issue, and wireless technologies without infrastructure like Ad hoc networks due to their quick trigger and cost slightness can play efficiently. Various protocols have been used in this field and in the recent study, two famous Ad hoc network protocols have been simulated for 4 km2 work areas with changes of the same elements in types of robots like speed, pause time, number of nodes, important parameters that show network optimization rate and include PDR, Throughput, End-To-End Delay by using simulation in GloMoSim software. In this research, for suitable protocols in every time, output has been calculated by making the same chance and then, obtained information was investigated statistically. In total, LAR protocol was recognized that had higher scores than DSR and could be used as an optimum protocol in robotic industries, technically.

  6. Topology-aware peer-to-peer overlay network for Ad-hoc

    Institute of Scientific and Technical Information of China (English)

    WANG Shi-guo; JI Hong; LI Ting; MEI Jing-qing

    2009-01-01

    The mismatch between the structured peer-to-peer (P2P) overlay network, which is based on Hashing, and the actual physical network, leads to query repeatedly passing through some nodes in the actual route when it is applied in Ad-hoc networks. An approach of getting an appropriate node identifier (ID) bearing its local physical information is proposed, in which the traditional theory of getting node ID through Hashing the node's Internet protocol (IP) address is abandoned, and a topology-aware overlay network suiting Ad-hoc networks is constructed. The simulation results show that the overlay network constructed in the proposed method can avoid the route being iteratively accessed. Meanwhile, it can effectively minimize the latency and improve the load balance.

  7. Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks

    CERN Document Server

    Mehta, Neil; Wang, Wenye

    2011-01-01

    Mobile ad hoc networks (MANETs) are self-configuring wireless networks that lack permanent infrastructure and are formed among mobile nodes on demand. Rapid node mobility results in dramatic channel variation, or fading, that degrades MANET performance. Employing channel state information (CSI) at the transmitter can improve the throughput of routing and medium access control (MAC) protocols for mobile ad hoc networks. Several routing algorithms in the literature explicitly incorporate the fading signal strength into the routing metric, thus selecting the routes with strong channel conditions. While these studies show that adaptation to the time-variant channel gain is beneficial in MANETs, they do not address the effect of the outdated fading CSI at the transmitter. For realistic mobile node speeds, the channel gain is rapidly varying, and becomes quickly outdated due the feedback delay. We analyze the link throughput of joint rate adaptation and adaptive relay selection in the presence of imperfect CSI. Mor...

  8. Impact of Rushing attack on Multicast in Mobile Ad Hoc Network

    CERN Document Server

    Palanisamy, V

    2009-01-01

    A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multihop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients. The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers. At that time of multicasting, mobile ad hoc network are unprotected by the attacks of malicious nodes because of vulnerabilities of routing protocols. Some of the attacks are Rushing attack, Blackhole attack, Sybil attack, Neighbor attack ...

  9. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    CERN Document Server

    Nath, Rajender

    2011-01-01

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks- wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  10. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks.

    Science.gov (United States)

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  11. PERFORMANCE EVALUATION OF WORMHOLE SECURITY APPROACHES FOR AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Ismail Hababeh

    2013-01-01

    Full Text Available Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.

  12. A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Balamuralidhar, P; G., Harihara S; Reddy, Harish

    2011-01-01

    In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative an...

  13. The Ad Hoc process to strengthen the framework convention on climate change

    Energy Technology Data Exchange (ETDEWEB)

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A. [eds.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  14. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  15. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    Science.gov (United States)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  16. Global Consistency Management Methods Based on Escrow Approaches in Mobile ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Takahiro Hara

    2010-01-01

    Full Text Available In a mobile ad hoc network, consistency management of data operations on replicas is a crucial issue for system performance. In our previous work, we classified several primitive consistency levels according to the requirements from applications and provided protocols to realize them. In this paper, we assume special types of applications in which the instances of each data item can be partitioned and propose two consistency management protocols which are combinations of an escrow method and our previously proposed protocols. We also report simulation results to investigate the characteristics of these protocols in a mobile ad hoc network. From the simulation results, we confirm that the protocols proposed in this paper drastically improve data availability and reduce the traffic for data operations while maintaining the global consistency in the entire network.

  17. Provably Secure Certificate-based Signature Scheme for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zhimin Li

    2012-11-01

    Full Text Available Certificate-based cryptography proposed by Gentry in Eurocrypt 2003 combines the advantages of traditional public key cryptography (PKI and identity-based cryptography, and removes the certificate management problem and the private key escrow security concern. Based on computational Diffie-Hellman assumption, a certificate-based signature scheme is constructed to insure the security of communication in mobile Ad hoc networks,. The security of the scheme is proved under the Random Oracle Model. The scheme is also efficient, since the signing algorithm does not need the computation of the bilinear pairing and the verification algorithm needs that computation only once. Thus it is particularly useful in Ad hoc networks.

  18. Survey on Simulation for Mobile Ad-Hoc Communication for Disaster Scenarios

    Institute of Scientific and Technical Information of China (English)

    Erika Rosas; Nicolas Hidalgo; Veronica Gil-Costa; Carolina Bonacic; Mauricio Marin; Hermes Senger; Luciana Arantes; Cesar Marcondes; Olivier Marin

    2016-01-01

    Mobile ad-hoc communication is a demonstrated solution to mitigate the impact of infrastructure failures during large-scale disasters. A very complex issue in this domain is the design validation of software applications that support decision-making and communication during natural disasters. Such disasters are irreproducible, highly unpredictable, and impossible to scale down, and thus extensive assessments cannot be led in situ. In this context, simulation constitutes the best approach towards the testing of software solutions for natural disaster responses. The present survey reviews mobility models, ad-hoc network architectures, routing protocols and network simulators. Our aim is to provide guidelines for software developers with regards to the performance evaluation of their applications by means of simulation.

  19. Relay movement control for maintaining connectivity in aeronautical ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    李杰; 孙志强; 师博浩; 宫二玲; 谢红卫

    2016-01-01

    As a new sort of mobile ad hoc network (MANET), aeronautical ad hoc network (AANET) has fleet-moving airborne nodes (ANs) and suffers from frequent network partitioning due to the rapid-changing topology. In this work, the additional relay nodes (RNs) is employed to repair the network and maintain connectivity in AANET. As ANs move, RNs need to move as well in order to re-establish the topology as quickly as possible. The network model and problem definition are firstly given, and then an online approach for RNs’ movement control is presented to make ANs achieve certain connectivity requirement during run time. By defining the minimum cost feasible moving matrix (MCFM), a fast algorithm is proposed for RNs’ movement control problem. Simulations demonstrate that the proposed algorithm outperforms other control approaches in the highly-dynamic environment and is of great potential to be applied in AANET.

  20. A Distributed Virtual Backbone Formation for Wireless Ad Hoc and Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    CAO Yong-tao; HE Chen; JIANG Ling-ge

    2007-01-01

    The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.

  1. Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part II: Proactive Schemes

    CERN Document Server

    Munari, Andrea; Zorzi, Michele

    2012-01-01

    This work is the second of a two-part series of papers on the effectiveness of cooperative techniques in non-centralized carrier sense-based ad hoc wireless networks. While Part I extensively discussed reactive cooperation, characterized by relayed transmissions triggered by failure events at the intended receiver, Part II investigates in depth proactive solutions, in which the source of a packet exploits channel state information to preemptively coordinate with relays in order to achieve the optimal overall rate to the destination. In particular, this work shows by means of both analysis and simulation that the performance of reactive cooperation is reduced by the intrinsic nature of the considered medium access policy, which biases the distribution of the available relays, locating them in unfavorable positions for rate optimization. Moreover, the highly dynamic nature of interference that characterizes non-infrastructured ad hoc networks is proved to hamper the efficacy and the reliability of preemptively ...

  2. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    International Nuclear Information System (INIS)

    We present an ad-hoc 'nearby' storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  3. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Politis, Christos; 10.5121/ijwmn.2010.2205

    2010-01-01

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency workers with intelligent devices such as smart phones and PDAs. This technology allows communication "islets" to be established between the members of the same or different emergency teams (policemen, firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed for the purposes of eMANETs. We evaluate the performance of the protocol by comparing it with other widely used routing protocols for MANETs. We finally show that the overhead introduced due to security considerations is affordable to support secure ad-hoc communications among lightweight devices.

  4. A Noise-Correlated Cancellation Transmission Scheme for Cooperative MIMO Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wanni Liu

    2014-04-01

    Full Text Available A new transmission scheme based on noise-correlated cancellation (NCC is proposed, which absorbs the advantages of phase-inversion symmetric method and cooperative MIMO technology and makes full use of the correlation of noise in the adjacent channels to reduce channel noise. This paper firstly presents the implementation process of NCC transmission scheme in detail. Further, through theoretical analysis, it is showed that the signal-to-noise ratio gain which the proposed NCC transmission scheme gets is at least 4 times greater than the signal-to-noise ratio gain which the traditional cooperative MIMO transmission scheme gets. Finally, simulation experiment results also verify that the proposed NCC transmission scheme can make the channel capacity per bandwidth of cooperative MIMO Ad Hoc networks improve significantly and bit error rate (BER of the network reduce greatly, which will help to expand application scopes of cooperative MIMO Ad Hoc networks.

  5. Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Tamaghna Acharya

    2010-05-01

    Full Text Available For stationary wireless ad hoc networks, one of the key challenging issues in routing and multicasting isto conserve as much energy as possible without compromising path efficiency measured as end-to-enddelay. In this paper, we address the problem of path efficient and energy aware multicasting in staticwireless ad hoc networks. We propose a novel distributed scalable algorithm for finding a virtualmulticast backbone (VMB. Based on this VMB, we have further developed a multicasting scheme thatjointly improves path efficiency and energy conservation. By exploiting inherent broadcast advantage ofwireless communication and employing a more realistic energy consumption model for wirelesscommunication which not only depends on radio propagation losses but also on energy losses intransceiver circuitry, our simulation results show that the proposed VMB-based multicasting schemeoutperforms existing prominent tree based energy conserving, path efficient multicasting schemes.

  6. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Rajender Nath

    2010-11-01

    Full Text Available Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  7. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  8. Efficient Optimal Packet Management in Distributed Wireless Ad-Hoc Environment using DST

    Directory of Open Access Journals (Sweden)

    J. Amudhavel,

    2010-06-01

    Full Text Available Effective Packet Management (PM is widely used in distributed wireless environments to reduce the access costs and improve data availability. Therefore, packet transmission in wireless environment becomes one of the important challenges for effective data transfer and maintaining the reliability of data . This paper addresses theissues in maintaining the effective packet management in the wireless ad hoc network environments and proposes an effective solution for the same using an optimization technique. The proposed approach concentrates on effective packet management in the dynamic environment and maintaining local consistency issues which occur in the Distributed Wireless Ad-Hoc network environment. Therefore, this paper evaluates the efficiency of existing techniques, and proposes a more efficient local packet management algorithm. The new algorithm leverages existing techniques which are shown to be efficient. This paper also addresses the advantages and disadvantages of various packet management and its issues.

  9. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Jaime Lloret; Miguel Garcia; Jesus Tomás; Fernando Boronat

    2008-01-01

    Grouping nodes gives better performance to the whole network by diminishing the average network delay and avoiding unnecessary message for warding and additional overhead. Many routing protocols for ad-hoc and sensor network shave been designed but none of them are based on groups. In this paper, we will start defining group-based topologies,and then we will show how some wireless ad hoc sensor networks (WAHSN) routing protocols perform when the nodes are arranged in groups. In our proposal connections between groups are established as a function of the proximity of the nodes and the neighbor's available capacity (based on the node's energy). We describe the architecture proposal, the messages that are needed for the proper operation and its mathematical description. We have also simulated how much time is needed to propagate information between groups. Finally, we will show a comparison with other architectures.

  10. Implement DUMBO as a Network Based on Mobile Ad hoc Network (MANETs

    Directory of Open Access Journals (Sweden)

    2011-10-01

    Full Text Available Nowadays there are a large variety of wireless access networks. One of these networksis Digital Ubiquitous Mobile Broadband OLSR (DUMBO which has been stronglymotivated by the fact that large scale natural disasters can wipe out terrestrialcommunication infrastructure. DUMBO routers can automatically form one or more selfconfiguring,self-healing networks called Mobile Ad hoc Networks (MANET. VehicleAd hoc Network (VANETs is an advanced version of MANETs. VANETs is offered tobe used by network service providers for managing connection to get a high performanceat real time, high bandwidth and high availability in networks such as WLAN, UMTS,Wi-MAX and etc. In this paper surveying DUMBONET Routers with relevant algorithm,approaches and solutions from the literature, will be consider.

  11. Load Balancing In Wireless Ad-Hoc Networks With Low Forwarding Index

    Directory of Open Access Journals (Sweden)

    Reena Dadhich

    2011-02-01

    Full Text Available A wireless ad-hoc network comprises of a set of wireless nodes and requires no fixed infrastructure. Forefficient communication between nodes, ad-hoc networks are typically grouped in to clusters, whereeach cluster has a clusterhead (or Master. In our study, we will take a communication model that isderived from that of BlueTooth. Clusterhead nodes are responsible for the formation of clusters eachconsisting of a number of nodes (analog to cells in a cellular network and maintenance of the topologyof the network. Consequently, the clusterhead tend to become potential points of failures and naturally,there will be load imbalanced. Thus, it is important to consider load balancing in any clusteringalgorithm. In this paper, we consider the situation when each node has some load, given by theparameter forwarding Index.

  12. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  13. ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks

    Directory of Open Access Journals (Sweden)

    Esma Insaf Djebbar

    2010-11-01

    Full Text Available The flexibility and diversity of Wireless Mobile Networks offer many opportunities that are not alwaystaken into account by existing distributed systems. In particular, the proliferation of mobile users and theuse of mobile Ad-Hoc promote the formation of collaborative groups to share resources. We propose asolution for the management of fault tolerance in the Ad-Hoc networks, combining the functions neededto better availability of data. Our contribution takes into account the characteristics of mobile terminalsin order to reduce the consumption of resources critical that energy, and to minimize the loss ofinformation. Our solution is based on the formation of clusters, where each is managed by a node leader.This solution is mainly composed of four sub-services, namely: prediction, replication, management ofnodes in the cluster and supervision. We have shown, using several sets of simulation, that our solution istwofold: minimizing the energy consumption which increases the life of the network and better supportdeal with requests lost.

  14. An optimized node-disjoint multipath routing scheme in mobile ad hoc

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Liu, Zhiyu

    2016-02-01

    In mobile ad hoc networks (MANETs), link failures are caused frequently because of node’s mobility and use of unreliable wireless channels for data transmission. Multipath routing strategy can cope with the problem of the traffic overloads while balancing the network resource consumption. In the paper, an optimized node-disjoint multipath routing (ONMR) protocol based on ad hoc on-demand vector (AODV) is proposed to establish effective multipath to enhance the network reliability and robustness. The scheme combines the characteristics of reverse AODV (R-AODV) strategy and on-demand node-disjoint multipath routing protocol to determine available node-disjoint routes with minimum routing control overhead. Meanwhile, it adds the backup routing strategy to make the process of data salvation more efficient in case of link failure. The results obtained through various simulations show the effectiveness of the proposed scheme in terms of route availability, control overhead and packet delivery ratio.

  15. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  16. An Immuno-Inspired Approach to Misbehavior Detection in Ad Hoc Wireless Networks

    CERN Document Server

    Drozda, Martin; Schaust, Sven; Szczerbicka, Helena

    2010-01-01

    We propose and evaluate an immuno-inspired approach to misbehavior detection in ad hoc wireless networks. Node misbehavior can be the result of an intrusion, or a software or hardware failure. Our approach is motivated by co-stimulatory signals present in the Biological immune system. The results show that co-stimulation in ad hoc wireless networks can both substantially improve energy efficiency of detection and, at the same time, help achieve low false positives rates. The energy efficiency improvement is almost two orders of magnitude, if compared to misbehavior detection based on watchdogs. We provide a characterization of the trade-offs between detection approaches executed by a single node and by several nodes in cooperation. Additionally, we investigate several feature sets for misbehavior detection. These feature sets impose different requirements on the detection system, most notably from the energy efficiency point of view.

  17. Secured 7 Layer Security Architecture (S7LSA For Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Manu Srivastava

    2014-04-01

    Full Text Available Mobile Ad hoc Networks (MANET constitutes a group of wireless mobile nodes that transmit information without any centralized control. MANETs are infrastructure-less and are dynamic in nature that is why; they require peremptorily new set of networking approach to put through to provide efficacious and successful end-to-end communication. The wireless and distributed nature of MANET poses a great challenge to system security designers. Although security problems in MANET have attracted much attention in the last few years, most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response, none of the previous work proposes security solutions from a system architectural view. In this paper, we propose seven-layer security architecture for mobile ad hoc networks. A general description of functionalities in each layer is given.

  18. Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad hoc Network

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2012-01-01

    Full Text Available Problem statement: In mobile ad hoc networks, frequent mobility during the transmission of data causes route failure which results in route rediscovery. In this, we propose multipath routing protocol for effective local route recovery in Mobile Ad hoc Networks (MANET. In this protocol, each source and destination pair establishes multiple paths in the single route discovery and they are cached in their route caches. Approach: The cached routes are sorted on the basis of their bandwidth availability. In case of route failure in the primary route, a recovery node which is an overhearing neighbor, detects it and establishes a local recovery path with maximum bandwidth from its route cache. Results: By simulation results, we show that the proposed approach improves network performance. Conclusion: The proposed route recovery management technique prevents the frequent collision and degradation in the network performance.

  19. Vehicular ad hoc network for a surveillance system using multifrequency band enhancement

    Science.gov (United States)

    Bunruangses, Montree; Sunat, Khamron; Mitatha, Somsak; Yupapin, Preecha P.

    2010-09-01

    We present a new design of a surveillance system via a vehicular ad hoc network (VANET) integrated by a 3-G or 4-G cellular wireless network. We propose dense wavelength division multiplexing wavelength enhancement for increasing the channel capacity and signal security. Increase in the number of channels can be obtained by increasing the wavelength density. Signal security is introduced by a specific wavelength filter controlled by the central operator. Optical communication wavelength enhancement is reviewed. The advantage of this proposed system is that it can easily be implemented and incorporated into the existing communication link in either a cellular or ad hoc wireless system, where signal security and hence privacy can be provided.

  20. Improved Packet Forwarding Approach in Vehicular Ad Hoc Networks Using RDGR Algorithm

    CERN Document Server

    Prasanth, K; Jayasudha, K; Chandrasekar, Dr C; 10.5121/ijngn.2010.2106

    2010-01-01

    VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Position based routing protocols are becoming popular due to advancement and availability of GPS devices. One of the critical issues of VANETs are frequent path disruptions caused by high speed mobility of vehicle that leads to broken links which results in low throughput and high overhead . This paper argues the use of information on vehicles' movement information (e.g., position, direction, speed of vehicles) to predict a possible link-breakage event prior to its occurrence. So in this paper we propose a Reliable Directional Greedy routing (RDGR), a reliable position based routing approach which obtains position, speed and direction of its neighboring nodes from GPS. This approach incorporates potential score based strategy...

  1. Analysis and Proposal of Position-Based Routing Protocols for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Okada, Hiraku; Takano, Akira; Mase, Kenichi

    One of the most promising applications of a mobile ad hoc network is a vehicular ad hoc network (VANET). Each vehicle is aware of its position information by GPS or other methods, so position-based routing is a useful approach in VANET. The position-based routing protocol can be classified roughly into a next-hop forwarding method and a directed flooding method. We evaluate performance of both methods by analytic approach and compare them in this paper. From the evaluation results, we conclude that it is effective for the position-based routing to choose either the next-hop forwarding method or the directed flooding method according to the environment. Then we propose the hybrid transmission method which can select one of them according to the environment, and clarify that the proposed method can keep the packet delivery ratio at a high level and reduce the delay time.

  2. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

    CERN Document Server

    Sanyal, Sugata; Gogri, Rajat; Rathod, Punit; Dedhia, Zalak; Mody, Nirali

    2010-01-01

    In Mobile Ad Hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad Hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to over-come the attack of initiating / forwarding fake Route Requests (RREQs) that lead to hogging of network resources and hence denial of service to genuine nodes. In this paper, a proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node. Since the proposed scheme is distributed in nature it has the capability to prevent Distributed DoS (DDoS) as well. The performance of the proposed algorithm in a series of simulations reveal that the proposed scheme provides a better solution than existing approaches with no extra overhead.

  3. Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Parthiban

    2012-04-01

    Full Text Available In Mobile Ad-Hoc Networks (MANETs, security is one of the most important concerns because a MANETs system is much more vulnerable to attacks than a wired or infrastructure-based wireless network. Designing an effective security protocol for MANET is a very challenging task. This is mainlydue to the unique characteristics of MANETs, namely shared broadcast radio channel, insecure operatingenvironment, lack of central authority, lack of association among users, limited availability of resources, and physical vulnerability. In this paper we present simulation based study of the impact of neighbor attack on mesh-based Mobile Ad-Hoc Network (MANET. And also we study the number of attackers and position affects the performance metrics such as packet delivery ratio and throughput. The study enables us to propose a secure neighbor detection mechanism (SNDM. A generic detection mechanism against neighbor attack for On Demand Routing Protocols is simulated on GlomoSim environment.

  4. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-05-01

    Full Text Available The nature of Mobile Ad hoc NETworks (MANETs makes them suitable to be utilized in the context of anextreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs inorder to describe next generation IP-based networks, which are deployed in emergency cases such asforest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergencyworkers with intelligent devices such as smart phones and PDAs. This technology allows communication”islets” to be established between the members of the same or different emergency teams (policemen,firemen, paramedics. In this article, we discuss an adaptive and secure routing protocol developed forthe purposes of eMANETs. We evaluate the performance of the protocol by comparing it with otherwidely used routing protocols for MANETs. We finally show that the overhead introduced due to securityconsiderations is affordable to support secure ad-hoc communications among lightweight devices.

  5. SECURITY IN VEHICULAR AD HOC NETWORK BASED ON INTRUSION DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    Omkar Pattnaik

    2014-01-01

    Full Text Available Implementation of mobile ad hoc networks has eventually captured practically most of the parts of day-to-day life. One variation of such networks represents the Vehicular Ad Hoc Networks (VANETs, widely implemented in order to control day-to-day road traffic. The major concern of VANETs is oriented around providing security to moving vehicles that makes it possible to reduce accidents and traffic jam and moreover to establish communication among different vehicles. In this study, we analyze a number of possible attacks that may pertain to VANETs. Intrusion detection imposes various challenges to efficient implementation of VANETs. To overcome it, several intrusion detection measures have been proposed. The Watchdog technique is one of them. We detail this technique so as to make it convenient to implement it in our future investigations.

  6. SURVEY ON MOBILE AD HOC NETWORK ATTACKS AND MITIGATION USING ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    S. P. Manikandan

    2012-01-01

    Full Text Available Mobile Ad hoc Networks (MANET due to its unpredictable topology and bandwidth limitations are vulnerable to attacks. Establishing security measures and finding secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node authentication, insider attack and intrusion detection. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitigate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modification of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection. This study studied various approaches to predict and mitigate attacks in MANET."

  7. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  8. Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning

    Directory of Open Access Journals (Sweden)

    S.Sivagurunathan

    2016-05-01

    Full Text Available Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium, multi-hop and dynamic nature, constrained resources, lack of administration and cooperation. Traditionally routing protocols are designed to cope with routing operation but in practice they may be affected by misbehaving nodes so that they try to disturb the normal routing operations by launching different attacks with the intention to minimize or collapse the overall network performance. Therefore detecting a trusted node means ensuring authentication and securing routing can be expected. In this article we have proposed a Trust and Q-learning based Security (TQS model to detect the misbehaving nodes over Ad Hoc On Demand Distance-Vector (AODV routing protocol. Here we avoid the misbehaving nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical forwarding and responding behaviour by the way misbehaving nodes can be isolated.

  9. Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security

    Institute of Scientific and Technical Information of China (English)

    WANG Cui-rong; YANG Xiao-zong; GAO Yuan

    2005-01-01

    Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols.In this paper, an AODV-based secure routing protocolENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.

  10. MULTICAST ROUTING WITH QUALITY OF SERVICE CONSTRAINTS IN THE AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Abdellah Idrissi

    2014-01-01

    Full Text Available The recent multimedia applications and services are very demanding in terms of Quality of Service (QoS. This creates new challenges in ensuring QoS when delivering those services over wireless networks. Motivated by the need of supporting high quality multicast applications in wireless ad hoc networks, we propose a network topology that can minimize the power when connecting the source node to the destination nodes in multicast sessions with the respect of the QoS provisions. We formulated the problem as integer linear programming problem with a set of energy and QoS constraints. We minimize the total power of energy used by nodes while satisfying QoS constraints (Bandwidth and maximum delay that are crucial to wireless ad hoc network performance.

  11. Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Priyanshu

    2014-06-01

    Full Text Available MANET is an autonomous system of mobile nodes attached by wireless links. It represents a complex and dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into an ad-hoc network topology. The devices in the network may have limited transmission range therefore multiple hops may be needed by one node to transfer data to another node in network. This leads to the need for an effective routing protocol. In this paper we study various classifications of routing protocols and their types for wireless mobile ad-hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast Protocols. In this paper we also compare different routing protocols on based on a given set of parameters Scalability, Latency, Bandwidth, Control-overhead, Mobility impact.

  12. Multicasting along Energy—Efficient Meshes in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JIANGHai; CHENGShixin; HEYongming

    2003-01-01

    In consideration that current mesh-based multicast routing protocols for mobile ad hoc networks don't tend to form energy-efficient multicast infrastruc-ture, we propose a new Energy-efficient multicast rout-ing protocol (E2MRP) for mobile ad hoc networks. The two main characteristics of E2MRP are: (1) using in turn the criteria for minimum energy consumed per packet and minimum maximum node cost during the course of relaying group (RG) creation and maintenance; (2)forming a graph-based multicast infrastructure instead of a tree-based one. Compared to multicast incremen-tal power (MIP) and on-demand multicast routing pro-tocol (ODMRP), as the simulation results show, E2MRP tremendously reduces the energy consumption rate of nodes and hence prolongs the lifetime of nodes and net-works, especially when the size of multicast group is small and node mobility is low.

  13. Security in Mobile Ad Hoc Networks%移动Ad Hoc网络中的安全问题

    Institute of Scientific and Technical Information of China (English)

    朱晓妍

    2004-01-01

    移动自组网(Mobile Ad HoC Network)是一种无基础设施的无线网络由于它具有开放的媒质、分布式的合作、动态的拓扑结构和受限的网络能力等特点,所以特别容易受到攻击.为此文章结合移动Ad Hoc网络的特点分析了移动Ad Hoc网络面临的安全威胁,并对移动Ad Hoc网络的安全路由和安全报文传送问题进行了详细讨论.

  14. Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service

    OpenAIRE

    Zhang, Honggang; Liu, Benyuan; Susanto, Hengky; Xue, Guoliang

    2015-01-01

    We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and...

  15. Control Based Mobile Ad Hoc Networking for survivable, dynamic, mobile Special Operation Force communications

    OpenAIRE

    Masacioglu, Mustafa.; McBride, Marlon

    2009-01-01

    Approved for public release, distribution unlimited In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Significant examples include establishing survivable, efficient, dynamic mobile communication for tactical Special Operation Force (SOF) networks, as well as SOF units that are ad hoc networking with first responders conducting emergency/rescue and disaster relief operations. Such network scenarios cannot re...

  16. Impact of Malicious Nodes under Different Route Refresh Intervals in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    P. Suganthi

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co operation of nodes is a very important feature for the successful deployment of Ad hoc networks. The intermediate nodes should not only be involved in the route discovery process but also should be involved in the re transmission of packets as an intermediate between source and destination. Approach: Since nodes have to be co operative for successful deployment of Ad hoc networks, the security mechanisms cannot afforded to be stringent which enables malicious nodes to successfully attack the network. The capability of optimized link state routing protocol has been studied extensively for different types of ad hoc networks and has been proved to behave somewhere in between pro active and reactive routing protocols. Results: In this study we investigate the impact of malicious nodes on the Optimized Link State Routing (OLSR protocol under different hello intervals which affects the route discovery process and subsequently investigate the degradation of Quality Of Service (QOS. Conclusion: It is observed that the throughput deteriorates when the network is attacked by malicious nodes which selectively retransmit data to some of the destinations. The performance degradation increases as the hello interval time is set beyond 4 sec. Higher hello interval decreases the control packet overheads. It is observed that even with higher hello intervals the network performance is much better than an attack by small group of malicious nodes.

  17. A New Proposal for Route Finding in Mobile AdHoc Networks

    Directory of Open Access Journals (Sweden)

    H.Vignesh Ramamoorthy

    2013-06-01

    Full Text Available Mobile Ad hoc Network (MANET is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers (and associated hosts connected by wireless links – the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet. There are various routing protocols available for MANETs. The most popular ones are DSR, AODV and DSDV. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV and the Ad hoc On- Demand Distance Vector routing (AODV. Generally, the routing algorithms can be classified into Reactive and Proactive. A Hybrid algorithm combines the basic properties of reactive and proactive into one. The proposed approach is a novel routing pattern based on Ant Colony Optimization and Multi Agent System. This pattern integrates two different algorithms together and helps to get optimum routes for a particular radio range. The approaches used here are Ant Colony Optimization (ACO and Multi Agent System (MAS. The proposed integrated approach has a relatively short route establishment time while using a small number of control messages which makes it a scalable routing approach. The overhead of this routing approach will be inexpensive and also will enable to have an alternate route during route failure. This proposed route finding scheme in order to provide high connectivity of nodes, will minimize the route discovery latency and the end-to-end delay.

  18. Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions

    OpenAIRE

    Bilgehan Berberoglu; Taner Cevik

    2016-01-01

    Energy scarcity and interference are two important factors determining the performance of wireless ad-hoc networks that should be considered in depth. A promising method of achieving energy conservation is the transmission power control. Transmission power control also contributes to the mitigation of interference thereby promotes throughput by means of rendering multiple hosts to communicate in the same neighborhood simultaneously without impairing each other’s transmissions. However, as ide...

  19. An energy efficient adaptive HELLO algorithm for mobile ad hoc networks

    OpenAIRE

    He, Danping; Mitton, Nathalie; Simplot-Ry, David

    2013-01-01

    International audience HELLO protocol or neighborhood discovery is essential in wireless ad hoc networks. It makes the rules for nodes to claim their existence/aliveness. In the presence of node mobility, no x optimal HELLO frequency and optimal transmission range exist to maintain accurate neighborhood tables while reducing the energy consumption and bandwidth occupation. Thus a Turnover based Frequency and transmission Power Adaptation algorithm (TFPA) is presented in this paper. The met...

  20. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  1. Directory-based incentive management services for ad-hoc mobile clouds

    OpenAIRE

    Yousafzai, Abdullah; Chang, Victor; Gani, Abdullah; Noor, Rafidah Md

    2016-01-01

    Mobile cloud computing is envisioned as a promising approach to augment the computational capabilities of mobile devices for emerging resource-intensive mobile applications. This augmentation is generally achieved through the capabilities of stationary resources in cloud data centers. However, these resources are mostly not free and sometimes not available. Mobile devices are becoming powerful day by day and can form a self-organizing mobile ad-hoc network of nearby devices and offer their re...

  2. On the feasibility of utilizing smartphones for vehicular ad hoc networking

    OpenAIRE

    Vandenberghe, Wim; Moerman, Ingrid; Demeester, Piet

    2011-01-01

    Last years, a lot of research was performed focusing on cooperative road safety applications such as nearby traffic jam warning, approaching emergency vehicle warning, road obstacle warning, wrong way driver warning, etc. The high cost of the required in-vehicle systems however seems to obstruct end-user adoption. An alternative could be to utilize smartphones for vehicular ad hoc networking. From a business point of view this seems attractive because smartphones already enjoy a successful us...

  3. Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-hoc Network Environment

    OpenAIRE

    Vaishali D. Khairnar; Pradhan, Dr. S. N.

    2012-01-01

    A Vehicular Ad hoc Network (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort and entertainment. The performance of communication depends on how better routing takes place in the network. Routing data between the source and destination vehicle de...

  4. New horizons in mobile and wireless communications, v.4 ad hoc networks and pans

    CERN Document Server

    Prasad, Ramjee

    2009-01-01

    Based on cutting-edge research projects in the field, this book (part of a comprehensive 4-volume series) provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Other volumes cover Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.

  5. Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks

    OpenAIRE

    Anoopa S; Sudha S K

    2014-01-01

    Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of service at the routing or medium access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very recently these are classified in to a new group called “vampire attacks”. This thesis work explores the identification of resource depletion attacks at the r...

  6. Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

    OpenAIRE

    Denko, Mieso K.; Hua Lu

    2006-01-01

    A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this dynamic network environment. Caching and replica allocation within the network can improve data accessibility by storin...

  7. An investigation of self-organization in ad-hoc networks

    OpenAIRE

    Akl, Ahmed; Gayraud, Thierry; Berthou, Pascal

    2011-01-01

    International audience Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks technology. It is usually designed for special purpose applications. WSN has its own special characteristics that differentiate it from other types of wireless networks. These differences raise new challenges to be overcome; one of them is self-organization. As in any rising domain, it is essential to specifically define the meaning of new terminologies. The terms self-organizing an...

  8. TopX 2.0 at the {INEX} 2009 Ad-Hoc and Efficiency Tracks

    OpenAIRE

    Theobald, Martin; Aji, Ablimit; Schenkel, Ralf

    2010-01-01

    This paper presents the results of our INEX 2009 Ad-hoc and Efficiency track experiments. While our scoring model remained almost unchanged in comparison to previous years, we focused on a complete redesign of our XML indexing component with respect to the increased need for scalability that came with the new 2009 INEX Wikipedia collection, which is about 10 times larger than the previous INEX collection. TopX now supports a CAS-specific distributed index structure, wi...

  9. Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

    OpenAIRE

    Resta, Giovanni; Santi, Paolo; Simon, Janos

    2007-01-01

    Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their potential of significantly increasing the safety level on the road. In order to understand whether VANETs can actually realize this goal, in this paper we analyze the dynamics of multihop emergency message dissemination in VANETs. Under a probabilistic wireless channel model that accounts for interference, we derive lower bounds on the probability that a car at distance d from t...

  10. URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks

    OpenAIRE

    Luo, Haiyun; Kong, Jiejun; Zerfos, Petros; Lu, Songwu; Zhang, Lixia

    2004-01-01

    Restricting network access of routing and packet forwarding to well-behaving nodes and denying access from misbehaving nodes are critical for the proper functioning of a mobile ad-hoc network where cooperation among all networking nodes is usually assumed. However, the lack of a network infrastructure, the dynamics of the network topology and node membership, and the potential attacks from inside the network by malicious and/or noncooperative selfish nodes make the conventional network access...

  11. InstantSocial : social networking in mobile ad-hoc environments

    OpenAIRE

    Halvorsen, Henrik

    2009-01-01

    This report covers the research, design and prototype implementation of a social application for mobile ad-hoc networks, InstantSocial. The main goals of this project has been to look at this exciting field and examine how the European scientific collaborative project MUSIC can be used to develop such an application. The project has been conducted using a Design Science approach. First the field of interest, existing similar applications and technology was examined to get a good view of the ...

  12. Improved Performance of Bluetooth with Focus on Ad-Hoc Applications

    OpenAIRE

    Isaksson, Lennart

    2004-01-01

    The number of devices making use of Bluetooth cable-replacement technology has rapidly increased in numbers thanks to the amount of implementations in cellular telephones, Personal Digital Assistants (PDAs), etc. Instead of the point-to-point technique used today the wireless community demands more sophisticated solutions to transmit information between two devices, e.g. using a chat program within an ad-hoc network. However, Bluetooth provides neither a routing protocol, nor is the slave/sla...

  13. Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks

    OpenAIRE

    R. Murugan; Shanmugam, A.

    2012-01-01

    In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resultingin damage of other nodes. In order to establish secure communication with the group members ofa network, use of a shared group key for confidentiality and authentication is required. Distributingthe shares of secret group key to the group members securely is another challenging task inMANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authenticationscheme using threshold cryp...

  14. Cluster Based Misbehaviour Detection and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks

    OpenAIRE

    R. Murugan; Shanmugam, A.

    2012-01-01

    In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold...

  15. A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

    OpenAIRE

    R. Murugan; Shanmugam, A.

    2010-01-01

    Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for&...

  16. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    OpenAIRE

    P. Gokulakrishnan; Ganeshkumar, P.

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities...

  17. A Review of routing protocols for mobile cognitive radio ad hoc networks

    OpenAIRE

    Selvakanmani, S.; Sumathi, M.

    2012-01-01

    Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The basic idea of cognitive radio networks is that the unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band once the licensed device (p...

  18. OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADIO AD HOC NETWORKS

    OpenAIRE

    Selvakanmani, S.; Sumathi, Dr. M.

    2012-01-01

    Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The basic idea of cognitive radio networks is that the unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band once the lic...

  19. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  20. Topology Control and Routing in Mobile Ad Hoc Networks with Cognitive Radios

    OpenAIRE

    Guan, Quansheng; Yu, F. Richard; Jiang, Shengming

    2011-01-01

    Cognitive radio (CR) technology will have significant impacts on upper layer performance in mobile ad hoc networks (MANETs). In this paper, we study topology control and routing in CR-MANETs. We propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is a midware-like cross-layer module residing between CR module and routing. The proposed PCTC scheme uses cognitive link availability prediction, which is aw...

  1. Efficient and secure delivery of area-persistent safety messages in vehicular ad hoc networks

    OpenAIRE

    Güder, Can Berk; Guder, Can Berk

    2009-01-01

    In this thesis, we propose an adaptive mechanism for the delivery of safety messages in vehicular networks in an authenticated and privacy-preserving manner. The traditional approach to message delivery for driving safety applications running on vehicular ad hoc networks (VANETs) has been to increase redundancy, often at the sake of other applications running on the network. We argue that this approach does not accommodate the traffic conditions of crowded cities like İstanbul, and present a ...

  2. A joint shadowing process model for multihop/ad-hoc networks in urban environment.

    OpenAIRE

    Wang, Z.(Institute of High Energy Physics, Beijing, China); Tameh, EK; Nix, AR; Gasparini, Otello

    2004-01-01

    For multihop/Ad-hoc networks, the conventional one-dimensional (1-D) channel model cannot capture the spatial correlation of the shadowing processes. This paper investigates the joint spatial/temporal correlation property the shadowing process for peer-to-peer radio links in urban environments. Statistical analysis reveals that the shadowing process is mainly a result of the movement at the mobile station (MS) side. Furthermore, the joint correlation property of the MS-MS channel shows that M...

  3. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda, Ronald; Flechais, Ivan; Roscoe, A. W.

    2010-01-01

    Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security but potentially reduce us...

  4. Highly Dynamic Nature of Mobile AD-HOC Networks (MANETs): Requirement of Stringent Security Measures

    OpenAIRE

    P. Balagangadhar Rao

    2011-01-01

    Wireless mobile AD-HOC networks (MANETs) can be established on demand and disappear when there is no need. Each mobile node in the network acts both as a terminal and also as a router. Thus, each mobile node is having a capability of forwarding packets of information to other peer nodes. The nodes are, basically, self-organized wireless interconnecting communication devices which can either extend or operate in concert with the wired networking infrastructure. Lot of research is going on, in ...

  5. A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    YU Genjian; ZHENG Baoyu

    2006-01-01

    Firstly, a multilevel trust algorithm for MANET(mobile ad hoc networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented. Some conclusions are given at lastly.

  6. Maintains Secure Intrusion Detection System for Mobile Ad-hoc Network

    OpenAIRE

    B.Reddy Sumanth; T.Venkataramana

    2014-01-01

    Now a day’s mobile ad hoc networks (MANETs) are very popular research area. MANET is one of the mainly essential and unique applications. The mobility and scalability brought by wireless network made it possible in many applications. MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. When the nodes are both within the same communication range then they communicate directly each other. These are significant factors i...

  7. RISM -- Reputation Based Intrusion Detection System for Mobile Ad hoc Networks

    OpenAIRE

    Trivedi, Animesh Kr; Kapoor, Rishi; Arora, Rajan; Sanyal, Sudip; Sanyal, Sugata

    2013-01-01

    This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keeps them entirely locally; however, managing to communicate this vital information without accretio...

  8. Asymptotic Capacity of Wireless Ad Hoc Networks with Realistic Links under a Honey Comb Topology

    CERN Document Server

    Asnani, Himanshu

    2007-01-01

    We consider the effects of Rayleigh fading and lognormal shadowing in the physical interference model for all the successful transmissions of traffic across the network. New bounds are derived for the capacity of a given random ad hoc wireless network that reflect packet drop or capture probability of the transmission links. These bounds are based on a simplified network topology termed as honey-comb topology under a given routing and scheduling scheme.

  9. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    OpenAIRE

    Angelica Reyes-Muñoz; Mari Carmen Domingo; Marco Antonio López-Trinidad; José Luis Delgado

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of...

  10. Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks

    OpenAIRE

    Chaudhary, A.; V. N. Tiwari; Kumar, A

    2014-01-01

    Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gateway based security mechanisms cannot be applied on it. That’s why intrusion detection systems are us...

  11. HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK

    OpenAIRE

    Mohammad Saiful Islam Mamun; A.F.M. Sultanul Kabir

    2010-01-01

    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs.However, security is one of the significant challenges for sensor network because of their deploymentin open and unprotected environment. As cryptographic mechanism is not enough to protect sensornetwork from external attacks, intrusion detection system needs to be introduced. Though intrusionprevention mechanism is one of the major and efficient methods against attacks, but there might besome atta...

  12. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    OpenAIRE

    Mamun, Mohammad Saiful Islam; Kabir, A. F. M Sultanul

    2012-01-01

    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some...

  13. Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks

    OpenAIRE

    Abdelouahid Derhab; Abdelghani Bouras; Mustapha Reda Senouci; Muhammad Imran

    2014-01-01

    We investigate three aspects of dynamicity in ad hoc and wireless sensor networks and their impact on the efficiency of intrusion detection systems (IDSs). The first aspect is magnitude dynamicity, in which the IDS has to efficiently determine whether the changes occurring in the network are due to malicious behaviors or or due to normal changing of user requirements. The second aspect is nature dynamicity that occurs when a malicious node is continuously switching its behavior between normal...

  14. EC-PPRA: An Energy Efficient Routing Protocol for Ad Hoc Networks

    OpenAIRE

    Rong-sheng Dong; Yuan-chuang Hu; Jian-ming Liu

    2010-01-01

    Abstract—A promising energy conserving technique for the Ad hoc network must maintain effective packet forwarding capacity when turning off the network interface for idle nodes to reduce power consumption. This paper incorporates the energy conserving technique with the Ant Colony routing protocol and proposes a new EC-PPRA routing algorithm. We use the pheromone mechanism to make routing decision while turning off the network interface of idle nodes adaptively to save energy. Based on the em...

  15. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    Science.gov (United States)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  16. Cognitive radio network in vehicular ad-hoc network (VANET): A survey

    OpenAIRE

    Joanne Mun-Yee Lim; Yoong Choon Chang; Mohamad Yusoff Alias; Jonathan Loo

    2016-01-01

    Cognitive radio network and Vehicular Ad hoc Network (VANET) are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Ran...

  17. A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks

    OpenAIRE

    Farooq, Waqar; Ali Khan, Muazzam; Rehman, Saad

    2016-01-01

    In a vehicular ad hoc network (VANET), the vehicles communicate with each other to develop an intelligent transport system (ITS) which provides safety and convenience while driving. The major challenge of VANET is that the topology changes dynamically due to the high speed and unpredictable mobility of vehicles resulting in an inefficient real time message dissemination, especially in emergency scenarios such as in the accident event where it can cause high level of destruction. To the best o...

  18. A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks

    OpenAIRE

    Debdutta Barman Roy; Rituparna Chaki; Nabendu Chaki

    2010-01-01

    In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunate...

  19. Sécurité des communications de groupe dans les réseaux ad hoc

    OpenAIRE

    Bouassida, Mohamed Salah

    2006-01-01

    Multicast communication is an efficient mechanism, adapted to several applications such as video conferences, software distributions ...The principal advantage of this type of communications is the optimisation of network resources, mainly by reducing the bandwidth and the routers resources consumption.In parallel to the development of the multicast services within Internet, the last years saw the emergence of the ad hoc networks, due to the appearance of new wireless technologies and new sta...

  20. A New Strategy to Improve Proactive Route Updates in Mobile Ad Hoc Networks

    OpenAIRE

    Abolhasan Mehran; Wysocki Tadeusz; Lipman Justin

    2005-01-01

    This paper presents two new route update strategies for performing proactive route discovery in mobile ad hoc networks (MANETs). The first strategy is referred to as minimum displacement update routing (MDUR). In this strategy, the rate at which route updates are sent into the network is controlled by how often a node changes its location by a required distance. The second strategy is called minimum topology change update (MTCU). In this strategy, the route updating rate is proportional to t...

  1. Design of a Smart Antenna for Mobile Ad Hoc Network Applications

    Directory of Open Access Journals (Sweden)

    Marco Di Filippo

    2015-01-01

    Full Text Available Among the mobile ad hoc networks appealing characteristics there are network reconfigurability and flexibility. In this context a smart antenna capable of self-configuring multiple high-directivity beams provides a major advantage in terms of power saving, increased range, and spatial reuse of channels. In this paper a smart antenna made of a cylindrical array of patches suitable for MANETs is presented.

  2. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    OpenAIRE

    Prasan Kumar Sahoo; Ming-Jer Chiang; Shih-Lin Wu

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmissio...

  3. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    OpenAIRE

    Hadj Gharib; Kamel Belloulata

    2014-01-01

    The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a...

  4. FHC-NCTSR: Node Centric Trust Based secure Hybrid Routing Protocol for Ad Hoc Networks

    OpenAIRE

    Prasuna V G; Dr. S Madhusudahan Verma

    2012-01-01

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol [FHC-NCTSR] that opted to fixed hash chaining for data transmission and node centric trust strategy for secure route discovery. The route discovery is reactive i...

  5. Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks

    OpenAIRE

    Pervis Fly; Natarajan Meghanathan

    2010-01-01

    We propose an algorithm to determine stable connecteddominating sets (CDS), based on the predicted link expiration time(LET), for mobile ad hoc networks (MANETs). The proposed LETbasedCDS algorithm is the first such algorithm that constructs a CDSbased on edge weights represented by predicted link expiration time,rather the traditional approach of using node weights like the wellknownmaximum density-based CDS (MaxD-CDS) algorithm. Theconstruction of the LET-CDS starts with the inclusion of th...

  6. Ad Hoc Network Securing Policy%Ad hoc网络安全策略

    Institute of Scientific and Technical Information of China (English)

    刘志远; 张曼曼

    2006-01-01

    本文首先介绍了Ad hoc网络的产生、定义、特点和应用,然后在探讨Ad hoc网络的安全需求的基础上,着重分析了移动Ad hoc网络易于遭受的攻击,最后讨论并提出了Ad Hoc网络的一些安全策略.

  7. Power Control in Reactive Routing Protocol for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Maher HENI

    2012-05-01

    Full Text Available The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector inorder to improve the energy consumption in mobile ad hoc networks (MANET. The purpose is tominimize the regular period of HELLO messages generated by the AODV protocol used for the research,development and maintenance of routes. This information is useful to have an idea about battery powerlevels of different network hosts. After storing this information, the node elect the shortest path followingthe classical model used this information to elect safest path (make a compromise in terms of energy.Transmitter node does not select another node as its battery will be exhausted soon.Any node of the network can have the same information’s about the neighborhoods as well as otherinformation about the energy level of the different terminal to avoid routing using a link that will be lostdue to an exhausted battery of a node in this link.Analytical study and simulations by Jist/SWANS have been conducted to note that no divergencerelatively to the classical AODV, a node can have this type of information that improves the energyefficiency in ad hoc networks.

  8. Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-06-01

    Full Text Available Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some goodsecurity solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The routeestablishment and route renewal affects the clusters and asa consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes inthe network.

  9. On capacity of wireless ad hoc networks with MIMO MMSE receivers

    CERN Document Server

    Ma, Jing

    2008-01-01

    Widely adopted at home, business places, and hot spots, wireless ad-hoc networks are expected to provide broadband services parallel to their wired counterparts in near future. To address this need, MIMO techniques, which are capable of offering several-fold increase in capacity, hold significant promise. Most previous work on capacity analysis of ad-hoc networks is based on an implicit assumption that each node has only one antenna. Core to the analysis therein is the characterization of a geometric area, referred to as the exclusion region, which quantizes the amount of spatial resource occupied by a link. When multiple antennas are deployed at each node, however, multiple links can transmit in the vicinity of each other simultaneously, as interference can now be suppressed by spatial signal processing. As such, a link no longer exclusively occupies a geometric area, making the concept of "exclusion region" not applicable any more. In this paper, we investigate link-layer throughput capacity of MIMO ad-hoc ...

  10. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  11. EXPERIMENTAL STUDY OF NETWORK BASED NOVEL ADAPTIVE ROUTING ALGORITHM FOR WIRELESS AD-HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Jagrut Solanki

    2015-10-01

    Full Text Available Ad hoc network is a collection of mobile nodes which dynamically form a temporary network without any infrastructure or centralize entity. There are number of routing protocol exists in ad hoc network and this protocols have been compared. These protocols are like DSR (Dynamic Source Routing, AODV (Ad-hoc On Demand Distance Vector Routing Algorithm, and TORA (Temporally Ordered Routing Algorithm like more. AODV is Reactive routing protocol. We modify the existing AODV protocol. All Routing Protocol have different Strategies of routing like End to End delay, Packet delivery ratio, Traffic overhead and Power Consumptions. Routing Deals with route discovery between source and destination. Aim of Dissertation is to improve route error tolerance mechanism of AODV. In our propose scheme the transmission starts from closest neighbor node if the link fail in middle of the transmission. That shows very important reductions in delay and it improves the packet delivery ratio. It also reduces the routing overhead by reducing frequency of route discovery process.

  12. An Optimized OSPF Routing Protocol for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Ning Du

    2012-09-01

    Full Text Available In this paper, we propose an Optimized OSPF(Open Shortest Path First)protocol for MANETs (Mobile Ad-hoc Networks. MANETs are multi-hop ad-hoc wireless networks where nodes can move arbitrarily in the topology. The network has no given infrastructure and can be set up quickly in any environment. Traditional OSPF is not also well used in multi-hop wireless networks. The optimized OSPF we proposed in this paper is a routing protocol which is more efficient for such mobile ad hoc networks. This paper describes and designs an optimized routing protocol for MANET referring to certain extensions to OSPF for MANET and OLSR routing protocol. The path selection optimization scheme we propose is aiming at reducing the number of redundant retransmissions while diffusing a broadcast message in the network and reducing overall overhead of control traffic。In conclusion, the optimized OSPF protocol improves the performance when using in MANETs as the experiment results show.

  13. CONSTRUCCIÓN CONCEPTUAL AD HOC E INTERPRETACIÓN METAFÓRICA

    Directory of Open Access Journals (Sweden)

    Esther Romero

    2012-06-01

    Full Text Available El objetivo de este artículo es señalar que la construcción conceptual ad hoc metafórica se produce mediante una analogía. La teoría de la interacción da cuenta de este rasgo peculiar de la metáfora apelando a una aplicación parcial de un dominio conceptual a otro y es más explicativa que la teoría de la relevancia con su procedimiento de ajuste conceptual para determinar una denotación más amplia. La teoría de la interacción, además, puede dar una explicación homogénea del tipo de construcción conceptual ad hoc que caracteriza a todas las interpretaciones metafóricas; los casos más creativos, ejemplos cuyos vehículos metafóricos remiten a conceptos ad hoc, pueden explicarse sin apelar a una ruta de interpretación distinta, como se defiende en el enfoque relevantista más reciente.

  14. Fault Tolerant Mechanism for Multimedia Flows in Wireless Ad Hoc Networks Based on Fast Switching Paths

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Multimedia traffic can be forwarded through a wireless ad hoc network using the available resources of the nodes. Several models and protocols have been designed in order to organize and arrange the nodes to improve transmissions along the network. We use a cluster-based framework, called MWAHCA architecture, which optimizes multimedia transmissions over a wireless ad hoc network. It was proposed by us in a previous research work. This architecture is focused on decreasing quality of service (QoS parameters like latency, jitter, and packet loss, but other network features were not developed, like load balance or fault tolerance. In this paper, we propose a new fault tolerance mechanism, using as a base the MWAHCA architecture, in order to recover any multimedia flow crossing the wireless ad hoc network when there is a node failure. The algorithm can run independently for each multimedia flow. The main objective is to keep the QoS parameters as low as possible. To achieve this goal, the convergence time must be controlled and reduced. This paper provides the designed protocol, the analytical model of the algorithm, and a software application developed to test its performance in a real laboratory.

  15. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  16. Optimal congestion control algorithm for ad hoc networks: Penalty function-based approach

    Institute of Scientific and Technical Information of China (English)

    XU Wet-qiang; WU Tie-jun

    2006-01-01

    In this paper, based on the inherent characteristic of the contention relation between flows in ad hoc networks, we introduce the notion of the link's interference set, extend the utility maximization problem representing congestion control in wireline networks to ad hoc networks, apply the penalty function approach and the subgradient method to solve this problem, and propose the congestion control algorithm Penalty function-based Optical Congestion Control (POCC) which is implemented in NS2 simulator. Specifically, each link transmits periodically the information on its congestion state to its interference set; the session at each source adjusts the transmission rate based on the optimal tradeoffbetween the utility value and the congestion level which the interference set of the links that this session goes though suffers from. MATLAB-based simulation results showed that POCC can approach the globally optimal solution. The NS2-based simulation results showed that POCC outperforms default TCP and ATCP to achieve efficient and fair resource allocation in ad hoc networks.

  17. DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Zahra Zandieh Shirazi

    2016-04-01

    Full Text Available In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, pre-existing infrastructures, or a centralized management point. In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead to various problems in the routing process such as increase of the overhead massages and inefficient routing between nodes of network. A large variety of clustering methods have been developed for establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having significant impact on MANETs performance. The K-means algorithm is one of the effective clustering methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption. This paper proposed a new K-means clustering algorithm to find out optimal path from source node to destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the performance of routing process in Mobile ad-hoc networks.

  18. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    Science.gov (United States)

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells. PMID:16252818

  19. Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge Node Based Greedy Routing

    Directory of Open Access Journals (Sweden)

    K.Prasanth

    2010-03-01

    Full Text Available VANETs (Vehicular Ad hoc Networks are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing, a greedy position based routing approach to forward packets to the node present in the edge of the limited transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that end to end delay in packet transmission is minimized considerably compared to current routing protocols of VANET.

  20. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi

    2006-01-01

    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.