WorldWideScience

Sample records for hoc mobile sensor

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  3. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  4. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  5. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Friedlander David

    2003-01-01

    Full Text Available Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  6. Adaptation of mobile ad-hoc network protocols for sensor networks to vehicle control applications

    Science.gov (United States)

    Sato, Kenya; Matsui, Yosuke; Koita, Takahiro

    2005-12-01

    As sensor network applications to monitor and control the physical environment from remote locations, a mobile ad-hoc network (MANET) has been the focus of many recent research and development efforts. A MANET, autonomous system of mobile hosts, is characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Many kinds of routing protocols for ad-hoc network have been proposed and still actively updated, because each application has different characteristics and requirements. Since the current studies show it is almost impossible to design an efficient routing protocol to be adapted for all kinds of applications. We, therefore, have focused a certain application, inter-vehicle communication for ITS (Intelligent Transport Systems), to evaluate the routing protocols. In our experiment, we defined several traffic flow models for inter-vehicle communication applications. By using simulation, we evaluated end-to-end delay and throughput performance of data transmission for inter-vehicle communications with the existing routing protocols. The result confirms the feasibility of using some routing protocols for inter-vehicle communication services.

  7. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  8. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  9. Intellectual mobile Ad Hoc networks

    OpenAIRE

    Sova, Oleg; Romanjuk, Valeriy; Bunin, Sergey; Zhuk, Pavlo

    2012-01-01

    In this article intellectualization of Mobile Ad Hoc Networks resources management is offered. It was proposed decomposition of the primary goal of MANET functioning into easy subgoals, and fragment of the MANET node target structure is presented.

  10. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  11. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  12. Cognitive Radio-Based Vehicular Ad Hoc and Sensor Networks

    National Research Council Canada - National Science Library

    Jalil Piran, Mohammad; Cho, Yongwoo; Yun, Jihyeok; Ali, Amjad; Suh, Doug Young

    2014-01-01

    ... the spectrum scarcity issue. We have already proposed vehicular ad hoc and sensor networks (VASNET) as a new networking paradigm for vehicular communication by utilizing wireless sensor nodes in two mobile and stationary modes...

  13. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  14. Wireless sensor and mobile ad-hoc networks vehicular and space applications

    CERN Document Server

    Al-Fuqaha, Ala

    2015-01-01

    This book describes the practical perspectives in using wireless sensor networks (WSN) to develop real world applications that can be used for space exploration. These applications include sensor interfaces, remote wireless vehicles, space crew health monitoring and instrumentation. The material discusses how applications of WSN originally developed for space travel and exploration are being applied and used in multiple real world applications, allowing for the development of smart systems that have characteristics such as self-healing, self-diagnosis, and emergency healthcare notification. This book also: ·         Discusses how multidisciplinary fields can be implemented in a single application ·         Reviews exhaustively the state-of-the-art research in WSN for space and vehicular applications ·         Covers smart systems that have self-healing, self-diagnosis, and emergency healthcare notification

  15. The "Hot Potato" Case: Challenges in Multiplayer Pervasive Games Based on Ad hoc Mobile Sensor Networks and the Experimental Evaluation of a Prototype Game

    CERN Document Server

    Chatzigiannakis, Ioannis; Akribopoulos, Orestis; Logaras, Marios; Kokkinos, Panagiotis; Spirakis, Paul

    2010-01-01

    In this work, we discuss multiplayer pervasive games that rely on the use of ad hoc mobile sensor networks. The unique feature in such games is that players interact with each other and their surrounding environment by using movement and presence as a means of performing game-related actions, utilizing sensor devices. We discuss the fundamental issues and challenges related to these type of games and the scenarios associated with them. We also present and evaluate an example of such a game, called the "Hot Potato", developed using the Sun SPOT hardware platform. We provide a set of experimental results, so as to both evaluate our implementation and also to identify issues that arise in pervasive games which utilize sensor network nodes, which show that there is great potential in this type of games.

  16. Intelligent algorithms for persistent and pervasive sensing in systems comprised of wireless ad hoc networks of ground-based sensors and mobile infrastructures

    Science.gov (United States)

    Hortos, William S.

    2007-04-01

    With the development of low-cost, durable unmanned aerial vehicles (UAVs), it is now practical to perform persistent sensing and target tracking autonomously over broad surveillance areas. These vehicles can sense the environment directly through onboard active sensors, or indirectly when aimed toward ground targets in a mission environment by ground-based passive sensors operating wirelessly as an ad hoc network in the environment. The combination of the swarm intelligence of the airborne infrastructure comprised of UAVs with the ant-like collaborative behavior of the unattended ground sensors creates a system capable of both persistent and pervasive sensing of mission environment, such that, the continuous collection, analysis and tracking of targets from sensor data received from the ground can be achieved. Mobile software agents are used to implement intelligent algorithms for the communications, formation control and sensor data processing in this composite configuration. The enabling mobile agents are organized in a hierarchy for the three stages of processing in the distributed system: target detection, location and recognition from the collaborative data processing among active ground-sensor nodes; transfer of the target information processed on the ground to the UAV swarm overhead; and formation control and sensor activation of the UAV swarm for sustained ground-target surveillance and tracking. Intelligent algorithms are presented that can adapt to the operation of the composite system to target dynamics and system resources. Established routines, appropriate to the processing needs of each stage, are selected as preferred based on their published use in similar scenarios, ability to be distributively implemented over the set of processors at system nodes, and ability to conserve the limited resources at the ground nodes to extend the lifetime of the pervasive network. In this paper, the performance of this distributed, collaborative system concept for

  17. Intermittently connected mobile ad hoc networks

    CERN Document Server

    Jamalipour, Abbas

    2011-01-01

    In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths betwe

  18. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  19. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  20. Overlaid Cellular and Mobile Ad Hoc Networks

    CERN Document Server

    Huang, Kaibin; Chen, Bin; Yang, Xia; Lau, Vincent K N

    2008-01-01

    In cellular systems using frequency division duplex, growing Internet services cause unbalance of uplink and downlink traffic, resulting in poor uplink spectrum utilization. Addressing this issue, this paper considers overlaying an ad hoc network onto a cellular uplink network for improving spectrum utilization and spatial reuse efficiency. Transmission capacities of the overlaid networks are analyzed, which are defined as the maximum densities of the ad hoc nodes and mobile users under an outage constraint. Using tools from stochastic geometry, the capacity tradeoff curves for the overlaid networks are shown to be linear. Deploying overlaid networks based on frequency separation is proved to achieve higher network capacities than that based on spatial separation. Furthermore, spatial diversity is shown to enhance network capacities.

  1. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  2. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity

    Science.gov (United States)

    2014-05-01

    Modeling Terrain Impact on Mobile Ad Hoc Networks ( MANET ) Connectivity Lance Joneckis Corinne Kramer David Sparrow David Tate I N S T I T U T E F...SUBTITLE Modeling Terrain Impact on Mobile Ad Hoc Networks ( MANET ) Connectivity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...1882 ljonecki@ida.org Abstract—Terrain affects connectivity in mobile ad hoc net- works ( MANET ). Both average pairwise link closure and the rate

  3. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  4. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  5. Vehicular Ad Hoc and Sensor Networks: Principles and Challenges

    Directory of Open Access Journals (Sweden)

    Mohammad Jalil Piran

    2011-06-01

    Full Text Available The rapid increase of vehicular traffic and congest ion on the highways began hampering the safe and efficient movement of traffic. Consequently, year b y year, we see the ascending rate of car accidents and casualties in most of the countries. Therefore, exp loiting the new technologies, e.g. wireless sensor networks, is required as a solution of reduction of these sad dening and reprehensible statistics. This has motiv ated us to propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. W e coin the vehicular network employing wireless Senso r networks as Vehicular Ad Hoc and Sensor Network, or VASNET in short. The proposed VASNET is particularl y for highway traffic .VASNET is a self-organizing Ad Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of sensor nodes, some are embedded on the vehicles-veh icular nodes- and others are deployed in predetermi ned distances besides the highway road, known as Road S ide Sensor nodes (RSS. The vehicular nodes are use d to sense the velocity of the vehicle for instance. We can have some Base Stations (BS such as Police Tra ffic Station, Firefighting Group and Rescue Team. The ba se stations may be stationary or mobile. VASNET provides capability of wireless communication betwe en vehicular nodes and stationary nodes, to increas e safety and comfort for vehicles on the highway road s. In this paper we explain main fundamentals and challenges of VASNET

  6. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  7. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  8. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  9. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  10. A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    DR. N. SATYANARAYANA

    2010-12-01

    Full Text Available Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack (AHFA, can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP, a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.

  11. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    CERN Document Server

    Kaaniche, Heni

    2010-01-01

    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  12. ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing Protocol

    OpenAIRE

    Grandhomme, Florian; Guette, Gilles; Ksentini, Adlen; Plesse, Thierry

    2016-01-01

    International audience; New generation radio equipment, used by soldiers and vehicles on the battlefield, constitute ad hoc networks and specifically, Mobile Ad hoc NETworks (MANET). The battlefield where these equipment are deployed includes a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANETs links. Operational communications tend to provide tactical ad hoc networks some capacities. There is a be...

  13. Voice Service Support in Mobile Ad Hoc Networks

    CERN Document Server

    Jiang, Hai; Poor, H Vincent; Zhuang, Weihua

    2007-01-01

    Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility makes it more complex due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low-power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Simulation results demonstrate the effectiveness of the proposed scheme.

  14. Towards More Realistic Mobility Model in Vehicular Ad Hoc Network

    OpenAIRE

    Dhananjay S. Gaikwad; Mahesh Lagad; Prashant Suryawanshi; Vaibhav Maske

    2012-01-01

    Mobility models or the movement patterns of nodes communicating wirelessely, play a vital role in the simulation-based evaluation of vehicular Ad Hoc Networks (VANETs). Even though recent research has developed models that better corresponds to real world mobility, we still have a limited understanding of the level of the required level of mobility details for modeling and simulating VANETs. In this paper, we propose a new mobility model for VANETs that works on the city area and map the topo...

  15. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  16. Mobile Ad Hoc Networks Current Status and Future Trends

    CERN Document Server

    Loo, Jonathan

    2011-01-01

    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility o

  17. Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Er. Rakesh Kumar,

    2010-08-01

    Full Text Available hoc networks are self configuring network and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol can accommodate such an environment. Different protocols govern the mobile ad hoc networks and to improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV routing protocol in mobile ad hoc networks with high mobility, a message exchange scheme for its invalid route reconstruction is being used. Three protocols AODV, DSDV and I-DSDV were simulated using NS-2 package and were compared in terms of packet delivery ratio, end to end delay routing overhead in different environment; varying number of nodes, speed and pause time. Simulation results show that IDSDVcompared with DSDV, it reduces the number of dropped data packets with little increased overhead at higher rates of node mobility but still compete with AODV in higher node speed and number of node.

  18. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    Science.gov (United States)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  19. Link Perdurability Based Routing for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Sun Xuebin; Zhou Zheng

    2003-01-01

    Ad Hoc networks are prone to link failures due to mobility. In this letter, a link perdurability based routing scheme is proposed to try dealing with this problem. This scheme uses signal strength measurements to estimate the route life time and hence chooses a stable route, and is implemented in two typical ad hoc routing protocols to evaluate its performance. The simulation results have shown that this scheme can improve these protocols' packet delivery ratio in cases where there are frequent link failures.

  20. Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2011-01-01

    Full Text Available Problem statement: An inherent feature of mobile ad hoc networks is the frequent change of network topology leading to stability and reliability problems of the network. Highly dynamic and dense network have to maintain acceptable level of service to data packets and limit the network control overheads. This capability is closely related as how quickly the network protocol control overhead is managed as a function of increased link changes. Dynamically limiting the routing control overheads based on the network topology improves the throughput of the network. Approach: In this study we propose Varying Overhead - Ad hoc on Demand Vector routing protocol (VO-AODV for highly dynamic mobile Ad hoc network. The VO-AODV routing protocol proposed dynamically modifies the active route time based on the network topology. Results and Conclusion: Simulation results prove that the proposed model decreases the control overheads without decreasing the QOS of the network.

  1. Ad Hoc Mobile Wireless Networks Routing Protocols - A Review

    Directory of Open Access Journals (Sweden)

    Geetha Jayakumar

    2007-01-01

    Full Text Available Mobile ad hoc networks(MANET represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad-hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad-hoc paradigm. Recently the introduction of new technologies such as Bluetooth, IEEE 802.11 and hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent revolutions have been generating a renewed and growing interest in the research and development of MANET. To facilitate communication within the network a routing protocol is used to discover routes between nodes. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Bandwidth and power constraints are the important factors to be considered in current wireless network because multi-hop ad-hoc wireless relies on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power computation demands on mobile host to be taken into account while choosing the protocol. Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility. The ad-hoc routing protocols are divided into two classes: table driven and demand based. This paper reviews and discusses routing protocol belonging to each category.

  2. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  3. Fuzzy-Based Sensor Fusion for Cognitive Radio-Based Vehicular Ad Hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Jalil Piran

    2015-01-01

    Full Text Available In wireless sensor networks, sensor fusion is employed to integrate the acquired data from diverse sensors to provide a unified interpretation. The best and most salient advantage of sensor fusion is to obtain high-level information in both statistical and definitive aspects, which cannot be attained by a single sensor. In this paper, we propose a novel sensor fusion technique based on fuzzy theory for our earlier proposed Cognitive Radio-based Vehicular Ad Hoc and Sensor Networks (CR-VASNET. In the proposed technique, we considered four input sensor readings (antecedents and one output (consequent. The employed mobile nodes in CR-VASNET are supposed to be equipped with diverse sensors, which cater to our antecedent variables, for example, The Jerk, Collision Intensity, and Temperature and Inclination Degree. Crash_Severity is considered as the consequent variable. The processing and fusion of the diverse sensory signals are carried out by fuzzy logic scenario. Accuracy and reliability of the proposed protocol, demonstrated by the simulation results, introduce it as an applicable system to be employed to reduce the causalities rate of the vehicles’ crashes.

  4. Virtual reality mobility model for wireless ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yu Ziyue; Gong Bo; He Xingui

    2008-01-01

    For wireless ad hoc networks simulation.node's mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment,and the model uses the path planning method to avoid obstacles and to compute the node's moving path.Obstacles also affect node's signal propagation.Considering these factors,this study implements the mobility model for wireless ad hoc networks.Simulation results show that the model has a significant impact on the performance of protocols.

  5. Performance Evaluation of TCP over Mobile Ad hoc Networks

    CERN Document Server

    Ahmed, Foez; Islam, Nayeema; Debnath, Sumon Kumar

    2010-01-01

    With the proliferation of mobile computing devices, the demand for continuous network connectivity regardless of physical location has spurred interest in the use of mobile ad hoc networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication in the internet, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired networks, where packet losses occur mostly because of congestion. However, TCP connections in Ad-hoc mobile networks are plagued by problems such as high bit error rates, frequent route changes, multipath routing and temporary network partitions. The throughput of TCP over such connection is not satisfactory, because TCP misinterprets the packet loss or delay as congestion and invokes congestion control and avoidance algorithm. In this research, the performance of TCP in Adhoc mobile network with high Bit Error rate (BER) and mobility is studied and investigated. Simulation model is implement...

  6. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  7. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  8. Decentralized Network-level Synchronization in Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    Voulgaris, Spyros; Dobson, Matthew; Steen, van Maarten

    2016-01-01

    Energy is the scarcest resource in ad hoc wireless networks, particularly in wireless sensor networks requiring a long lifetime. Intermittently switching the radio on and off is widely adopted as the most effective way to keep energy consumption low. This, however, prevents the very goal of communic

  9. Security Challenges and Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    CH.V. Raghavendran

    2013-09-01

    Full Text Available Mobile Ad hoc Network (MANET is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

  10. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks

    OpenAIRE

    Liu, Jinshan; Issarny, Valérie

    2004-01-01

    International audience; Interactions between entities unknown to each other are inevitable in the ambient intelligence vision of service access anytime, anywhere. Trust management through a reputation mechanism to facilitate such interactions is recognized as a vital part of mobile ad hoc networks, which features lack of infrastructure, autonomy, mobility and resource scarcity of composing light-weight terminals. However, the design of a reputation mechanism is faced by challenges of how to e...

  11. Vehicular Ad Hoc Network Mobility Model

    Directory of Open Access Journals (Sweden)

    Budi Rahmadya

    2014-01-01

    Full Text Available Indonesia is one of developing countries with high land traffic density. This traffic density could cause traffic jam, traffic accidents and other disturbances. This research had developed a simulator that could calculate the traffic density of roads in urban areas. With the use of this simulator, the researcher could calculate the time needed if the source node transports the message to the destination node by using the ad hoc network communication facility. In this research, every vehicle utilizes multi-hop communication in a communication network. The vehicle sends the message through flooding message and passes on the received message to other vehicles. Based on the simulation done on map size 10 km x 10 km with a total of 20 vehicles on the road, it was calculated that the simulator could transmit the message to its destination on the 106th second from node 3 and with the total of 200 vehicles on the road, the simulator could transmit the message to its destination on the 22nd second from node 5. 

  12. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  13. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  14. A Study On OFDM In Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Malik Nasereldin Ahmed

    2012-06-01

    Full Text Available Orthogonal Frequency Division Multiplexing (OFDM is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can be used adaptively in a dynamically changing channel. This study gives a detailed view about OFDM and how it is useful to increase the bandwidth. This paper also gives an idea about how OFDM can be a promising technology for high capacity wireless communication.

  15. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  16. ANALYSIS OF ROUTING IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Shweta

    2012-09-01

    Full Text Available An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any standalone infrastructure or centralized administration. Routing in Ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken.In this model we not only improves the reputation of the network but also provide a routing approach for reliable data transmission and also avoid the loop occurs in the communication. The mobile network is the dynamicnetwork that provides the solution for the inclusion and exclusion of dynamic nodes in the network. AODV and DSR are the two most popular routing protocols for ad-hoc network that we discussed here. In this paper we describe the way to find the node having packet loss and to perform the elimination of node from the network withoutperforming the rerouting and provide the reliable data transfer over the network. In this paper, we design and evaluate cooperative caching techniques to efficiently support data access in the ad-hoc network.

  17. Spaceborne Mobile Ad-Hoc Networks

    Science.gov (United States)

    Forcada, Ignasi; Strauss, Adi

    2010-08-01

    Reliable global networking is essential for a rapidly growing mobile and interactive communication. Satellite communication plays already a significant role in this subject. However, the classical space-based data transmission requires an appropriate infrastructure, both on the ground and in orbit. This paper discusses the potential of a self-organising distributed satellite system in Low Earth Orbits (LEO) to achieve a seamless integration in already existing infrastructures. The communication approach is based on dynamic Inter Satellite Links (ISL) not controlled nor coordinated on an individual basis from the ground-based stations.

  18. Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dr. Kamaljit I. Lakhtaria

    2012-05-01

    Full Text Available Mobile Ad Hoc Network (MANET is an autonomous mobile nodes forming network in an infrastructure less environment and has dynamic topology. MANET reactive protocols always not have low control overhead. The control overhead for reactive protocols is more sensitive to the traffic load, in terms of the number of traffic rows, and mobility, in terms of link connectivity change rates, than other protocols. Therefore, reactive protocols may only be suitable for MANETs with small number of traffic loads and small link connectivity change rates. It is already proved that, it is more feasible to maintain full network topology in a MANET with low control overhead. In this Research Paper through simulations that were carried out by using Network Simulator-2 (NS-2 we had analyze Reactive/ On-demand protocols such as Ad Hoc On-Demand Distance Vector Routing (AODV, Temporally-Ordered Routing Algorithm (TORA, and Dynamic Source Routing (DSR,

  19. Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Amit Kumar

    2012-05-01

    Full Text Available The research on various issues in Mobile ad hoc networks is getting popular because of its challenging nature and all time connectivity to communicate. Network simulators provide the platform to analyse and imitate the working of the nodes in the networks along with the traffic and other entities. The current work proposes the design of a simulator for the mobile ad hoc networks that provides a test bed for the energy efficient clustering in the dynamic network. Node parameters like degree of connectivity and average transmission power are considered for calculating the energy consumption of the mobile devices. Nodes that consume minimum energy among their 1-hop neighbours are selected as the cluster heads.

  20. BCR Routing for Intermittently Connected Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    S. RAMESH

    2014-03-01

    Full Text Available The Wireless and the Mobile Networks appear to provide a wide range of applications. Following these, the Mobile Ad hoc Networks (MANET aid in wide development of many applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Ad hoc Network (ICMANET is a sparse network where a full connectivity is never possible. ICMANET is a disconnected MANET and is also a Delay Tolerant Network (DTN that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called Bee Colony Routing (BCR is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. BCR is proposed with the basis of Bee Colony Optimization technique (BCO. The routing in ICMNAET is done by means of Bee routing protocol. This paper enchants a novel routing methodology for data transmission in ICMANET.

  1. A Timed Calculus for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mengying Wang

    2012-12-01

    Full Text Available We develop a timed calculus for Mobile Ad Hoc Networks embodying the peculiarities of local broadcast, node mobility and communication interference. We present a Reduction Semantics and a Labelled Transition Semantics and prove the equivalence between them. We then apply our calculus to model and study some MAC-layer protocols with special emphasis on node mobility and communication interference. A main purpose of the semantics is to describe the various forms of interference while nodes change their locations in the network. Such interference only occurs when a node is simultaneously reached by more than one ongoing transmission over the same channel.

  2. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  3. Integrating Mobile Ad Hoc Network to the Internet

    Institute of Scientific and Technical Information of China (English)

    WANG Mao-ning

    2005-01-01

    A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the Internet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the Internet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%.

  4. Cost management based security framework in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Security issues are always difficult to deal with in mobile ad hoc networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources.Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.

  5. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  6. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Abdulaziz Al-Nahari

    Full Text Available Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV, which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  7. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  8. Vehicular Ad Hoc and Sensor Networks; Principles and Challenges

    CERN Document Server

    Piran, Mohammad Jalil; Babu, G Praveen

    2011-01-01

    The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Consequently, year by year, we see the ascending rate of car accidents and casualties in most of the countries. Therefore, exploiting the new technologies, e.g. wireless sensor networks, is required as a solution of reduction of these saddening and reprehensible statistics. This has motivated us to propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. We coin the vehicular network employing wireless Sensor networks as Vehicular Ad Hoc and Sensor Network, or VASNET in short. The proposed VASNET is particularly for highway traffic .VASNET is a self-organizing Ad Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of sensor nodes, some are embedded on the vehicles-vehicular nodes- and others are deployed in predetermined distances besides the highway road, known as Road Side Sensor nodes (RSS...

  9. Bandwidth Estimation For Mobile Ad hoc Network (MANET

    Directory of Open Access Journals (Sweden)

    Rabia Ali

    2011-09-01

    Full Text Available In this paper we presents bandwidth estimation scheme for MANET, which uses some components of the two methods for the bandwidth estimation: 'Hello Bandwidth Estimation 'Listen Bandwidth Estimation. This paper also gives the advantages of the proposed method. The proposed method is based on the comparison of these two methods. Bandwidth estimation is an important issue in the Mobile Ad-hoc Network (MANET because bandwidth estimation in MANET is difficult, because each host has imprecise knowledge of the network status and links change dynamically. Therefore, an effective bandwidth estimation scheme for MANET is highly desirable. Ad hoc networks present unique advanced challenges, including the design of protocols for mobility management, effective routing, data transport, security, power management, and quality-of-service (QoS provisioning. Once these problems are solved, the practical use of MANETs will be realizable.

  10. Power Control in Multi-cluster Mobile Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JINYanliang; YANGYuhang

    2003-01-01

    Power control gives us many advantages including power saving, lower interference, and efficient channel utilization. We proposed two clustering algorithms with power control for multl-cluster mobile ad hoc networks in this paper. They improve the network throughput and the network stability as compared to other ad hoc networks in which all mobile nodes use the same transmission power. Furthermore, they help in reducing the system power consumption. We compared the performances of the two approaches. Simulation results show that the DCAP (Distributed clustering algorithm with power control) would achieve a better throughput performance and lower power consumption than the CCAP (Centralized clustering algorithm with power control), but it is complicated and liable to be affected by node velocity.

  11. A Novel Routing Scheme for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Prem Chand

    2013-04-01

    Full Text Available Mobile Ad hoc Network (MANET is a collection of mobile users without any support of fixed infrastructure. The nodes in these networks have several constraints such as transmission power, bandwidth and processing capability. In addition to it an important parameter of interest is the residual battery power of the nodes. Conventional routing schemes do not take this aspect into consideration. Therefore this paper proposes a routing strategy that takes this aspect into consideration by modifying the Route Request (RREQ packet of the Ad hoc On demand Distance Vector (AODV routing protocol. The protocol chooses a threshold below which a node is not allowed to relay data/control packets. The results show a remarkable improvement in the value of Packet Delivery Ratio (PDR, throughput and at the same time the network lifetime is not affected.

  12. Ion mobility sensor system

    Science.gov (United States)

    Xu, Jun; Watson, David B.; Whitten, William B.

    2013-01-22

    An ion mobility sensor system including an ion mobility spectrometer and a differential mobility spectrometer coupled to the ion mobility spectrometer. The ion mobility spectrometer has a first chamber having first end and a second end extending along a first direction, and a first electrode system that generates a constant electric field parallel to the first direction. The differential mobility spectrometer includes a second chamber having a third end and a fourth end configured such that a fluid may flow in a second direction from the third end to the fourth end, and a second electrode system that generates an asymmetric electric field within an interior of the second chamber. Additionally, the ion mobility spectrometer and the differential mobility spectrometer form an interface region. Also, the first end and the third end are positioned facing one another so that the constant electric field enters the third end and overlaps the fluid flowing in the second direction.

  13. Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues

    OpenAIRE

    Muneer Bani Yassein; “Nour Alhuda” Damer

    2016-01-01

    Flying Ad-Hoc Networks (FANETs) is a group of Unmanned Air Vehicles (UAVs) which completed their work without human intervention. There are some problems in this kind of networks: the first one is the communication between (UAVs). Various routing protocols introduced classified into three categories, static, proactive, reactive routing protocols in order to solve this problem. The second problem is the network design, which depends on the network mobility, in which is the process of cooperati...

  14. Mobile Ad-Hoc Networking on Android Devices

    Science.gov (United States)

    2014-03-01

    done to take advantage of High Performance Computer ( HPC ) resources seeded within the mobile ad-hoc network. Having access to HPC resources allows the...are provided by the device manufacturers . Because of this, we could enable IBSS with the same modified kernel. Unfortunately, using the same chipset and...source project called MANET Manager (9), which ports the OLSR daemon to Android devices. With this additional software we were able to successfully

  15. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julián García Matesanz

    2011-03-01

    Full Text Available The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  17. Performance Comparisons of Routing Protocols in Mobile Ad Hoc Networks

    CERN Document Server

    Manickam, P; Girija, M; Manimegalai, Dr D; 10.5121/ijwmn.2011.3109

    2011-01-01

    Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that dynamically form a network temporarily without any support of central administration. Moreover, Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing protocols like DSDV, AODV, DSR, etc...which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols DSDV, AODV and DSR based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.

  18. A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Binod Kumar Pattanayak

    2014-01-01

    Full Text Available Applications of Mobile Ad Hoc Networks (MANETs have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, we introduce a mobile agent based intrusion detection and prevention architecture for a clustered MANET. Here, a mobile agent resides in each cluster of the ad hoc network and each cluster runs a specific application at any point of time. This application specific approach makes the network more robust to external intrusions directed at the nodes in an ad hoc network.

  19. Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues

    Directory of Open Access Journals (Sweden)

    Muneer Bani Yassein

    2016-06-01

    Full Text Available Flying Ad-Hoc Networks (FANETs is a group of Unmanned Air Vehicles (UAVs which completed their work without human intervention. There are some problems in this kind of networks: the first one is the communication between (UAVs. Various routing protocols introduced classified into three categories, static, proactive, reactive routing protocols in order to solve this problem. The second problem is the network design, which depends on the network mobility, in which is the process of cooperation and collaboration between the UAV. Mobility model of FANET is introduced in order to solve this problem. In Mobility Model, the path and speed variations of the UAV and represents their position are defined. As of today, Random Way Point Model is utilized as manufactured one for Mobility in the greater part of recreation situations. The Arbitrary Way Point model is not relevant for the UAV in light of the fact that UAV do not alter their course and versatility, speed quickly at one time because of this reason, we consider more practical models, called Semi-Random Circular Movement (SRCM Mobility Model. Also, we consider different portability models, Mission Plan-Based (MPB Mobility Model, Pheromone-Based Model. Moreover, Paparazzi Mobility Model (PPRZM. This paper presented and discussed the main routing protocols and main mobility models used to solve the communication, cooperation, and collaboration in FANET networks.

  20. Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM

    Directory of Open Access Journals (Sweden)

    Pariza Kamboj

    2010-10-01

    Full Text Available Many crucial applications of MANETs like the battlefield, conference and disaster recovery defines the needs for group communications either one-to-many or many-to-many form. Multicast plays an important role in bandwidth scarce multihop mobile ad hoc networks comprise of limited battery power mobile nodes. Multicast protocols in MANETs generate many controls overhead for maintenance of multicast routingstructures due to frequent changes of network topology. Bigger multicast tables for the maintenance of network structures resultsin inefficient consumption of bandwidth of wireless links andbattery power of anemic mobile nodes, which in turn, pose thescalability problems as the network size is scaled up. However,many MANET applications demands scalability from time to time. Multicasting for MANETs, therefore, needs to reduce the state maintenance. As a remedy to these shortcomings, this paper roposes an overlay multicast protocol on application layer. In the proposed protocol titled “Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM” the network nodes construct overlay hierarchical framework to reduce the protocols states and constrain their distribution within limited scope. Based on zone around each node, it constructs a virtual structure at application layer mapped with the physical topology at network layer, thus formed two levels of hierarchy. The concept of two level hierarchies reduces the protocol state maintenance and hence supports the vertical scalability. Protocol depends on the location information obtained using a distributed location service, which effectively reduces the overhead for route searching and updating the source based multicast tree.

  1. Distributed Intrusion Detection System for Ad hoc Mobile Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Nawaz Khan

    2012-01-01

    Full Text Available In mobile ad hoc network resource restrictions on bandwidth, processing capabilities, battery life and memory of mobile devices lead tradeoff between security and resources consumption. Due to some unique properties of MANETs, proactive security mechanism like authentication, confidentiality, access control and non-repudiation are hard to put into practice. While some additional security requirements are also needed, like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism i.e. authentication and encryption, provide a security beach to MANETs. But some reactive security mechanism is required who analyze the routing packets and also check the overall network behavior of MANETs. Here we propose a local-distributed intrusion detection system for ad hoc mobile networks. In the proposed distributed-ID, each mobile node works as a smart agent. Data collect by node locally and it analyze that data for malicious activity. If any abnormal activity discover, it informs the surrounding nodes as well as the base station. It works like a Client-Server model, each node works in collaboration with server, updating its database each time by server using Markov process. The proposed local distributed- IDS shows a balance between false positive and false negative rate. Re-active security mechanism is very useful in finding abnormal activities although proactive security mechanism present there. Distributed local-IDS useful for deep level inspection and is suited with the varying nature of the MANETs.

  2. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  3. Implementing Smart Antenna System in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Supriya Kulkarni P

    2014-06-01

    Full Text Available As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Nowadays, users are interested in interconnecting all their personal electronic devices (PEDs in an ad hoc fashion on the move. This type of network is referred to as Mobile Ad hoc NETwork (MANET. When in such network a smart antenna System (SAS is implemented then we can achieve maximum capacity and improve the quality and coverage. So we are intended to implement such a SAS in the MANET. In this paper we have shown significance of Throughput and Bit Error Rate by implementing SAS in MANET using MATLABR2010a.

  4. AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    彭伟; 卢锡城

    2001-01-01

    Broadcast is an important operation in many network protocols. It is utilized to discover routes to unknown nodes in mobile ad hoc networks (MANETs) and is the key factor in scaling on-demand routing protocols to large networks. This paper presents the Ad Hoc Broadcast Protocol (AHBP) and its performance is discussed. In the protocol, messages are only rebroadcast by broadcast relay gateways that constitute a connected dominating set of the network. AHBP can efficiently reduce the redundant messages which make flooding-like protocols perform badly in large dense networks. Simulations are conducted to determine the performance characteristics of the protocol. The simulation results have shown excellent reduction of broadcast redundancy with AHBP. It also contributes to a reduced level of broadcast collision and congestion.

  5. Performance Analysis of Mobile Ad-Hoc Network Routing Protocols using Network Simulator – 2

    Directory of Open Access Journals (Sweden)

    S. Manikandan

    2015-11-01

    Full Text Available Ad-hoc network is a network which consists of nodes that use a wireless interface to send packet data. Since the nodes in a network of this kind can serve as routers and hosts, they can forward packets on behalf of other nodes and run user application. A mobile ad-hoc network (MANET is probably the most well-known example of this networking paradigm have been around for over twenty years, mainly exploited to design tactical networks. Furthermore, the multi-hop ad-hoc networking paradigm is often used for building sensor networks to study, control, monitor events and phenomena. To exploit these potentialities, modeling, simulation and theoretical analyses have to be complemented by real experiences, which provide both a direct evaluation of ad-hoc networks and at the same time precious information for a realistic modeling of these systems. Different routing protocols namely Ad-hoc On-demand Distance Vector (AODV protocol, Dynamic Source Routing (DSR protocol and Destination Sequenced Distance Vector (DSDV protocol in MANET are compared and the performance are evaluated based on various metrics like Packet Delivery ratio, Avg. end-to-end delay, throughput, etc. For this purpose, a discrete event simulator known as NS2 is used.

  6. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.N.Renjith

    2012-12-01

    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  7. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    Due to the wide use of communicating mobile devices, mobile ad hoc networks (MANETs) have gained in popularity in recent years. In order that the devices communicate properly, many protocols have been proposed working at different levels. Devices in an MANET are not stationary but may keep moving......, thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...... issues in MANETs e.g. mobility and unreliable connections. Specially speaking, 1. We first propose a discrete probabilistic process calculus with which we can model in an MANET that the wireless connection is not reliable, and the network topology may undergo changes. We equip each wireless connection...

  8. A Distributed Mutual Exclusion Algorithm for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Orhan Dagdeviren

    2012-04-01

    Full Text Available We propose a distributed mutual exclusion algorithm for mobile ad hoc networks. This algorithm requires a ring of cluster coordinators as the underlying topology. The topology is built by first providing clusters of mobile nodes in the first step and then forming a backbone consisting of the cluster heads in a ring as the second step. The modified version of the Ricart-Agrawala Algorithm on top of this topologyprovides analytically and experimentally an order of decrease in message complexity with respect to the original algorithm. We analyze the algorithm, provide performance results of the implementation, discuss the fault tolerance and the other algorithmic extensions, and show that this architecture can be used for other middleware functions in mobile networks.

  9. SPM: Source Privacy for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ren Jian

    2010-01-01

    Full Text Available Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS. This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed.

  10. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  11. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  12. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model...... of the non-linear behaviour of throughput. The intermediate models obtained in this modelling effort are used to adapt the parameters as the network conditions change, in order to maximize throughput. The improvements in throughput range from 10-26 times the use of the default parameter settings...

  13. Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)

    Institute of Scientific and Technical Information of China (English)

    JI Xiao-jun; TIAN Chang; ZHANG Yu-sen

    2006-01-01

    Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols.A new approach-tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.

  14. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  15. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  16. PERFORMANCE COMPARISON OF MOBILE AD HOC NETWORK ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mandeep Kaur Gulati

    2014-03-01

    Full Text Available Mobile Ad-hoc Network (MANET is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find optimized routes from source to the destination and prominent among them are Dynamic Source Routing (DSR, Ad-hoc On Demand Distance Vector (AODV, and Destination-Sequenced Distance Vector (DSDV routing protocols. The performance comparison of these protocols should be considered as the primary step towards the invention of a new routing protocol. This paper presents a performance comparison of proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery ratio, average end-to-end delay, throughput, jitter, normalized routing overhead and normalized MAC overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility speed, number of nodes and data rate. The comparison results show that AODV performs optimally well not the best among all the studied protocols.

  17. Location Based Opportunistic Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jubin Sebastian E

    2012-01-01

    Full Text Available : Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. This paper proposes a Location Based Opportunistic Routing Protocol (LOR to addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner.This protocol takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. When a data packet is sent out, some of the neighbor nodes that have overheard the transmission will serve as forwarding candidates, and take turn to forward the packet if it is not relayed by the specific best forwarder within a certain period of time. By utilizing such in-the-air backup, communication is maintained without being interrupted. The additional latency incurred by local route recovery is greatly reduced and the duplicate relaying caused by packet reroute is also decreased. Simulation results on NS2 verified the effectiveness of the proposed protocol with improvement in throughput by 28%.

  18. Evaluating And Comparison Of Intrusion In Mobile AD HOC Networks

    Directory of Open Access Journals (Sweden)

    Zougagh Hicham

    2012-04-01

    Full Text Available In recent years, the use of mobile ad hoc network (MANETs has been widespread in many applications.Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this article we classify the architecture for IDS that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANETs presented and compared. We then provide some directions for future researches.

  19. Distributed intrusion detection for mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

    2008-01-01

    Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.

  20. Time synchronization in ad-hoc wireless sensor networks

    Science.gov (United States)

    Sharma, Nishant

    2013-06-01

    Advances in micro-electronics and developments in the various technologies have given birth to this era of wireless sensor networks. A sensor network is the one which provides information about the surrounding environment by sensing it and clock synchronization in wireless sensor networks plays a vital role to maintain the integrity of entire network. In this paper two major low energy consumption clock synchronization algorithms, Reference Broadcast Synchronization (RBS) and Timing-Sync Protocol for Sensor Networks (TPSN) are simulated, which result in high level of accuracy, reliability, handles substantially greater node densities, supports mobility, and hence perform well under all possible conditions.

  1. Wireless sensor and ad hoc networks under diversified network scenarios

    CERN Document Server

    Sarkar, Subir Kumar

    2012-01-01

    Due to significant advantages, including convenience, efficiency and cost-effectiveness, the implementation and use of wireless ad hoc and sensor networks have gained steep growth in recent years. This timely book presents the current state-of-the-art in these popular technologies, providing you with expert guidance for your projects in the field. You find broad-ranging coverage of important concepts and methods, definitions of key terminology, and a look at the direction of future research. Supported with nearly 150 illustrations, the book discusses a variety of critical topics, from topology

  2. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks

    Science.gov (United States)

    2014-05-01

    mobile ad hoc networks ( MANETs ) is that routes consisting of multiple hops will be available to connect those nodes that lack line-of- sight connectivity...SUPPLEMENTARY NOTES 14. ABSTRACT One of the assumptions behind tactical mobile ad hoc networks ( MANETs ) is that routes consisting of multiple hops will be...Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks Lance Joneckis Corinne Kramer David Sparrow David Tate I N S T I T U T E

  3. Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mahdi Abdulkader Salem

    2016-05-01

    Full Text Available The mobile ad hoc network (MANET is nothing but the wireless connection of mobile nodes which provides the communication and mobility among wireless nodes without the need of any physical infrastructure or centralized devices such as access point or base station. The communication in MANET is done by routing protocols. There are different categories of routing protocols introduced with different goals and objectives for MANETs such as proactive routing protocols (e.g. DSDV, reactive routing protocols (e.g. ADOV, geographic routing protocols (e.g. GRP, hybrid routing protocols etc. There are two important research problems with such routing protocols to address such as efficient load balancing and energy efficiency. In this paper, we are focusing on evaluation and analysis of efficient load balancing protocol design for MANET. Inefficient load balancing technique results in increasing routing overhead, poor packet delivery ratio, and other Quality of Service (QoS parameters. In literature, there are a number of different methods proposed for improving the performance of routing protocols by efficient load balancing among mobile nodes communication. However, most of the methods suffer from various limitations. In this paper, we propose a novel technique for improved the QoS performance of load balancing approach as well as increasing the network lifetime. Evaluation of Network lifetime is out of scope of this paper.

  4. A load-balanced minimum energy routing algorithm for Wireless Ad Hoc Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Wireless Ad Hoc Sensor Networks (WSNs) have received considerable academia research attention at present. The energy-constraint sensor nodes in WSNs operate on limited batteries, so it is a very important issue to use energy efficiently and reduce power consumption. To maximize the network lifetime, it is essential to prolong each individual node's lifetime through minimizing the transmission energy consumption, so that many minimum energy routing schemes for traditional mobile ad hoc network have been developed for this reason. This paper presents a novel minimum energy routing algorithm named Load-Balanced Minimum Energy Routing (LBMER) for WSNs considering both sensor nodes' energy consumption status and the sensor nodes'hierarchical congestion levels, which uses mixture of energy balance and traffic balance to solve the problem of "hot spots" of WSNs and avoid the situation of"hot spots" sensor nodes using their energy at much higher rate and die much faster than the other nodes. The path router established by LBMER will not be very congested and the traffic will be distributed evenly in the WSNs.Simulation results verified that the LBMER performance is better than that of Min-Hop routing and the existing minimum energy routing scheme MTPR (Total Transmission Power Routing).

  5. Simulation study for Mobile Ad hoc Networks Using DMAC Protocol

    Directory of Open Access Journals (Sweden)

    Vikas Sejwar

    2012-01-01

    Full Text Available This paper addresses the issue of deafness problem in Mobile Ad Hoc Networks (MANETs using directional antennas. Directional antennas arebeneficial for wireless ad hoc networks consisting of a collection of wireless hosts. A suitable Medium Access Control (MAC protocol must be designed to best utilize directional antennas. Deafness is caused whentwo nodes are in ongoing transmission and a third node (Deaf Node wants to communicate with one of that node. But it get no response because transmission of two nodes are in process. Though directional antennas offer better spatial reuse, but this problem can have a serious impact on network performance. A New DMAC (Directional Medium Access Control protocol uses flags in DNAV (Directional Network Allocation Vector tables to maintain information regarding the transmissionbetween the nodes in the network and their neighbor’s location. Two performance matrices have been used to show the impact of New DMAC algorithm on Deafness problem using simulator. These are RTS Failure Ratio and RTS Retransmission due to timeout

  6. Identification of node behavior for Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Khyati Choure , Sanjay Sharma

    2012-12-01

    Full Text Available In present scenario, in ad-hoc network, the behavior of nodes are not very stable. They do not work properly and satisfactory. They are not cooperative and acting selfishly. They show their selfishness to share their resources like bandwidth to save life of battery, they are not hasitate to block thepackets sent by others for forwarding and transmit their own packets. Due to higher Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols especially for these conditions have been developed during the last few years, to find optimized routes from a source to some destination.But it is still difficult to know the actual shortest path without attackers or bad nodes. Ad-hoc network suffer from the lot of issues i.e. congestion, Throughput, delay, security, network overhead. Packet delivery ratio is the issues of ongoing research. Cause of node failure may be either natural failure of node links or it may be due to act of an attacker or bad node which may degrade performance of network slowly or drastically, which also need to identify or determined. In this paper, we identify the good and bad nodes. A simulation has been performed to achieve better performance of modified AODV. Good result has been obtained in terms of Throughout, Packet Delivery Ratio.

  7. SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eduardo da Silva

    2016-01-01

    Full Text Available As a consequence of the particularities of Mobile Ad Hoc Networks (MANETs, such as dynamic topology and self-organization, the implementation of complex and flexible applications is a challenge. To enable the deployment of these applications, several middleware solutions were proposed. However, these solutions do not completely consider the security requirements of these networks. Based on the limitations of the existing solutions, this paper presents a new secure middleware, called Secure Middleware for Ad Hoc Networks (SEMAN, which provides a set of basic and secure services to MANETs aiming to facilitate the development of distributed, complex, and flexible applications. SEMAN considers the context of applications and organizes nodes into groups, also based on these contexts. The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. It has the following components: key management, trust management, and group management. All these components were developed and are described in this paper. They are supported by a cryptographic core and behave according to security rules and policies. The integration of these components provides security guarantees against attacks to the applications that usethe middleware services.

  8. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  9. An Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JingZheng; JinshuSu; KanYang

    2004-01-01

    In mobile ad hoc networks (MANET), nodes move freely and the distribution of access requests changes dynamically. Replica allocation in such a dynamic environment is a significant challenge. In this paoer, a dynamic adaptive replica allocation algorithm that can adapt to the nodes motion is proposed to minimize the communication cost of object access. When changes occur in the access requests of the object or the network topology, each replica node collects access requests from its neighbors and makes decisions locally to expand replica to neighbors or to relinquish the replica. The algorithm dynamically adapts the replica allocation scheme to a local optimal one. Simulation results show that our algorithms efficiently reduce the communication cost of object access in MANET environment.

  10. FDAN: Failure Detection Protocol for Mobile Ad Hoc Networks

    Science.gov (United States)

    Benkaouha, Haroun; Abdelli, Abdelkrim; Bouyahia, Karima; Kaloune, Yasmina

    This work deals with fault tolerance in distributed MANET (Mobile Ad hoc Networks) systems. However, the major issue for a failure detection protocol is to confound between a fault and a voluntary or an involuntary disconnection of nodes, and therefore to suspect correct nodes to be failing and conversely. Within this context, we propose in this paper a failure detection protocol that copes with MANET systems constraints. The aim of this work is to allow to the system to launch recovery process. For this effect, our protocol, called FDAN, is based on the class of heartbeat protocols. It takes into account: no preliminary knowledge of the network, the nodes disconnection and reconnection, resources limitation...Hence, we show that by using temporary lists and different timeout levels, we achieve to reduce sensibly the number of false suspicions.

  11. Mobile Advertisement in Vehicular Ad-Hoc Networks

    CERN Document Server

    Dobre, Ciprian

    2012-01-01

    Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of WiFi access points that dynamically disseminate data to clients running on the car's smart device. The approach can be considered an alternative to the static advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on specific topics. We present design solutions that use access points as emitters for transmitting messages to wireless-enabled devices equipped on vehicles. We also present implementation details for the evaluation of the proposed solution using a simulator designed for VANET application. The results show that the application can be used for transferring a significant amount of data even under difficult conditions, such as when cars are moving at increased speeds, or the congested Wi-Fi network causes significant packet loss...

  12. Parallel routing in Mobile Ad-Hoc Networks

    CERN Document Server

    Day, Khaled; Arafeh, Bassel; Alzeidi, Nasser; 10.5121/ijcnc.2011.3506

    2011-01-01

    This paper proposes and evaluates a new position-based Parallel Routing Protocol (PRP) for simultaneously routing multiple data packets over disjoint paths in a mobile ad-hoc network (MANET) for higher reliability and reduced communication delays. PRP views the geographical region where the MANET is located as a virtual 2-dimensional grid of cells. Cell-disjoint (parallel) paths between grid cells are constructed and used for building pre-computed routing tables. A single gateway node in each grid cell handles routing through that grid cell reducing routing overheads. Each node maintains updated information about its own location in the virtual grid using GPS. Nodes also keep track of the location of other nodes using a new proposed cell-based broadcasting algorithm. Nodes exchange energy level information with neighbors allowing energy-aware selection of the gateway nodes. Performance evaluation results have been derived showing the attractiveness of the proposed parallel routing protocol from different resp...

  13. TRUSTWORTHY ENABLED RELIABLE COMMUNICATION ARCHITECTURE IN MOBILE AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Saravanan Dhavamani

    2014-01-01

    Full Text Available Ad hoc networks are widely used in military and other scientific area. There are various kind of routing protocols are available to establish the route, with the proper analyzation one can choose the routing protocol to form their own network with respect to number of nodes and security considerations. The mobility of nodes makes the environment infrastructure less. It also has a certain number of characteristics which makes the security difficult. A trust recommendation mechanism has designed to keep track of node’s behavior to establish the trustworthiness of the network. Meanwhile with this trustworthiness a node can make objective judgment among another node’s trustworthiness to maintain whole system at a certain security level. The motivation of the work is to understanding the behavior or routing protocol and the trustworthiness.

  14. Remote Upload of Evidence over Mobile Ad Hoc Networks

    Science.gov (United States)

    Ray, Indrajit

    In this work, we report on one aspect of an autonomous robot-based digital evidence acquisition system that we are developing. When forensic investigators operate within a hostile environment they may use remotely operated unmanned devices to gather digital evidence. These systems periodically upload the evidence to a remote central server using a mobile ad hoc network. In such cases, large pieces of information need to be fragmented and transmitted in an appropriate manner. To support proper forensic analysis, certain properties must ensured for each fragment of evidence — confidentiality during communication, authenticity and integrity of the data, and, most importantly, strong evidence of membership for fragments. This paper describes a framework to provide these properties for the robot-based evidence acquisition system under development.

  15. Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    J. Molina-Gil

    2016-01-01

    Full Text Available Mobile ad hoc networks are formed spontaneously to use the wireless medium for communication among nodes. Each node in this type of network is its own authority and has an unpredictable behaviour. These features involve a cooperation challenge that has been addressed in previous proposals with methods based on virtual currencies. In this work, those methods have been simulated in NS-2 and the results have been analyzed, showing several weaknesses. In particular, it has been concluded that existent methods do not provide significant advances compared with networks without any mechanism for promoting cooperation. Consequently, this work presents three new proposals that try to solve those problems. The obtained results show that the new proposals offer significant improvements over previous schemes based on virtual currencies.

  16. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...... networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  17. On service differentiation in mobile Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清

    2004-01-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the Received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile.Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  18. Secure Routing and Data Transmission in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Waleed S. Alnumay

    2014-01-01

    Full Text Available In this paper, we present an identity (ID based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.

  19. SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Ali Dorri

    2015-02-01

    Full Text Available MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.

  20. On service differentiation in mobile Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清

    2004-01-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  1. Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Adwan Yasin

    2016-04-01

    Full Text Available In this paper we present a new algorithm for clustering MANET by considering several parameters. This is a new adaptive load balancing technique for clustering out Mobile Ad-hoc Networks (MANET. MANET is special kind of wireless networks where no central management exits and the nodes in the network cooperatively manage itself and maintains connectivity. The algorithm takes into account the local capabilities of each node, the remaining battery power, degree of connectivity and finally the power consumption based on the average distance between nodes and candidate cluster head. The proposed algorithm efficiently decreases the overhead in the network that enhances the overall MANET performance. Reducing the maintenance time of broken routes makes the network more stable, reliable. Saving the power of the nodes also guarantee consistent and reliable network.

  2. TCP Issues in Mobile Ad Hoc Networks: Challenges and Solutions

    Institute of Scientific and Technical Information of China (English)

    Wei-Qiang Xu; Tie-Jun Wu

    2006-01-01

    Mobile ad hoc networks (MANETs) are a kind of very complex distributed communication systems with wireless mobile nodes that can be freely and dynamically self-organized into arbitrary and temporary network topologies. MANETs inherit several limitations of wireless networks, meanwhile make new challenges arising from the specificity of MANETs, such as route failures, hidden terminals and exposed terminals. When TCP is applied in a MANET environment, a number of tough problems have to be dealt with. In this paper, a comprehensive survey on this dynamic field is given. Specifically, for the first time all factors impairing TCP performance are identified based on network protocol hierarchy, I.e., lossy wireless channel at the physical layer; excessive contention and unfair access at the MAC layer; frail routing protocol at the network layer, the MAC layer and the network layer related mobile node; unfit congestion window size at the transport layer and the transport layer related asymmetric path. How these factors degrade TCP performance is clearly explained. Then, based on how to alleviate the impact of each of these factors listed above, the existing solutions are collected as comprehensively as possible and classified into a number of categories, and their advantages and limitations are discussed. Based on the limitations of these solutions, a set of open problems for designing more robust solutions is suggested.

  3. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Santosh Kumar S

    2011-10-01

    Full Text Available A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories- direct mobility metrics and derived mobility metrics. These two mobility metrics has been used to measure different mobility models, this paper considers some of mobility models i.e Random Waypoint Model, Reference Point Group Mobility Model, Random Direction Mobility Model, Random Walk Mobility Model, Probabilistic Random Walk, Gauss Markov, Column Mobility Model, Nomadic Community Mobility Model and Manhattan Grid Model.

  4. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  5. High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks

    Science.gov (United States)

    2013-08-26

    hoc networks ( MANETS ) under practical assumptions. Several problems were posed and solved that provide insight into when and how interference alignment...REPORT High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Recent...investigations into the fundamental limits of mobile ad hoc networks have produced a physical layer method for approaching their capacity. This strategy, known

  6. Securing Mobile Ad hoc Networks:Key Management and Routing

    CERN Document Server

    Chauhan, Kamal Kumar; 10.5121/ijans.2012.2207

    2012-01-01

    Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network's topology causes weak trust relationship among the nodes in the network. In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs ...

  7. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    Science.gov (United States)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  8. Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks

    Science.gov (United States)

    Wang, Junfang; Xie, Bin; Agrawal, Dharma P.

    A wireless mesh network (WMN) is a particular type of mobile ad hoc network (MANET), which aims to provide ubiquitous high bandwidth access for a large number of users. A pure MANET is dynamically formed by mobile devices without the requirement of any existing infrastructure or prior network configuration. Similar to MANETs, a WMN also has the ability of self-organization, self-discovering, self-healing, and self-configuration. However, a WMN is typically a collection of stationary mesh routers (MRs) with each employing multiple radios. Some MRs have wired connections and act as the Internet gateways (IGWs) to provide Internet connectivity for other MRs. These new features of WMNs over MANETs enable them to be a promising alternative for high broadband Internet access. In this chapter, we elaborate on the evolution from MANETs to WMNs and provide a comprehensive understanding of WMNs from theoretical aspects to practical protocols, while comparing it with MANETs. In particular, we focus on the following critical issues with respect to WMN deployment: Network Capacity, Positioning Technique, Fairness Transmission and Multiradio Routing Protocols. We end this chapter with some open problems and future directions in WMNs.

  9. ADAPTIVE SERVICE PROVISIONING FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Cynthia Jayapal

    2010-09-01

    Full Text Available Providing efficient and scalable service provisioning in Mobile Ad Hoc Network (MANET is a big research challenge. In adaptive service provisioning mechanism an adaptive election procedure is used to select a coordinator node. The role of a service coordinator is crucial in any distributed directory based service provisioning scheme. The existing coordinator election schemes use either the nodeID or a hash function to choose the coordinator. In these schemes, the leader changes are more frequent due to node mobility. We propose an adaptive scheme that makes use of an eligibility factor that is calculated based on the distance to the zone center, remaining battery power and average speed to elect a core node that change according to the network dynamics. We also retain the node with the second highest priority as a backup node. Our algorithm is compared with the existing solution by simulation and the result shows that the core node selected by us is more stable and hence reduces the number of handoffs. This in turn improves the service delivery performance by increasing the packet delivery ratio and decreasing the delay, the overhead and the forwarding cost.

  10. Maximizing the Effective Lifetime of Mobile Ad Hoc Networks

    Science.gov (United States)

    Hossain, M. Julius; Dewan, M. Ali Akber; Chae, Oksam

    This paper presents a new routing approach to extend the effective lifetime of mobile ad hoc networks (MANET) considering both residual battery energy of the participating nodes and routing cost. As the nodes in ad hoc networks are limited in power, a power failure occurs if a node has insufficient remaining energy to send, receive or forward a message. So, it is important to minimize the energy expenditure as well as to balance the remaining battery power among the nodes. Cost effective routing algorithms attempt to minimize the total power needed to transmit a packet which causes a large number of nodes to loose energy quickly and die. On the other hand, lifetime prediction based routing algorithms try to balance the remaining energies among the nodes in the networks and ignore the transmission cost. These approaches extend the lifetime of first few individual nodes. But as nodes spend more energy for packet transfer, power failures occurs, within short interval resulting more number of total dead node earlier. This reduces the effective lifetime of the network, as at this stage successful communication is not possible due to the lack of forwarding node. The proposed method keeps the transmission power in modest range and at the same time tries to reduce the variance of the residual energy of the nodes more effectively to obtain the highest useful lifetime of the networks in the long run. Nonetheless, movement of nodes frequently creates network topology changes via link breaks and link creation and thus effects on the stability of the network. So, the pattern of the node movement is also incorporated in our route selection procedure.

  11. A Cluster Maintenance Algorithm Based on Relative Mobility for Mobile Ad Hoc Network Management

    Institute of Scientific and Technical Information of China (English)

    SHENZhong; CHANGYilin; ZHANGXin

    2005-01-01

    The dynamic topology of mobile ad hoc networks makes network management significantly more challenging than wireline networks. The traditional Client/Server (Manager/Agent) management paradigm could not work well in such a dynamic environment, while the hierarchical network management architecture based on clustering is more feasible. Although the movement of nodes makes the cluster structure changeable and introduces new challenges for network management, the mobility is a relative concept. A node with high relative mobility is more prone to unstable behavior than a node with less relative mobility, thus the relative mobility of a node can be used to predict future node behavior. This paper presents the cluster availability which provides a quantitative measurement of cluster stability. Furthermore, a cluster maintenance algorithm based on cluster availability is proposed. The simulation results show that, compared to the Minimum ID clustering algorithm, our algorithm successfully alleviates the influence caused by node mobility and make the network management more efficient.

  12. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  13. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  14. Real Time Experimental Analysis of Mobile Ad-Hoc Traffic in Indoor and Outdoor Environment

    Directory of Open Access Journals (Sweden)

    P.C.Kishore Raja

    2015-06-01

    Full Text Available The use of mobile ad hoc network varies from collaborative computing to time critical applications in indoor and outdoor environment. Mobility of ad hoc network makes very attractive in all areas of mobile applications. Connection sustainability is the main problem in wireless ad hoc network. This paper analyse straight up, flat topologies of mobile ad hoc traffic in indoor and outdoor environment in real time campus network and evaluate the scenarios based on performance metrics. The results show that the mobiles nodes in straight up and flat topologies are affected by connection, mobility and obstacles with all other topologies. It is also observed that straight up static topology for indoor shows better performance in all metrics.

  15. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    Science.gov (United States)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  16. QUEUEING MODELS IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    S. Baskar

    2014-01-01

    Full Text Available The Mobile Ad-hoc Networks (MANETs has gain an essential part of the attention of researchers and become very well-liked in last few years. MANETs can operate with no fixed communications and can live rapid changes in the network topology. They can be studied officially as graphs in which the set of boundaries varies in time. One of the main methods to determine the presentation of MANETs is simulation. This study proposes Enhanced Probabilistic Adhoc on Demand Distance Vector (EPAODV routing protocol, which solves the broadcast storm problem of Adhoc on Demand Distance Vector (AODV. Our evaluation of MANETs is based on the evaluation of the throughput, end to end delay and packet delivery ratio. We evaluated the end to end delay as it is one of the most important characteristic evaluation metric in computer networks. In our proposed algorithm, using a queueing model M/M/C: ∞/FIFO, we are able to enhance that better results are obtained in the case EPAODV protocol such as increasing throughput, data delivery ratio and then decreasing the end delay compare to the existing protocols.

  17. Reliable Mobile Ad-Hoc Network Routing Using Firefly Algorithm

    Directory of Open Access Journals (Sweden)

    D Jinil Persis

    2016-05-01

    Full Text Available Routing in Mobile Ad-hoc NETwork (MANET is a contemporary graph problem that is solved using various shortest path search techniques. The routing algorithms employed in modern routers use deterministic algorithms that extract an exact non-dominated set of solutions from the search space. The search efficiency of these algorithms is found to have an exponential time complexity in the worst case. Moreover this problem is a multi-objective optimization problem in nature for MANET and it is required to consider changing topology layout. This study attempts to employ a formulation incorporating objectives viz., delay, hop-distance, load, cost and reliability that has significant impact on network performance. Simulation with different random topologies has been carried out to illustrate the implementation of an exhaustive search algorithm and it is observed that the algorithm could handle small-scale networks limited to 15 nodes. A random search meta-heuristic that adopts the nature of firefly swarm has been proposed for larger networks to yield an approximated non-dominated path set. Firefly Algorithm is found to perform better than the exact algorithm in terms of scalability and computational time.

  18. Enhancing Node Cooperation in Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    S. Kami Makki

    2013-03-01

    Full Text Available Mobile Ad Hoc Networks (MANET have been a research interest over the past few years, yet, node cooperation has continually been a recognized issue for researchers. Because of their lack of infrastructure, MANETS depend on the cooperation of intermediate nodes in order to forward or send packets of their own to other nodes in the network. Therefore, nodes located in the central area of the network are used more frequently than the nodes located on the outer boundary. The inner nodes have to forward the packets of other nodes and if there is no payoff for forwarding the packets, the nodes may start to refrain from forwarding the packets of others to save their energy. The Community Enforcement Mechanism has been proposed to force the cooperation of among the nodes and reduce their misbehavior. Although, it provides cooperation among the nodes, it does not essentially increase the network life. In this paper, we present an efficient algorithm to improve the longevity of a MANET based upon more structured nodes cooperation.

  19. Design of the next generation cognitive mobile ad hoc networks

    Science.gov (United States)

    Amjad, Ali; Wang, Huiqiang; Chen, Xiaoming

    Cognition capability has been seen by researchers as the way forward for the design of next generation of Mobile Ad Hoc Networks (MANETs). The reason why a cognitive paradigm would be more suited to a MANET is because MANETs are highly dynamic networks. The topology may change very frequently during the operation of a MANET. Traffic patterns in MANETs can vary from time to time depending on the need of the users. The size of a MANET and node density is also very dynamic and may change without any predictable pattern. In a MANET environment, most of these parameters may change very rapidly and keeping track of them manually would be very difficult. Previous studies have shown that the performance of a certain routing approach in MANETs is dependent on the size of the network and node density. The choice of whether to use a reactive or proactive routing approach comes down to the network size parameter. Static or offline approaches to fine tune a MANET to achieve certain performance goals is hence not very productive as a lot of these parameters keep changing during the course of operation of MANETs. Similarly, the performance of MANETs would improve greatly if the MAC layer entity could operate in a more flexible manner. In this paper we propose a cognitive MANET design that will ensure that all these dynamic parameters are automatically monitored and decisions are based on the current status of these parameters.

  20. Data management issues in mobile ad hoc networks

    Science.gov (United States)

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  1. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    OpenAIRE

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. H...

  2. A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas

    Directory of Open Access Journals (Sweden)

    Himadri Nath Saha

    2012-04-01

    Full Text Available Many security schemes for mobile ad-hoc network(MANET have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA. Our simulation results show how cellular automata(CA is implemented for user authentication and secure transmission in MANET.

  3. An Analysis Framework for Mobility Metrics in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Xu Sanlin

    2007-01-01

    Full Text Available Mobile ad hoc networks (MANETs have inherently dynamic topologies. Under these difficult circumstances, it is essential to have some dependable way of determining the reliability of communication paths. Mobility metrics are well suited to this purpose. Several mobility metrics have been proposed in the literature, including link persistence, link duration, link availability, link residual time, and their path equivalents. However, no method has been provided for their exact calculation. Instead, only statistical approximations have been given. In this paper, exact expressions are derived for each of the aforementioned metrics, applicable to both links and paths. We further show relationships between the different metrics, where they exist. Such exact expressions constitute precise mathematical relationships between network connectivity and node mobility. These expressions can, therefore, be employed in a number of ways to improve performance of MANETs such as in the development of efficient algorithms for routing, in route caching, proactive routing, and clustering schemes.

  4. Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    G. Satyachellayi

    2014-08-01

    Full Text Available There are several services that build on the availability of closest node location information like geographic routing in spontaneous networks, data gathering in sensor networks, movement coordination among autonomous robotic nodes, location specific services for hand held devices and danger warning or traffic monitoring in vehicular networks. Ad hoc networking protocols and location-aware services require that mobile nodes identify the location of their closest nodes. Such a process can be easily misuses or stop by opposed nodes. In absence of a priori trusted nodes, the spotting and identifying of closest node position presents challenges that have been scarcely investigated in the literature. Node can also send message from one to many nodes in a broadcasting manner here.

  5. Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Shah, Rutuja; Subramaniam, Sumathy; Lekala Dasarathan, Dhinesh Babu

    2016-01-01

    Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination...

  6. Modeling of Ad-hoc and Infrastructure Dual Mode Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Yi-Hung Chen; Hui-Nien Hung; Yi-Bing Lin; Nan-Fu Peng

    2005-01-01

    This paper investigates a mobile telecommunications system that supports both ad hoc and infrastructure mode operations. Based on analytic and simulation models, our study investigates how base station (BS) and ad hoc channel capacity, and the mobility and locality of mobile stations affect the performance of a dual mode system. We show that a dual mode system can significantly outperform a single mode (infrastructure) system when the degree of locality is high. Furthermore, a dual mode system can support much faster mobile users with less BS channels in comparison to an infrastructure mode system. Our study quantitatively identifies the threshold value for the number of ad hoc channels such that beyond this threshold, increasing ad hoc channel capacity will not improve the performance of a dual mode system.

  7. Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Chaudhary

    2014-01-01

    Full Text Available Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gateway based security mechanisms cannot be applied on it. That’s why intrusion detection systems are used as keystone in these networks. Many number of intrusion detection systems have been discovered to handle the uncertain activity in mobile ad hoc networks. This paper emphasized on proposed fuzzy based intrusion detection systems in mobile ad hoc networks and presented their effectiveness to identify the intrusions. This paper also examines the drawbacks of fuzzy based intrusion detection systems and discussed the future directions in the field of intrusion detection for mobile ad hoc networks.

  8. Mobile Codes Localization in Ad hoc Networks: a Comparative Study of Centralized and Distributed Approaches

    CERN Document Server

    Zafoune, Youcef; kanawati, Rushed; 10.5121/ijcnc.2010.2213

    2010-01-01

    This paper presents a new approach in the management of mobile ad hoc networks. Our alternative, based on mobile agent technology, allows the design of mobile centralized server in ad hoc network, where it is not obvious to think about a centralized management, due to the absence of any administration or fixed infrastructure in these networks. The aim of this centralized approach is to provide permanent availability of services in ad hoc networks which are characterized by a distributed management. In order to evaluate the performance of the proposed approach, we apply it to solve the problem of mobile code localization in ad hoc networks. A comparative study, based upon a simulation, of centralized and distributed localization protocols in terms of messages number exchanged and response time shows that the centralized approach in a distributed form is more interesting than a totally centralized approach.

  9. A survey of message diffusion portocols in mobile ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, A.M.; Ibrahim, M.; Simon, V.; Varga, E.; Carreras, I.

    2008-01-01

    For the last twenty years, mobile communications have experienced an explosive growth. In particular, one area of mobile communication, the Mobile Ad hoc Networks (MANETs), has attracted significant attention due to its multiple applications and its challenging research problems. On the other hand,

  10. Robust message routing for mobile (wireless) ad hoc networks.

    Energy Technology Data Exchange (ETDEWEB)

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie (Sandia National Laboratories, Albuquerque, NM); Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M. (University of Illinois, Urbana, IL)

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  11. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  12. On-Demand Key Distribution for Mobile Ad-Hoc Networks

    Science.gov (United States)

    2007-03-01

    ON-DEMAND KEY DISTRIBUTION FOR MOBILE AD-HOC NETWORKS THESIS Mr. Daniel F . Graham AFIT...for the Degree of Master of Science in Computer Science Mr. Daniel F . Graham, BS March 2007 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION...UNLIMITED AFIT/GCS/ENG/07-12 ON-DEMAND KEY DISTRIBUTION FOR MOBILE AD-HOC NETWORKS Mr. Daniel F . Graham, BS

  13. Power and Mobility-Aware Adaptive Dynamic Source Routing in Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XULi; ZHENGBaoyu; YANGZhen

    2005-01-01

    MANET (Mobile ad hoc network) is characterized by a highly dynamic network topology. This makes routing discovery and maintenance challenging for routing protocol design. On the other hand, energy efficient routing may be another important design criterion for MANET since most of nodes are usually powered by battery with limited capacity. With optimization of DSR (Dynamic source routing) protocol, this paper proposes Power and mobility-aware adaptive dynamic source routing (PMADSR). The new routing protocol can be aware of the mobility and remaining battery capacity of nodes. Performance simulation results show that the proposed PMADSR protocol can dynamically balance the traffic load inside the whole network, so as to prolong the network lifetime, as well as achieve higher throughput.

  14. Review of Artificial Immune System to Enhance Security in Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Tarun Dalal

    2012-04-01

    Full Text Available Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not fixed in a Mobile Adhoc Network; due to host mobility topology can change any time. Mobile Ad-hoc Networks are much more vulnerable to security attacks. Current research works on securing Mobile Adhoc Networks mainly focus on confidentiality, integrity,authentication, availability, and fairness. Design of routingprotocols is very much crucial in Mobile Ad-hoc Network. There are various techniques for securing Mobile Ad-hoc Network i.e. cryptography. Cryptography provides efficient mechanism to provide security, but it creates very much overhead. So, an approach is used which is analogous to Biological Immune System, known as Artificial Immune System (AIS. There is a reason of AIS to be used for security purposes because the Human Immune System (HIS protects the body against damage from an extremely large number of harmfulbacteria, viruses, parasites and fungi, termed pathogens. It doesthis largely without prior knowledge of the structure of thesepathogens. AIS provide security by determining non-trusted nodes and eliminate all non-trusted nodes from the network.

  15. Managing heterogeneous networks of mobile and stationary sensors

    Science.gov (United States)

    Bürkle, Axel; Solbrig, Peter; Segor, Florian; Bulatov, Dimitri; Wernerus, Peter; Müller, Sven

    2011-11-01

    Protecting critical infrastructure against intrusion, sabotage or vandalism is a task that requires a comprehensive situation picture. Modern security systems should provide a total solution including sensors, software, hardware, and a "control unit" to ensure complete security. Incorporating unmanned mobile sensors can significantly help to close information gaps and gain an ad hoc picture of areas where no pre-installed supervision infrastructure is available or damaged after an incident. Fraunhofer IOSB has developed the generic ground control station AMFIS which is capable of managing sensor data acquisition with all kinds of unattended stationary sensors, mobile ad hoc sensor networks, and mobile sensor platforms. The system is highly mobile and able to control various mobile platforms such as small UAVs (Unmanned Aerial Vehicles) and UGVs (Unmanned Ground Vehicles). In order to establish a real-time situation picture, also an image exploitation process is used. In this process, video frames from different sources (mainly from small UAVs) are georeferenced by means of a system of image registration methods. Relevant information can be obtained by a motion detection module. Thus, the image exploitation process can accelerate the situation assessment significantly.

  16. HEAD: A Hybrid Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    QUO Jianli; LIU Hongwei; DONG Jian; YANG Xiaozong

    2007-01-01

    Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding. However, it may not be advantageous for individual nodes to cooperate. In order to make the mobile ad hoc network more robust, we propose a scheme called HEAD (a hybrid mechanism to enforce node cooperation in mobile ad hoc networks) to make the misbehavior unattractive. HEAD is an improvement to OCEAN (observation-based cooperation enforcement in ad hoc networks). It employs only first hand information and works on the top of DSR (dynamic source routing) protocol. By interacting with the DSR, HEAD can detect the misbehavior nodes in the packet forwarding process and isolate them in the route discovery process. In order to detect the misbehavior nodes quickly, HEAD introduces the warning message. In this paper, we also classify the misbehavior nodes into three types: malicious nodes, misleading nodes, and selfish nodes. They all can be detected by HEAD, and isolated from the network.

  17. A novel technique for node authentication in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Srinivas Aluvala

    2016-09-01

    Full Text Available Mobile ad hoc network is a collection of nodes in mobility that communicate to one another forming a network through wireless links, in which each node acts a router and forward packets to destinations. The dynamic topology and self-organizing of the nodes make them more vulnerable to the network. In MANET, the major challenging task is to provide security during the routing of data packets. Various kinds of attacks have been studied in ad hoc networks, but no proper solution found for these attacks. So, preventing the malicious nodes from destroying the network plays vital role in ad hoc networks. In this paper, a novel technique has been proposed to provide node authentication while a new node joining into the network and before initiating route discovery process in mobile ad hoc networks. Also shown how the proposed technique mitigates the impact of attacks on nodes.

  18. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    Science.gov (United States)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  19. A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks

    CERN Document Server

    Pathan, Al-Sakib Khan; Sayeed, Sabit Anjum; Ahmed, Farruk; Hong, Choong Seon

    2007-01-01

    In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks the easiest solution for their interconnection. This has led to the rapid growth of several wireless systems like wireless ad hoc networks, wireless sensor networks etc. In this paper we have proposed a framework for rural development by providing various e-services to the rural areas with the help of wireless ad hoc and sensor networks. We have discussed how timely and accurate information could be collected from the rural areas using wireless technologies. In addition to this, we have also mentioned the technical and operational challenges that could hinder the implementation of such a framework in the rural areas in the developing countries.

  20. A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    CERN Document Server

    Rizvi, Syed S

    2009-01-01

    The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors that strongly motivate a mobile node to deny packet forwarding for others, while at the same time use their services to deliver its own data. This behavior of an independent mobile node is commonly known as misbehaving or selfishness. A vast amount of research has already been done for minimizing malicious behavior of mobile nodes. However, most of them focused on the methods/techniques/algorithms to remove such nodes from the MANET. We believe that the frequent elimination of such miss-behaving nodes never allowed a free and faster growth of MANET. This paper provides a critical analysis of the recent research wok and ...

  1. Development of Innovative and Inexpensive Optical Sensors in Wireless Ad-hoc Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Mollenhauer, Hannes; Schima, Robert; Assing, Martin; Mollenhauer, Olaf; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    Due to the heterogeneity and dynamic of ecosystems, the observation and monitoring of natural processes necessitate a high temporal and spatial resolution. This also requires inexpensive and adaptive measurements as well as innovative monitoring strategies. To this end, the application of ad-hoc wireless sensor networks holds the potential of creating an adequate monitoring platform. In order to achieve a comprehensive monitoring in space and time with affordability, it is necessary to reduce the sensor costs. Common investigation methods, especially with regard to vegetation processes, are based on optical measurements. In particular, different wavelengths correspond to specific properties of the plants and preserve the possibility to derive information about the ecosystem, e.g. photosynthetic performance or nutrient content. In this context, photosynthetically active radiation (PAR) sensors and hyperspectral sensors are in major use. This work aims the development, evaluation and application of inexpensive but high performance optical sensors for the implementation in wireless sensor networks. Photosynthetically active radiation designates the spectral range from 400 to 700 nanometers that photosynthetic organisms are able to use in the process of photosynthesis. PAR sensors enable the detection of the reflected solar light of the vegetation in the whole PAR wave band. The amount of absorption indicates photosynthetic activity of the plant, with good approximation. Hyperspectral sensors observe specific parts or rather distinct wavelengths of the solar light spectrum and facilitate the determination of the main pigment classes, e.g. Chlorophyll, Carotenoid and Anthocyanin. Due to the specific absorption of certain pigments, a characteristic spectral signature can be seen in the visible part of the electromagnetic spectrum, known as narrow-band peaks. In an analogous manner, also the presence and concentration of different nutrients cause a characteristic spectral

  2. An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Tapan Kumar Godder

    2011-05-01

    Full Text Available Ad-hoc network is set up with multiple wireless devices without any infrastructure. Its employment is favored in many environments. Quality of Service (QoS is one of the main issues for any network and due to bandwidth constraint and dynamic topology of mobile ad hoc networks, supporting Quality of Service (QoS is extremely a challenging task. It is modeled as a multi-layer problem and is considered in both Medium Access Control (MAC and routing layers for ad hoc networks. Ad-hoc On-demand Distance Vector (AODV routing protocol is one of the most used and popular reactive routing protocols in ad-hoc networks. This paper proposed a new protocol QoS based AODV (QAODV which is a modified version of AODV.

  3. Review Strategies and Analysis of Mobile Ad Hoc Network- Internet Integration Solutions

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar

    2010-07-01

    Full Text Available The desire to be connected anytime and anywhere has led to the development of wireless networks, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad Hoc Networks (MANETs use portable devices such as mobile phones, laptops or personal digital assistants (PDAs for spontaneous establishment of communication. Most existing research in the area of mobile Ad Hoc Networks is limited to stand-alone isolated networks. But connectivity of a mobile Ad Hoc network to the Internet is also desirable as more and more applications and services in our society now depend on fixed infrastructure networks. It is therefore important that dynamically deployed wireless Ad Hoc networks should also gain access to these fixed networks and their services. The integration of MANETs into Internet increases the networking flexibility and coverage of existing infrastructure networks. Although researchers have proposed many solutions, but it is still unclear which one offer the best performance compared to the others. When an Ad Hoc network is connected to Internet, it is important for the mobile nodes to detect efficiently available Internet gateways providing access to the Internet. Internet gateway discovery time and handover delay have strong influence on packet delay and throughput. The key challenge in providing connectivity is to minimize the overhead of mobile IP and Ad Hoc routing protocol between Internet and Ad Hoc networks. There, this paper focuses on proposed technical solutions on Internet gateway discovery and also we briefly describe different ways to provide global Internet access for MANETs. Finally, some challenges are also mentioned which need in depth investigation.

  4. A Simplified Mobile Ad Hoc Network Structure for Helicopter Communication

    Directory of Open Access Journals (Sweden)

    Abdeldime Mohamed Salih Abdelgader

    2016-01-01

    Full Text Available There are a number of volunteer and statutory organizations who are capable of conducting an emergency response using helicopters. Rescue operations require a rapidly deployable high bandwidth network to coordinate necessary relief efforts between rescue teams on the ground and helicopters. Due to massive destruction and loss of services, ordinary communication infrastructures may collapse in these situations. Consequently, information exchange becomes one of the major challenges in these circumstances. Helicopters can be also employed for providing many services in rugged environments, military applications, and aerial photography. Ad hoc network can be used to provide alternative communication link between a set of helicopters, particularly in case of significant amount of data required to be shared. This paper addresses the ability of using ad hoc networks to support the communication between a set of helicopters. A simplified network structure model is presented and extensively discussed. Furthermore, a streamlined routing algorithm is proposed. Comprehensive simulations are conducted to evaluate the proposed routing algorithm.

  5. An Enhanced Route Recovery Protocol for Mobile Ad Hoc Networks

    Science.gov (United States)

    Kim, Sangkyung; Park, Noyeul; Kim, Changhwa; Choi, Seung-Sik

    In case of link failures, many ad hoc routing protocols recover a route by employing source-initiated route re-discovery, but this approach can degrade system performance. Some use localized route recovery, which may yield non-optimal paths. Our proposal provides a mechanism that can enhance the overall routing performance by initiating route recovery at the destination node. We elucidate the effects through simulations including comparisons with AODV and AODV with local repair.

  6. Beamspace Multiple Input Multiple Output. Part II: Steerable Antennas in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-09-01

    Networks with Beamforming Antennas.” Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (pp. 95–105). October...4–5, Long Beach, CA. ACM . 19. Choudhury, R. R., X. Yang, R. Ramanathan, and N. H. Vaidya. 2002. “Using Directional Antennas for Medium Access...Atlanta, GA. ACM . 20. Ramanathan, R., J. Redi, J., C. Santivanez, D. Wiggins, and S. Polit. 2005. “Ad Hoc Networking with Directional Antennas: A

  7. A quality of service routing protocol based on mobility prediction in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    王建新; 邓曙光; 陈松乔; 陈建二

    2003-01-01

    A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2)When another path is built for the same QoS requirements, the original path has higher priority.(3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource-Reserve and reconnect packets at the same time, it selects reconnect packet over Resource-Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks.

  8. A Prototype System for Using Multiple Radios in Directional MANET (Mobile Ad Hoc Network): A NISE Funded Applied Research Project

    Science.gov (United States)

    2013-09-01

    Technical Document 3276 September 2013 A Prototype System for using Multiple Radios in Directional MANET (Mobile Ad Hoc Network) A...point, it is difficult to employ directional antennas in a mobile ad hoc network ( MANET ) as most current radio and wireless networking protocols were...September 2013 Final A Prototype System for Using Multiple Radios in Directional MANET (Mobile Ad Hoc Network) A NISE funded Applied Research

  9. Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

    Directory of Open Access Journals (Sweden)

    Yuan Li

    2010-12-01

    Full Text Available in this paper, a quality of service (QoS multicast routing protocol in mobile ad hoc networks (MANETs by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel on-demand QoS multicasting routing algorithm in TDMA-based mobile ad hoc networks using directional antennas. The simulation result shows the performance of this QoS multicast routing algorithm in TDMA-based mobile ad hoc networks using directional antennas.

  10. Performance Comparison Study of Connected Dominating Set Algorithms for Mobile Ad hoc Networks under Different Mobility Models

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The high-level contribution of this paper is an exhaustive simulation-based comparison study of three categories (density, node id and stability-based of algorithms to determine connected dominating sets (CDS for mobile ad hoc networks and evaluate their performance under two categories (random node mobility and grid-based vehicular ad hoc network of mobility models. The CDS algorithms studied are the maximum density-based (MaxD-CDS, node ID-based (ID-CDS and the minimum velocity-based (MinV-CDS algorithms representing the density, node id and stability categories respectively. The node mobility models used are the Random Waypoint model (representing random node mobility and the City Section and Manhattan mobility models (representing the grid-based vehicular ad hoc networks. The three CDS algorithms under the three mobility models are evaluated with respect to two critical performance metrics: the effective CDS lifetime (calculated taking into consideration the CDS connectivity and absolute CDS lifetime and the CDS node size. Simulations are conducted under a diverse set of conditions representing low, moderate and high network density, coupled with low, moderate and high node mobility scenarios. For each CDS, the paper identifies the mobility model that can be employed to simultaneously maximize the lifetime and minimize the node size with minimal tradeoff. For the two VANET mobility models, the impact of the grid block length on the CDS lifetime and node size is also evaluated.

  11. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    Science.gov (United States)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  12. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  13. Distributed geolocation algorithm in mobile ad hoc networks using received signal strength differences

    Science.gov (United States)

    Guo, Shanzeng; Tang, Helen

    2012-05-01

    Future military wireless communication in a battlefield will be mobile ad hoc in nature. The ability to geolocate and track both friendly forces and enemies is very important in military command and control operations. However, current mobile ad hoc networks (MANET) have no capabilities to geolocate radio emitters that belong to enemy mobile ad hoc networks. This paper presents a distributed geolocation algorithm using received signal strength differences to geolocate enemy radio emitters by leveraging friendly force MANET infrastructure, and proposes a communication protocol for radio emitter geolocation applications. An enemy's radio emitter signal is detected, and its signal strength is measured by the nodes in a friendly mobile ad hoc network. The identity of the enemy radio emitter is extracted from the decoded message header of the medium access control layer. By correlating and associating the enemy's radio emitter identity with its received signal strength, the enemy radio emitter is identified. The enemy's radio emitter identity and its received signal strength are distributed and shared among friendly mobile ad hoc nodes. Using received signal strength differences, a master friendly node can calculate the enemy's radio emitter geolocation, and build a recognized MANET picture (RMP). This MANET picture is then distributed to all friendly nodes for effective command and control operations. An advantage of this method is that mobile ad hoc nodes do not need special RF antennas to geolocate the enemy radio emitter as conventional electronic warfare techniques do. MATLAB-based simulations are presented to evaluate the accuracy and reliability of the proposed distributed geolocation algorithm under different MANET placements.

  14. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...... core network in assigning network address prefixes to gateways in mobile ad-hoc networks. This paper focuses on how CP-nets and the CPN computer tools have been applied in the development of ERDP. A CPN model has been constructed that constitutes a formal executable specification of ERDP. Simulation...

  15. A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. R. Biradar

    2010-03-01

    Full Text Available We describe a variant of TCP (Tahoe, Vegas, TCP is most widely used transport protocol in both wired and wireless networks. In mobile ad hoc networks, the topology changes frequently due to mobile nodes, this leads to significant packet losses and network throughput degradation. This is due to the fact that TCP fails to distinguish the path failure and network congestion. In this paper, the performances of TCP over different routing (DSR, AODV and DSDV protocols in ad hoc networks wasstudied by simulation experiments and results are reported.

  16. Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks

    CERN Document Server

    Mehta, Neil; Wang, Wenye

    2011-01-01

    Mobile ad hoc networks (MANETs) are self-configuring wireless networks that lack permanent infrastructure and are formed among mobile nodes on demand. Rapid node mobility results in dramatic channel variation, or fading, that degrades MANET performance. Employing channel state information (CSI) at the transmitter can improve the throughput of routing and medium access control (MAC) protocols for mobile ad hoc networks. Several routing algorithms in the literature explicitly incorporate the fading signal strength into the routing metric, thus selecting the routes with strong channel conditions. While these studies show that adaptation to the time-variant channel gain is beneficial in MANETs, they do not address the effect of the outdated fading CSI at the transmitter. For realistic mobile node speeds, the channel gain is rapidly varying, and becomes quickly outdated due the feedback delay. We analyze the link throughput of joint rate adaptation and adaptive relay selection in the presence of imperfect CSI. Mor...

  17. Energy generation for an ad hoc wireless sensor network-based monitoring system using animal head movement

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Blanes-Vidal, Victoria; Jørgensen, Rasmus Nyholm

    2011-01-01

    The supply of energy to electronics is an imperative constraining factor to be considered during the design process of mobile ad hoc wireless sensor networks (MANETs). This influence is especially important when the MANET is deployed unattended or the wireless modules within the MANET are not eas......The supply of energy to electronics is an imperative constraining factor to be considered during the design process of mobile ad hoc wireless sensor networks (MANETs). This influence is especially important when the MANET is deployed unattended or the wireless modules within the MANET...... accessible; however, animal movement can be potentially used to generate energy. In this study, the head movements of individual sheep in a flock during grazing were monitored in order to investigate the amount of energy that can be generated by these movements. By applying the Lagrange–d’Alembert Principle...... to this problem, the equations of motion from each neck-mounted sensor as well as the amount of mechanical energy generated per time instant (each second) during upward and downward head movements were calculated. This resulted in the production of 857 mW and 1660 mW during the downward and upward movements...

  18. Mobile Zigbee Sensor Networks

    CERN Document Server

    Anantdeep, Er; Kaur, Er Balpreet

    2010-01-01

    OPNET Modeler accelerates network R&D and improves product quality through high-fidelity modeling and scalable simulation. It provides a virtual environment for designing protocols and devices, and for testing and demonstrating designs in realistic scenarios prior to production. OPNET Modeler supports 802.15.4 standard and has been used to make a model of PAN. Iterations have been performed by changing the Power of the transmitter and the throughput will has been analyzed to arrive at optimal values.An energy-efficient wireless home network based on IEEE 802.15.4, a novel architecture has been proposed. In this architecture, all nodes are classified into stationary nodes and mobile nodes according to the functionality of each node. Mobile nodes are usually battery-powered, and therefore need low-power operation. In order to improve power consumption of mobile nodes, effective handover sequence based on MAC broadcast and transmission power control based on LQ (link quality) are employed. Experimental resul...

  19. A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2014-12-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  20. Study of Impact of Mobile Ad hoc Networking and its Future Applications

    Directory of Open Access Journals (Sweden)

    Ashema Hasti

    2012-01-01

    Full Text Available Today, many people carry numerous portable devices, such as laptops, mobile phones, PDAs and mp3 players, for use in their professional and private lives. For the most part, these devices are used separately-that is, their applications do not interact. Imagine, however, if they could interact directly: participants at a meeting could share documents or presentations; all communication could automatically be routed through the wireless corporate campus network. These examples of spontaneous, ad hoc wireless communication between devices might be loosely defined as a scheme, often referred to as ad hoc networking, which allows devices to establish communication, anytime and anywhere without the aid of a central infrastructure. This paper describes the concept of mobile ad hoc networking (MANET and points out some of its applications that can be envisioned for future. Also, the paper presents two of the technical challenges MANET poses, which include Geocasting and QoS.

  1. A SURVEY OF CONGESTION CONTROL IN PROACTIVE SOURCE ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2015-10-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  2. A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    HU Zhi-gang; MA Hao; WANG Guo-jun; LIAO Lin

    2005-01-01

    A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad hoc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol.

  3. A Distributed Authentication Algorithm Based on GQ Signature for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    YAO Jun; ZENG Gui-hua

    2006-01-01

    Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.

  4. A Secure and Pragmatic Routing Protocol for Mobile Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LIU Zhi-yuan

    2008-01-01

    An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Because of node mobility and power limitations, the network topology changes frequently. Routing protocol plays an important role in the ad hoc network. A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. As an optimization for the current Dynamic Source Routing Protocol, a secure and pragmatic routes selection scheme based on Reputation Systems was proposed. We design the Secure and Pragmatic Routing protocol and implement simulation models using GloMoSim. Simulation results show that the Secure and Pragmatic Routing protocol provides better experimental results on packet delivery ratio, power consumption and system throughput than Dynamic Source Routing Protocol.

  5. Cluster head Election for CGSR Routing Protocol Using Fuzzy Logic Controller for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    K. Venkata Subbaiah

    2010-01-01

    Full Text Available The nodes in the mobile ad hoc networks act as router and host, the routing protocol is the primary issue and has to be supported before any applications can be deployed for mobile ad hoc networks. In recent many research protocols are proposed for finding an efficient route between the nodes. But most of the protocol’s that uses conventional techniques in routing; CBRP is a routing protocol that has a hierarchical-based design. This protocol divides the network area into several smaller areas called cluster. We propose a fuzzy logic based cluster head election using energy concept forcluster head routing protocol in MANET’S. Selecting an appropriate cluster head can save power for the whole mobile ad hoc network. Generally, Cluster Head election for mobile ad hoc network is based on the distance to the centroid of a cluster, and the closest one is elected as the cluster head'; or pick a node with the maximum battery capacity as the cluster head. In this paper, we present a cluster head election scheme using fuzzy logic system (FLS for mobile ad hoc networks. Three descriptors are used: distance of a node to the cluster centroid, its remaining battery capacity, and its degree of mobility. The linguistic knowledge of cluster head election based on these three descriptors is obtained from a group of network experts. 27 FLS rules are set up based on the linguistic knowledge. The output of the FLS provides a cluster head possibility, and node with the highest possibility is elected as the cluster head. The performance of fuzzy cluster head selection is evaluated using simulation, and is compared to LEACH protocol with out fuzzy cluster head election procedures and showed the proposed work is efficient than the previous one.

  6. Highway Mobility and Vehicular Ad-Hoc Networks in NS-3

    CERN Document Server

    Arbabi, Hadi

    2010-01-01

    The study of vehicular ad-hoc networks (VANETs) requires efficient and accurate simulation tools. As the mobility of vehicles and driver behavior can be affected by network messages, these tools must include a vehicle mobility model integrated with a quality network simulator. We present the first implementation of a well-known vehicle mobility model to ns-3, the next generation of the popular ns-2 networking simulator. Vehicle mobility and network communication are integrated through events. User-created event handlers can send network messages or alter vehicle mobility each time a network message is received and each time vehicle mobility is updated by the model. To aid in creating simulations, we have implemented a straight highway model that manages vehicle mobility, while allowing for various user customizations. We show that the results of our implementation of the mobility model matches that of the model's author and provide an example of using our implementation in ns-3.

  7. Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Priyanshu

    2014-06-01

    Full Text Available MANET is an autonomous system of mobile nodes attached by wireless links. It represents a complex and dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into an ad-hoc network topology. The devices in the network may have limited transmission range therefore multiple hops may be needed by one node to transfer data to another node in network. This leads to the need for an effective routing protocol. In this paper we study various classifications of routing protocols and their types for wireless mobile ad-hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast Protocols. In this paper we also compare different routing protocols on based on a given set of parameters Scalability, Latency, Bandwidth, Control-overhead, Mobility impact.

  8. A Globally Accessible List (GAL Based Recovery Concept In Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    A.K.Daniel,

    2011-04-01

    Full Text Available A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network.However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Modern communication network is becoming increasing & diverse. This is the consequence of an increasing array of devices & services both wired & wireless. There are various protocols to facilitate communication in ad hoc network like DSR and TORA. However these approaches end up in the inefficient utilization of resources after link failure and congestion. This paper proposes an approach to get over this problem .We have added some static nodes which only keeps information related to the current working path and also helps in quick recovery in case of link failure .

  9. A Survey of Clustering Approaches for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Mihir Mehta

    2014-02-01

    Full Text Available In MANET, Clustering is the most significant research area now days. Clustering offers several advantages like it improves stability of network, enhances routing in network, efficient resource allocation among mobile nodes in network and hierarchical routing structure. This survey paper analyzes number of clustering approaches which are widely used for partitioning mobile nodes into different virtual groups. Each clustering algorithm considers different parameters for selection of Cluster Head in Cluster. Cluster Head election is invoked on demand and it is aimed to decrease the computation and communication cost in MANET. Each approach has its own pros and cons.

  10. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  11. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  12. Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Varun G Menon

    2016-10-01

    Full Text Available Recent advances in wireless networks have enabled us to deploy and use mobile ad hoc networks for communication between the rescue officers in disaster recovery and reconstruction operations. This highly dynamic network does not require any infrastructure or centralized control. As the topology of the network remain dynamic, severe performance limitations incur with traditional routing strategies. Recently a new routing paradigm known as opportunistic routing protocols have been proposed to overcome these limitations and to provide efficient delivery of data in these highly dynamic ad hoc networks. Using the broadcasting nature of the wireless medium, this latest routing technique tries to address two major issues of varying link quality and unpredictable node mobility in ad hoc networks. Unlike conventional IP forwarding, where an intermediate node looks up a forwarding table for a suitable next hop, opportunistic routing brings in opportunistic data forwarding that allows multiple candidate nodes in the forwarding area to act on the broadcasted data packet. This increases the reliability of data delivery in the network with reduced delay. One of the most important issues that have not been studied so far is the varying performance of opportunistic routing protocols in wireless networks with highly mobile nodes. This research paper analyses and compares the various advantages, disadvantages and the performance of the latest opportunistic routing protocols in wireless ad hoc networks with highly mobile nodes.

  13. Bridging Context Management Systems in the ad hoc and mobile environments

    NARCIS (Netherlands)

    Pawar, Pravin; Boros, Hanga; Liu, Fei; Heijenk, Geert; Beijnum, van Bert-Jan

    2009-01-01

    The pervasive computing world in which the context-aware applications are aimed at is constituted of multiple network environments, e.g. ad hoc, mobile and fixed. There exist specialized Context Management Systems (CMSs) addressing context management needs of every network environment and the existe

  14. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    Reliability and Maintainability Symposium, Anaheim, California , USA, 1994, pp. 442–448. [46] I.R. Chen, F.B. Bastani, T.W. Tsao, On the reliability of AI...Cunha, O.C. Duarte , G. Pujolle, Trust management in mobile ad hoc networks using a scalable maturity- based model, IEEE Trans. Netw. Serv. Manage. 7

  15. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis

    Institute of Scientific and Technical Information of China (English)

    Vasileios Karyotis; Anastasios Kakalis; Symeon Papavassiliou

    2008-01-01

    In this paper, the spreading of malicious software over ad hoe networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes. Because of its nature, the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments. Using the Norton equivalent of the closed queuing network, we obtain analytical results for its steady state behavior, which in turn is used for identifying the critical parameters affecting the operation of the network. Finally, through modeling and simulation, some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present, and regarding the time-dependent evolution and impact of an attack.

  16. Mobile Sensor Technologies Being Developed

    Science.gov (United States)

    Greer, Lawrence C.; Oberle, Lawrence G.

    2003-01-01

    The NASA Glenn Research Center is developing small mobile platforms for sensor placement, as well as methods for communicating between roving platforms and a central command location. The first part of this project is to use commercially available equipment to miniaturize an existing sensor platform. We developed a five-circuit-board suite, with an average board size of 1.5 by 3 cm. Shown in the preceding photograph, this suite provides all motor control, direction finding, and communications capabilities for a 27- by 21- by 40-mm prototype mobile platform. The second part of the project is to provide communications between mobile platforms, and also between multiple platforms and a central command location. This is accomplished with a low-power network labeled "SPAN," Sensor Platform Area Network, a local area network made up of proximity elements. In practice, these proximity elements are composed of fixed- and mobile-sensor-laden science packages that communicate to each other via radiofrequency links. Data in the network will be shared by a central command location that will pass information into and out of the network through its access to a backbone element. The result will be a protocol portable to general purpose microcontrollers satisfying a host of sensor networking tasks. This network will enter the gap somewhere between television remotes and Bluetooth but, unlike 802.15.4, will not specify a physical layer, thus allowing for many data rates over optical, acoustical, radiofrequency, hardwire, or other media. Since the protocol will exist as portable C-code, developers may be able to embed it in a host of microcontrollers from commercial to space grade and, of course, to design it into ASICs. Unlike in 802.15.4, the nodes will relate to each other as peers. A demonstration of this protocol using the two test bed platforms was recently held. Two NASA modified, commercially available, mobile platforms communicated and shared data with each other and a

  17. Similarity-Based Clustering Strategy for Mobile Ad Hoc Multimedia Databases

    Directory of Open Access Journals (Sweden)

    Bo Yang

    2005-01-01

    Full Text Available Multimedia data are becoming popular in wireless ad hoc environments. However, the traditional content-based retrieval techniques are inefficient in ad hoc networks due to the multiple limitations such as node mobility, computation capability, memory space, network bandwidth, and data heterogeneity. To provide an efficient platform for multimedia retrieval, we propose to cluster ad hoc multimedia databases based on their semantic contents, and construct a virtual hierarchical indexing infrastructure overlaid on the mobile databases. This content-aware clustering scheme uses a semantic-aware framework as the theoretical foundation for data organization. Several novel techniques are presented to facilitate the representation and manipulation of multimedia data in ad hoc networks: 1 using concise distribution expressions to represent the semantic similarity of multimedia data, 2 constructing clusters based on the semantic relationships between multimedia entities, 3 reducing the cost of content-based multimedia retrieval through the restriction of semantic distances, and 4 employing a self-adaptive mechanism that dynamically adjusts to the content and topology changes of the ad hoc networks. The proposed scheme is scalable, fault-tolerant, and efficient in performing content-based multimedia retrieval as demonstrated in our combination of theoretical analysis and extensive experimental studies.

  18. LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Senthil Murugan Tamilarasan

    2013-01-01

    Full Text Available Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access point. The MANET protocols can be classified as proactive and reactive routing protocol. The proactive routing protocols, all nodes which participated in network have routing table. This table updated periodically and is used to find the path between source and destination. The reactive routing protocol, nodes are initiate route discovery procedure when on-demand routes. In order to find the better route in MANET, many routing protocols are designed in the recent years. But those protocols are not concentrating about communication links and battery energy. Communication links between nodes and energy of nodes are very important factor for improving quality of routing protocols. This study presents innovative Link Stability with Energy Aware (LSEA multipath routing protocol. The key idea of the protocol is find the link quality, maximum remaining energy and lower delay. Reflections of these factors are increasing the qualities like packet delivery ratio, throughputs and reduce end-to-end delay. The LSEAMRP was simulated on NS-2 and evaluation results also shown.

  19. Calculation and Analysis of Destination Buffer for Multimedia Service in Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    ZHOU Zhong; MAO Yu-ming; JIANG Zhi-qong

    2005-01-01

    Jitter is one of the most important issues for multimedia real time services in future mobile ad hoc networks(MANET). A thorough theoretical analysis of the destination buffer for smoothing the jitter of the real time service in MANET is given. The theoretical results are applied in moderate populated ad hoc networks in our simulation, the simulation results show that by predicting and adjusting destination buffer in our way, Jitter will be alleviated in large part and this will contribute much to the quality of service (QOS) in MANET.

  20. Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ipsa De

    2011-01-01

    Full Text Available In recent years, the use of mobile ad hoc networks (MANETs has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards allthe more difficult. The security issue is becoming a major concern and bottle neck in the application of MANET. In this paper, an attempt has been made to thoroughly study the blackhole attack which is one ofthe possible attacks in ad hoc networks in routing protocol AODV with possible solution to blackhole attack detection.

  1. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  2. A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Khan, Jahangir; Hayder, Syed Irfan

    Mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves on a fly. In this paper we focus on the performance of the on-demand routing protocols such as DSR and AODV in ad-hoc networks. We have observed the performance change of each protocol through simulation with varying the data in intermediate nodes and to compare data throughput in each mobile modes of each protocol to analyze the packet fraction for application data. The objective of this work is to evaluate two routing protocols such as On-demand behavior, namely, Ad hoc Demand Distance vector (AODV) and Dynamic Source Routing (DSR), for wireless ad hoc networks based on performance of intermediate nodes for the delivery of data form source to destination and vice versa in order to compare the efficiency of throughput in the neighbors nodes. To overcome we have proposed OPNET simulator for performance comparison of hop to hop delivery of data packet in autonomous system.

  3. Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

    Directory of Open Access Journals (Sweden)

    Kumar Roshan

    2012-06-01

    Full Text Available Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.

  4. Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Manu Sood

    2012-10-01

    Full Text Available It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature,dynamically changing topology, lack of infrastructure and central management. A particular harmfulattack that takes the advantage of these characteristics is the Sybil attack, in which a malicious nodeillegitimately claims multiple identities. This attack can exceedingly disrupt various operations of themobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehaviordetection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybilattack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to theserouting protocols, we show in this paper that the Sybil attack can also disrupt the head selectionmechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for thefirst time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, weillustrate to have introduced a category of Sybil attack in which the malicious node varies itstransmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose ofcommunication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmissionpower makes the Sybil attack more deadly and difficult to be detected.

  5. Clustering in mobile ad hoc network based on neural network

    Institute of Scientific and Technical Information of China (English)

    CHEN Ai-bin; CAI Zi-xing; HU De-wen

    2006-01-01

    An on-demand distributed clustering algorithm based on neural network was proposed. The system parameters and the combined weight for each node were computed, and cluster-heads were chosen using the weighted clustering algorithm, then a training set was created and a neural network was trained. In this algorithm, several system parameters were taken into account, such as the ideal node-degree, the transmission power, the mobility and the battery power of the nodes. The algorithm can be used directly to test whether a node is a cluster-head or not. Moreover, the clusters recreation can be speeded up.

  6. A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    Science.gov (United States)

    Askoxylakis, Ioannis G.; Markantonakis, Konstantinos; Tryfonas, Theo; May, John; Traganitis, Apostolos

    Mobile ad hoc networking is an operating mode for rapid mobile node networking. Each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality. Security is considered among the main issues for the successful deployment of mobile ad hoc networks (MANETs). In this paper we introduce a weak to strong authentication mechanism associated with a multiparty contributory key establishment method. The latter is designed for MANETs with dynamic changing topologies, due to continuous flow of incoming and departing nodes. We introduce a new cube algorithm based on the face-centered cubic (FCC) structure. The proposed architecture employs elliptic curve cryptography, which is considered more efficient for thin clients where processing power and energy consumption are significant constraints.

  7. Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad hoc Network

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2012-01-01

    Full Text Available Problem statement: In mobile ad hoc networks, frequent mobility during the transmission of data causes route failure which results in route rediscovery. In this, we propose multipath routing protocol for effective local route recovery in Mobile Ad hoc Networks (MANET. In this protocol, each source and destination pair establishes multiple paths in the single route discovery and they are cached in their route caches. Approach: The cached routes are sorted on the basis of their bandwidth availability. In case of route failure in the primary route, a recovery node which is an overhearing neighbor, detects it and establishes a local recovery path with maximum bandwidth from its route cache. Results: By simulation results, we show that the proposed approach improves network performance. Conclusion: The proposed route recovery management technique prevents the frequent collision and degradation in the network performance.

  8. Multicasting along Energy—Efficient Meshes in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    JIANGHai; CHENGShixin; HEYongming

    2003-01-01

    In consideration that current mesh-based multicast routing protocols for mobile ad hoc networks don't tend to form energy-efficient multicast infrastruc-ture, we propose a new Energy-efficient multicast rout-ing protocol (E2MRP) for mobile ad hoc networks. The two main characteristics of E2MRP are: (1) using in turn the criteria for minimum energy consumed per packet and minimum maximum node cost during the course of relaying group (RG) creation and maintenance; (2)forming a graph-based multicast infrastructure instead of a tree-based one. Compared to multicast incremen-tal power (MIP) and on-demand multicast routing pro-tocol (ODMRP), as the simulation results show, E2MRP tremendously reduces the energy consumption rate of nodes and hence prolongs the lifetime of nodes and net-works, especially when the size of multicast group is small and node mobility is low.

  9. Impact of Rushing attack on Multicast in Mobile Ad Hoc Network

    CERN Document Server

    Palanisamy, V

    2009-01-01

    A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multihop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients. The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers. At that time of multicasting, mobile ad hoc network are unprotected by the attacks of malicious nodes because of vulnerabilities of routing protocols. Some of the attacks are Rushing attack, Blackhole attack, Sybil attack, Neighbor attack ...

  10. PNNI routing support for ad hoc mobile networking: A flat architecture

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  11. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  12. Condensation-Based Routing in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Francesco Palmieri

    2012-01-01

    Full Text Available The provision of efficient broadcast containment schemes that can dynamically cope with frequent topology changes and limited shared channel bandwidth, is one of the most challenging research topics in MANETs, and is crucial to the basic operations of networks serving fully mobile devices within areas having no fixed communication infrastructure. This problem particularly impacts the design of dynamic routing protocol that can efficiently establish routes to deliver data packets among mobile nodes with minimum communication overhead, and at the same time, ensure high throughput and low end-to-end delay. Accordingly, this work exploits and analyzes an adaptive probabilistic broadcast containment technique based on a particular condensation phenomenon borrowed from Quantum Mechanics and transposed in self-organizing random networks, that has the potential to effectively drive the on-demand route discovery process. Simulation-based performance analysis has shown that the proposed technique can introduce significant benefits on the general performance of broadcast-based reactive routing protocols in MANETs.

  13. A Mobility and Traffic Generation Framework for Modeling and Simulating Ad Hoc Communication Networks

    Directory of Open Access Journals (Sweden)

    Chris Barrett

    2004-01-01

    Full Text Available We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad~hoc networks. Three components of this framework, namely a mobility data generator (MDG, a graph structure generator (GSG and an occlusion modification tool (OMT allow a variety of mobility models to be incorporated into the tool. The MDG module generates positions of transceivers at specified time instants. The GSG module constructs the graph corresponding to the ad hoc network from the mobility data provided by MDG. The OMT module modifies the connectivity of the graph produced by GSG to allow for occlusion effects. With two other modules, namely an activity data generator (ADG which generates packet transmission activities for transceivers and a packet activity simulator (PAS which simulates the movement and interaction of packets among the transceivers, the framework allows the modeling and simulation of ad hoc communication networks. The design of the framework allows a user to incorporate various realistic parameters crucial in the simulation. We illustrate the utility of our framework through a comparative study of three mobility models. Two of these are synthetic models (random waypoint and exponentially correlated mobility proposed in the literature. The third model is based on an urban population mobility modeling tool (TRANSIMS developed at the Los Alamos National Laboratory. This tool is capable of providing comprehensive information about the demographics, mobility and interactions of members of a large urban population. A comparison of these models is carried out by computing a variety of parameters associated with the graph structures generated by the models. There has recently been interest in the structural properties of graphs that arise in real world systems. We examine two aspects of this for the graphs created by the mobility models: change associated with power control (range of

  14. An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed.The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively.

  15. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    Science.gov (United States)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  16. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    Science.gov (United States)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  17. Location Based Throughput Maximization Routing in Energy Constrained Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    V. Sumathy

    2006-01-01

    Full Text Available In wireless Ad-hoc network, power consumption becomes an important issue due to limited battery power. One of the reasons for energy expenditure in this network is irregularly distributed node pattern, which impose large interference range in certain area. To maximize the lifetime of ad-hoc mobile network, the power consumption rate of each node must be evenly distributed and the over all transmission range of each node must be minimized. Our protocol, Location based throughput maximization routing in energy constrained Ad-hoc network finds routing paths, which maximize the lifetime of individual nodes and minimize the total transmission energy consumption. The life of the entire network is increased and the network throughput is also increased. The reliability of the path is also increased. Location based energy constrained routing finds the distance between the nodes. Based on the distance the transmission power required is calculated and dynamically reduces the total transmission energy.

  18. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  19. Guard against cooperative black hole attack in Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Harsh Pratap Singh

    2011-07-01

    Full Text Available A mobile ad-hoc network is an autonomous network that consists of nodes which communicate with each other with wireless channel. Due to its dynamic nature and mobility of nodes, mobile ad hoc networks are more vulnerable to security attack than conventional wired and wireless networks. One of the principal routing protocols AODV used in MANETs. The security of AODV protocol is influence by the particular type of attack called Black Hole attack. In a black hole attack, a malicious node injects a faked route reply claiming to havethe shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. To preventing black hole attack, this paper presents RBS (Reference Broadcast Synchronization & Relative velocity distance method for clock synchronization process in Mobile ad-hoc Network for removal of cooperative black hole node. This paper evaluates the performance in NS2 network simulator and our analysis indicates that this method is very suitable to remove black hole attack.

  20. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  1. DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Zahra Zandieh Shirazi

    2016-04-01

    Full Text Available In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, pre-existing infrastructures, or a centralized management point. In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead to various problems in the routing process such as increase of the overhead massages and inefficient routing between nodes of network. A large variety of clustering methods have been developed for establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having significant impact on MANETs performance. The K-means algorithm is one of the effective clustering methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption. This paper proposed a new K-means clustering algorithm to find out optimal path from source node to destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the performance of routing process in Mobile ad-hoc networks.

  2. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi

    2006-01-01

    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

  3. Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks

    Indian Academy of Sciences (India)

    V S JANANI; M S K MANIKANDAN

    2016-10-01

    The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network.Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographicclustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.

  4. Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

    Directory of Open Access Journals (Sweden)

    Marimuthu Murugesan

    2011-01-01

    Full Text Available Problem statement: Network wide broadcasting is a fundamental operation in ad hoc networks. In broadcasting, a source node sends a message to all the other nodes in the network. Unlike in a wired network, a packet transmitted by a node in ad hoc wireless network can reach all neighbors. Therefore, the total number of transmissions (Forwarding nodes used as the cost criterion for broadcasting. Approach: This study proposes a reliable and efficient broadcasting algorithm using minimized forward node list algorithm which uses 2-hop neighborhood information more effectively to reduce redundant transmissions in asymmetric Mobile Ad hoc networks that guarantees full delivery. Among the 1-hop neighbors of the sender, only selected forwarding nodes retransmit the broadcast message. Forwarding nodes are selected such a way that to cover the uncovered 2-hop neighbors. Results: Simulation results show that the proposed broadcasting algorithm provides high delivery ratio, low broadcast forward ratio, low overhead and minimized delay. Conclusion: In this study, reliable and efficient broadcasting algorithm in asymmetric Mobile Ad Hoc Networks using minimized forward node list algorithm has been proposed which provides low forward ratio, high delivery ratio while suppressing broadcast redundancy.

  5. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  6. Key Management and Authentication in Ad Hoc Network based on Mobile Agent

    Directory of Open Access Journals (Sweden)

    Yi Zhang

    2009-08-01

    Full Text Available Key management and authentication is important to security of Mobile Ad Hoc network (MANET. Based on the (t, n threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public keys and the certificates, thus enhances security. Carrying private key and some state variables, mobile agents navigate in the network according to visitsbalance policy, namely, node with the least visits would be first visited by mobile agent. Any t nodes in the network can cooperate to perform an authentication upon a new node wanting to join the network. Experimental results show that the mobile agent performs very well for improving the success ratio of authentication and enhance security while reducing the communication overhead and resource consumption.

  7. An optimized node-disjoint multipath routing scheme in mobile ad hoc

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Liu, Zhiyu

    2016-02-01

    In mobile ad hoc networks (MANETs), link failures are caused frequently because of node’s mobility and use of unreliable wireless channels for data transmission. Multipath routing strategy can cope with the problem of the traffic overloads while balancing the network resource consumption. In the paper, an optimized node-disjoint multipath routing (ONMR) protocol based on ad hoc on-demand vector (AODV) is proposed to establish effective multipath to enhance the network reliability and robustness. The scheme combines the characteristics of reverse AODV (R-AODV) strategy and on-demand node-disjoint multipath routing protocol to determine available node-disjoint routes with minimum routing control overhead. Meanwhile, it adds the backup routing strategy to make the process of data salvation more efficient in case of link failure. The results obtained through various simulations show the effectiveness of the proposed scheme in terms of route availability, control overhead and packet delivery ratio.

  8. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    CERN Document Server

    Nath, Rajender

    2011-01-01

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks- wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  9. Implement DUMBO as a Network Based on Mobile Ad hoc Network (MANETs

    Directory of Open Access Journals (Sweden)

    2011-10-01

    Full Text Available Nowadays there are a large variety of wireless access networks. One of these networksis Digital Ubiquitous Mobile Broadband OLSR (DUMBO which has been stronglymotivated by the fact that large scale natural disasters can wipe out terrestrialcommunication infrastructure. DUMBO routers can automatically form one or more selfconfiguring,self-healing networks called Mobile Ad hoc Networks (MANET. VehicleAd hoc Network (VANETs is an advanced version of MANETs. VANETs is offered tobe used by network service providers for managing connection to get a high performanceat real time, high bandwidth and high availability in networks such as WLAN, UMTS,Wi-MAX and etc. In this paper surveying DUMBONET Routers with relevant algorithm,approaches and solutions from the literature, will be consider.

  10. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  11. Simulation of Efficiency in Mobile Ad Hoc Networks using OMNeT++

    Directory of Open Access Journals (Sweden)

    Varun Manchikalapudi

    2015-08-01

    Full Text Available A network is a group of two or more computer systems linked together. There are many types of computer networks which are categorized based on topology, protocol and architecture. A Mobile Ad hoc Network (MANET is a self-configuring infrastructure less network of mobile devices connected by wireless. Ad hoc networks maintain an unfair behavior in flow control especially when considered in the case of IEEE 802.11 Mac layer. Introducing efficiency in 802.11 is not an easy task. It reduces the overall global throughput. The network is to be designed in such a way that it deals with the fairness and throughput by maximizing aggregate throughput. Such kind of network design can be efficiently implemented on an evolving simulation tool named OMNet++.

  12. Designing and implementing an experimental wireless mobile ad hoc networks testbed

    Science.gov (United States)

    Li, Lixin; Dai, Guanzhong; Mu, Dejun; Zhang, Huisheng

    2006-11-01

    A very large number of simulation models have been developed to study ad hoc network architectures and protocols under many network scenarios, number of nodes, mobility rates, etc. However, fidelity of simulation results has always been a concern, especially when the protocols being studied are affected by the propagation and interference characteristics of the radio channels. This paper describes our experience in designing and implementing a MANET prototype system, Experimental Wireless Mobile Ad hoc Networks Testbed (EWMANT), in order to perform largescale, reproducible experiments. EWMANT aims at assessing several different protocols in a real-world environment instead of by simulation. It assists us with finding and evaluating a proper solution, showing the clear advantage of realworld implementations compared to simulations.

  13. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  14. Performance Evaluation of Unicast and Broadcast Mobile Ad hoc Network Routing Protocols

    CERN Document Server

    Debnath, Sumon Kumar; Islam, Nayeema

    2010-01-01

    Efficient routing mechanism is a challenging issue for group oriented computing in Mobile Ad Hoc Networks (MANETs). The ability of MANETs to support adequate Quality of Service (QoS) for group communication is limited by the ability of the underlying ad-hoc routing protocols to provide consistent behavior despite the dynamic properties of mobile computing devices. In MANET QoS requirements can be quantified in terms of Packet Delivery Ratio (PDR), Data Latency, Packet Loss Probability, Routing Overhead, Medium Access Control (MAC) Overhead and Data Throughput etc. This paper presents an in depth study of one to many and many to many communications in MANETs and provides a comparative performance evaluation of unicast and broadcast routing protocols. Dynamic Source Routing protocol (DSR) is used as unicast protocol and BCAST is used to represent broadcast protocol. The performance differentials are analyzed using ns2 network simulator varying multicast group size (number of data senders and data receivers). Bo...

  15. Survey on Simulation for Mobile Ad-Hoc Communication for Disaster Scenarios

    Institute of Scientific and Technical Information of China (English)

    Erika Rosas; Nicolas Hidalgo; Veronica Gil-Costa; Carolina Bonacic; Mauricio Marin; Hermes Senger; Luciana Arantes; Cesar Marcondes; Olivier Marin

    2016-01-01

    Mobile ad-hoc communication is a demonstrated solution to mitigate the impact of infrastructure failures during large-scale disasters. A very complex issue in this domain is the design validation of software applications that support decision-making and communication during natural disasters. Such disasters are irreproducible, highly unpredictable, and impossible to scale down, and thus extensive assessments cannot be led in situ. In this context, simulation constitutes the best approach towards the testing of software solutions for natural disaster responses. The present survey reviews mobility models, ad-hoc network architectures, routing protocols and network simulators. Our aim is to provide guidelines for software developers with regards to the performance evaluation of their applications by means of simulation.

  16. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Rajender Nath

    2010-11-01

    Full Text Available Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  17. A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Balamuralidhar, P; G., Harihara S; Reddy, Harish

    2011-01-01

    In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative an...

  18. Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Parthiban

    2012-04-01

    Full Text Available In Mobile Ad-Hoc Networks (MANETs, security is one of the most important concerns because a MANETs system is much more vulnerable to attacks than a wired or infrastructure-based wireless network. Designing an effective security protocol for MANET is a very challenging task. This is mainlydue to the unique characteristics of MANETs, namely shared broadcast radio channel, insecure operatingenvironment, lack of central authority, lack of association among users, limited availability of resources, and physical vulnerability. In this paper we present simulation based study of the impact of neighbor attack on mesh-based Mobile Ad-Hoc Network (MANET. And also we study the number of attackers and position affects the performance metrics such as packet delivery ratio and throughput. The study enables us to propose a secure neighbor detection mechanism (SNDM. A generic detection mechanism against neighbor attack for On Demand Routing Protocols is simulated on GlomoSim environment.

  19. Performance Evaluation of Reactive Protocols for Ad Hoc Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rashmi A Bichkar

    2012-10-01

    Full Text Available The requirement for good Quality of Service in Mobile Ad Hoc Network is that, better protocols should be used. To improve protocol efficiency, the two key issues to be considered are, low control overhead and low energy consumption. For reducing energy consumption and routing overhead, an enhanced routing algorithm, EEDSR (Energy Efficient Dynamic Source Routing with local route enhancement model for DSR (Dynamic Source Routing is implemented. Comparisons based on routing overhead, energy and throughput is done between EEDSR and EEAODV (Energy Efficient Ad Hoc on Demand Distance Vector and AODV (Ad Hoc on Demand Distance Vector protocols. For all protocols, NS-2.34 Simulator is used. This paper presents the simulation results in order to choose the best routing protocol to give highest performance. The simulations have shown that EEDSR protocol performs well as it consumes 12�0less energy than EEAODV and AODV

  20. Mobile Ad Hoc Network Security for Reactive Routing Protocol with Node Reputation Scheme

    Directory of Open Access Journals (Sweden)

    A. Suresh

    2011-01-01

    Full Text Available The mobile node’s reputation in the Mobile Ad hoc Network (MANET identifies its trust worthiness for secured multiple data communication. Unknown nature of the node’s communication status for initial period has great impact in the effective data transfer as MANET is self-organized and distributed. Problem statement: The functional operation of the mobile network relies on the trusty cooperation between the nodes. The major factor in securing the MANET is based on the quantification of node’s reputation and trustworthiness. The previous literatures provided uncertainty model to reflect a node’s confidence in sufficiency of its past experience and effect of collecting trust information from the unknown node status. With node mobility characteristic, it reduces unknown nature and speed up trust convergence. Approach: Mobility-assisted uncertainty reduction schemes comprised of, proactive schemes, that achieve trust convergence and reactive schemes provide node authentication and their reputation. They provide an acceptable trade-off between delay and uncertainty. The mobility based node reputation scheme presented in this study, identifies and monitor the node’s trustworthiness in sharing the information within the ad hoc network. Mobile nodes information uncertainty is handled with the mobility characteristics and its reputation is evaluated to trust or discard the node’s communication. Results: Simulations are carried out to evaluate the performance of mobility based node reputation scheme by measuring the nodes consistency behavior, neighboring communication rate and path diversity. Conclusion: The average node’s neighboring communication rate is high for the proposed mobility based reputation scheme compared to the reactive routing protocols.

  1. New horizons in mobile and wireless communications, v.4 ad hoc networks and pans

    CERN Document Server

    Prasad, Ramjee

    2009-01-01

    Based on cutting-edge research projects in the field, this book (part of a comprehensive 4-volume series) provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Other volumes cover Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.

  2. A REVIEW ON ADVANCED TRAFFIC CONTROL TECHNIQUES IN MOBILE AD-HOC NETWORK

    OpenAIRE

    2012-01-01

    A mobile ad hoc network (MANET) is a dynamicdistributed system of wireless nodes that moveindependently of each other. The operating transmissionrange of the nodes is limited and as a result, MANETroutes are often multi-hop in nature. Any node in aMANET can become a source or destination, and eachnode can function as a router, forwarding data for its peers.MANET routing protocols are either proactive or reactivein nature. Proactive routing protocols determine andmaintain routes between any pa...

  3. Simulation and evaluation of routing protocols for Mobile Ad Hoc Networks (MANETs)

    OpenAIRE

    Kioumourtzis, Georgios A.

    2005-01-01

    Mobile Ad hoc Networks (MANETs) are of much interest to both the research community and the military because of the potential to establish a communication network in any situation that involves emergencies. Examples are search-and-rescue operations, military deployment in hostile environment, and several types of police operations. One critical open issue is how to route messages considering the characteristics of these networks. The nodes act as routers in an environment without a fixed...

  4. Multipath Routing for Self-Organizing Hierarchical Mobile Ad-Hoc Networks – A Review

    OpenAIRE

    Udayachandran Ramasamy; Sankaranarayanan, K.

    2010-01-01

    Security has become a primary concern for providing protected communication between mobile nodes in a hostile environment. The characteristics of Ad-hoc networks (dynamic topology, infrastructure less, variable capacity links, etc) are origin of many issues. Limited bandwidth, energy constraints, high cost security are the encountered problems. This type of networks pose particular challenges in terms of Quality of Service (QoS) and performance. In this paper, the issues of multipath routing ...

  5. A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    YU Genjian; ZHENG Baoyu

    2006-01-01

    Firstly, a multilevel trust algorithm for MANET(mobile ad hoc networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented. Some conclusions are given at lastly.

  6. An Adaptive Fuzzy Clustering and Location Management in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Obulla Reddy

    2012-11-01

    Full Text Available In the typical Ad Hoc networks application, the network hosts usually perform the given task according to groups, e.g. the command and control over staff and accruement in military affairs, traffic management, etc. Therefore, it is very significant for the study of multicast routing protocols of the Ad Hoc networks. Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The mobility of nodes will always increase the communication delay because of re-clustering and cluster head selections. For this issue we evaluate Adaptive Fuzzy System (AFS to multicast communication in mobile ad hoc networks (MANETs. To evaluate the performance of AFS, we simulate the fuzzy clustering in a variety of mobile network topologies in NS-2 and compare it with Cluster-based On Demand Multicast Routing Protocol (CODMRP and Cluster-based routing protocol (CBRP. Our simulation result shows the effectiveness and efficiency of AFMR: high packet delivery ratio is achieved while the delay and overhead are the lowest.

  7. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  8. Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-06-01

    Full Text Available Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some goodsecurity solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The routeestablishment and route renewal affects the clusters and asa consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes inthe network.

  9. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  10. A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M.Barveen Banu

    2013-12-01

    Full Text Available A MANET (Mobile Ad hoc NETwork is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. Routing is a mechanism of exchanging data between the source node and the destination node. Several protocols are used to perform routing the information from the source node to the destination node. The main aim of this paper is to explore the working principles of each unipath routing protocol. The unipath routing protocols are divided into Table-Driven (Proactive, On-demand (Reactive, Hybrid routing protocols.

  11. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  12. ECDSA - Performance improvements of intrusion detection in Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Vijayakumar R

    2015-10-01

    Full Text Available mobile nodes without an underlying infrastructure. In this network, the occurrences of misbehavior nodes are a main problem that degrades the network performance. In previous technique watchdog is used to detect nodes misbehaviors in the mobile ad-hoc network, but it contains some of potential issues. To avoid these issues we propose a novel algorithm named as Elliptic Curve Digital Signature Algorithm (ECDSA particularly designed for increases the security in network.

  13. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    ) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications......Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND...

  14. Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    CERN Document Server

    Kumar, Rakesh

    2011-01-01

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic data. In this paper we have proposed mobile agent as a mechanism to handle the traffic problem on road. Mobile software agents can be used to provide the better QoS (Quality of Service) in vehicular ad hoc network to improve the safety application and driver comfort.

  15. Secure adaptive topology control for wireless ad-hoc sensor networks.

    Science.gov (United States)

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.

  16. A Distributed Virtual Backbone Formation for Wireless Ad Hoc and Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    CAO Yong-tao; HE Chen; JIANG Ling-ge

    2007-01-01

    The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.

  17. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Jaime Lloret; Miguel Garcia; Jesus Tomás; Fernando Boronat

    2008-01-01

    Grouping nodes gives better performance to the whole network by diminishing the average network delay and avoiding unnecessary message for warding and additional overhead. Many routing protocols for ad-hoc and sensor network shave been designed but none of them are based on groups. In this paper, we will start defining group-based topologies,and then we will show how some wireless ad hoc sensor networks (WAHSN) routing protocols perform when the nodes are arranged in groups. In our proposal connections between groups are established as a function of the proximity of the nodes and the neighbor's available capacity (based on the node's energy). We describe the architecture proposal, the messages that are needed for the proper operation and its mathematical description. We have also simulated how much time is needed to propagate information between groups. Finally, we will show a comparison with other architectures.

  18. A New Proposal for Route Finding in Mobile AdHoc Networks

    Directory of Open Access Journals (Sweden)

    H.Vignesh Ramamoorthy

    2013-06-01

    Full Text Available Mobile Ad hoc Network (MANET is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers (and associated hosts connected by wireless links – the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet. There are various routing protocols available for MANETs. The most popular ones are DSR, AODV and DSDV. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV and the Ad hoc On- Demand Distance Vector routing (AODV. Generally, the routing algorithms can be classified into Reactive and Proactive. A Hybrid algorithm combines the basic properties of reactive and proactive into one. The proposed approach is a novel routing pattern based on Ant Colony Optimization and Multi Agent System. This pattern integrates two different algorithms together and helps to get optimum routes for a particular radio range. The approaches used here are Ant Colony Optimization (ACO and Multi Agent System (MAS. The proposed integrated approach has a relatively short route establishment time while using a small number of control messages which makes it a scalable routing approach. The overhead of this routing approach will be inexpensive and also will enable to have an alternate route during route failure. This proposed route finding scheme in order to provide high connectivity of nodes, will minimize the route discovery latency and the end-to-end delay.

  19. O-DSR: OPTIMIZED DSR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Rjab Hajlaoui

    2015-08-01

    Full Text Available A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR Protocol. The aim behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.

  20. Optimal Power Control for Concurrent Transmissions of Location-aware Mobile Cognitive Radio Ad Hoc Networks

    CERN Document Server

    Song, Yi

    2011-01-01

    In a cognitive radio (CR) network, CR users intend to operate over the same spectrum band licensed to legacy networks. A tradeoff exists between protecting the communications in legacy networks and maximizing the throughput of CR transmissions, especially when CR links are unstable due to the mobility of CR users. Because of the non-zero probability of false detection and implementation complexity of spectrum sensing, in this paper, we investigate a sensing-free spectrum sharing scenario for mobile CR ad hoc networks to improve the frequency reuse by incorporating the location awareness capability in CR networks. We propose an optimal power control algorithm for the CR transmitter to maximize the concurrent transmission region of CR users especially in mobile scenarios. Under the proposed power control algorithm, the mobile CR network achieves maximized throughput without causing harmful interference to primary users in the legacy network. Simulation results show that the proposed optimal power control algori...

  1. QoS Routing and Performance Evaluation for Mobile Ad Hoc Networks using OLSR Protocol

    CERN Document Server

    Amnai, Mohamed; Abouchabaka, Jaafar

    2011-01-01

    Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure. As the real-time applications used in today's wireless network grow, we need some schemes to provide more suitable service for them. We know that most of actual schemes do not perform well on traffic which is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio) of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4) and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases. Experimentally, we considered the three mobility models as follows Random Waypoint, Random Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change according to the model and the used traffics.

  2. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  3. Getting MANETs to Communicate Efficiently: An Analysis of Mobile Ad Hoc Network Routing Schemes in Tactical Communications

    Science.gov (United States)

    2013-06-01

    of the information technology developments that the Marine Corps is currently studying. Mobile Ad Hoc Networks ( MANETs ) are infrastructureless, highly...supports Marine Corps tactical units will continuously undergo changes based on developments in information technology. Mobile Ad Hoc Networking is one...edge. There are many challenges to MANET implementation however, including management of the dynamic physical topology, and the efficient use of limited

  4. Maximization of Energy Efficiency in Wireless ad hoc and Sensor Networks With SERENA

    Directory of Open Access Journals (Sweden)

    Saoucene Mahfoudh

    2009-01-01

    Full Text Available In wireless ad hoc and sensor networks, an analysis of the node energy consumption distribution shows that the largest part is due to the time spent in the idle state. This result is at the origin of SERENA, an algorithm to SchEdule RoutEr Nodes Activity. SERENA allows router nodes to sleep, while ensuring end-to-end communication in the wireless network. It is a localized and decentralized algorithm assigning time slots to nodes. Any node stays awake only during its slot and the slots assigned to its neighbors, it sleeps the remaining time. Simulation results show that SERENA enables us to maximize network lifetime while increasing the number of user messages delivered. SERENA is based on a two-hop coloring algorithm, whose complexity in terms of colors and rounds is evaluated. We then quantify the slot reuse. Finally, we show how SERENA improves the node energy consumption distribution and maximizes the energy efficiency of wireless ad hoc and sensor networks. We compare SERENA with classical TDMA and optimized variants such as USAP in wireless ad hoc and sensor networks.

  5. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  6. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  7. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  8. Using Apriori algorithm to prevent black hole attack in mobile Ad hoc networks

    Directory of Open Access Journals (Sweden)

    Seyed Javad Mirabedini

    2013-01-01

    Full Text Available A mobile ad hoc network (MANET is considered as an autonomous network, which consists of mobile nodes, which communicate with each other over wireless links. When there is no fixed infrastructure, nodes have to cooperate in order to incorporate the necessary network functionality. Ad hoc on Demand Distance Vector (AODV protocol is one of the primary principal routing protocols implemented in Ad hoc networks. The security of the AODV protocol is threaded by a specific kind of attack called ‘Black Hole’ attack. This paper presents a technique to prevent the Black hole attack by implementing negotiation with neighbors who claim to maintain a route to destination. Negotiation process is strengthen by apriori method to judge about suspicious node. Apriori algorithm is an effective association rule mining method with relatively low complexity, which is proper for MANETs. To achieve more improvement, fuzzy version of ADOV is used. The simulation results indicate that the proposed protocol provides more securable routing and also more efficiency in terms of packet delivery, overhead and detection rate than the conventional AODV and fuzzy AODV in the presence of Black hole attacks.

  9. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  10. A robust cross-layer metric for routing protocol in mobile wireless ad hoc networks

    Science.gov (United States)

    Mucchi, Lorenzo; Chisci, Luigi; Fabbrini, Luca; Giovannetti, Giulio

    2012-12-01

    In a mobile ad-hoc network (MANET) where Mobile Nodes (MNs) self-organize to ensure the communication over radio links, routing protocols clearly play a significant role. In future MANETs, protocols should provide routing under full mobility, power constraints, fast time-varying channels, and nodes subject to high loading. In this article, a novel robust routing protocol, named distributed X-layer fastest path (DXFP), is proposed. The protocol is based on a cross-layer metric which is robust against the time-variations of the network as far as topology (mobility), congestion of the nodes and channel quality (fading, power constraints) are concerned. All these features are integrated in a single physical cost, i.e., the network crossing time, which has to be minimized. Furthermore, several routes from source to destination are stored for a given data flow to efficiently face the disconnections which frequently occur in MANETs. It is shown that the DXFP protocol, though locally operating in a fully distributed way within the MNs, provides, for each data flow, the optimum routes according to the considered metric. The DXFP protocol has been compared with two of the most commonly used routing protocols for MANETs, i.e., dynamic source routing and ad hoc on-demand distance vector, showing significant improvements in performance and robustness.

  11. MOSIC: Mobility-Aware Single-Hop Clustering Scheme for Vehicular Ad hoc Networks on Highways

    Directory of Open Access Journals (Sweden)

    Amin Ziagham Ahwazi

    2016-09-01

    Full Text Available As a new branch of Mobile ad hoc networks, Vehicular ad hoc networks (VANETs have significant attention in academic and industry researches. Because of high dynamic nature of VANET, the topology will be changed frequently and quickly, and this condition is causing some difficulties in maintaining topology of these kinds of networks. Clustering is one of the controlling mechanism that able to grouping vehicles in same categories based upon some predefined metrics such as density, geographical locations, direction and velocity of vehicles. Using of clustering can make network’s global topology less dynamic and improve the scalability of it. Many of the VANET clustering algorithms are taken from MANET that has been shown that these algorithms are not suitable for VANET. Hence, in this paper we proposed a new clustering scheme that use Gauss Markov mobility (GMM model for mobility predication that make vehicle able to prognosticate its mobility relative to its neighbors. The proposed clustering scheme’s goal is forming stable clusters by increasing the cluster head lifetime and less cluster head changes number. Simulation results show that the proposed scheme has better performance than existing clustering approach, in terms of cluster head duration, cluster member duration, cluster head changes rate and control overhead.

  12. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

  13. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

    CERN Document Server

    Sanyal, Sugata; Gogri, Rajat; Rathod, Punit; Dedhia, Zalak; Mody, Nirali

    2010-01-01

    In Mobile Ad Hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad Hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to over-come the attack of initiating / forwarding fake Route Requests (RREQs) that lead to hogging of network resources and hence denial of service to genuine nodes. In this paper, a proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node. Since the proposed scheme is distributed in nature it has the capability to prevent Distributed DoS (DDoS) as well. The performance of the proposed algorithm in a series of simulations reveal that the proposed scheme provides a better solution than existing approaches with no extra overhead.

  14. SURVEY ON MOBILE AD HOC NETWORK ATTACKS AND MITIGATION USING ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    S. P. Manikandan

    2012-01-01

    Full Text Available Mobile Ad hoc Networks (MANET due to its unpredictable topology and bandwidth limitations are vulnerable to attacks. Establishing security measures and finding secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node authentication, insider attack and intrusion detection. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitigate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modification of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection. This study studied various approaches to predict and mitigate attacks in MANET."

  15. Reliable Coverage Area Based Link Expiration Time (LET) Routing Metric for Mobile Ad Hoc Networks

    Science.gov (United States)

    Ahmed, Izhar; Tepe, K. E.; Singh, B. K.

    This paper presents a new routing metric for mobile ad hoc networks. It considers both coverage area as well as link expiration information, which in turn requires position, speed and direction information of nodes in the network. With this new metric, a routing protocol obtains routes that last longer with as few hops as possible. The proposed routing metric is implemented with Ad Hoc On-Demand Distance Vector Routing (AODV) protocol. Thus, the performance of the proposed routing metric is tested against the minimum hop metric of AODV. Simulation results show that the AODV protocol with the new routing metric significantly improves delivery ratio and reduces routing overhead. The delay performance of AODV with the new metric is comparable to its minimum hop metric implementation.

  16. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  17. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  18. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Politis, Christos; 10.5121/ijwmn.2010.2205

    2010-01-01

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency workers with intelligent devices such as smart phones and PDAs. This technology allows communication "islets" to be established between the members of the same or different emergency teams (policemen, firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed for the purposes of eMANETs. We evaluate the performance of the protocol by comparing it with other widely used routing protocols for MANETs. We finally show that the overhead introduced due to security considerations is affordable to support secure ad-hoc communications among lightweight devices.

  19. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-05-01

    Full Text Available The nature of Mobile Ad hoc NETworks (MANETs makes them suitable to be utilized in the context of anextreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs inorder to describe next generation IP-based networks, which are deployed in emergency cases such asforest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergencyworkers with intelligent devices such as smart phones and PDAs. This technology allows communication”islets” to be established between the members of the same or different emergency teams (policemen,firemen, paramedics. In this article, we discuss an adaptive and secure routing protocol developed forthe purposes of eMANETs. We evaluate the performance of the protocol by comparing it with otherwidely used routing protocols for MANETs. We finally show that the overhead introduced due to securityconsiderations is affordable to support secure ad-hoc communications among lightweight devices.

  20. Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning

    Directory of Open Access Journals (Sweden)

    S.Sivagurunathan

    2016-05-01

    Full Text Available Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium, multi-hop and dynamic nature, constrained resources, lack of administration and cooperation. Traditionally routing protocols are designed to cope with routing operation but in practice they may be affected by misbehaving nodes so that they try to disturb the normal routing operations by launching different attacks with the intention to minimize or collapse the overall network performance. Therefore detecting a trusted node means ensuring authentication and securing routing can be expected. In this article we have proposed a Trust and Q-learning based Security (TQS model to detect the misbehaving nodes over Ad Hoc On Demand Distance-Vector (AODV routing protocol. Here we avoid the misbehaving nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical forwarding and responding behaviour by the way misbehaving nodes can be isolated.

  1. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  2. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  3. Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection

    CERN Document Server

    Nallusamy, R; Duraiswamy, K

    2009-01-01

    Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology and lack of centralized monitoring point. It is important to search new architecture and mechanisms to protect the wireless networks and mobile computing application. IDS analyze the network activities by means of audit data and use patterns of well-known attacks or normal profile to detect potential attacks. There are two methods to analyze: misuse detection and anomaly detection. Misuse detection is not effective against unknown attacks and therefore, anomaly detection method is used. In this approach, the audit data is collected from each mobile node after simulating the attack and compared with the normal behavior of the system. If there is any deviation from normal behavior then the event is considered as an attack. Some of the features of collected audi...

  4. Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm

    CERN Document Server

    Gavalas, Damianos; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Clustering is a promising approach for building hierarchies and simplifying the routing process in mobile ad-hoc network environments. The main objective of clustering is to identify suitable node representatives, i.e. cluster heads (CHs), to store routing and topology information and maximize clusters stability. Traditional clustering algorithms suggest CH election exclusively based on node IDs or location information and involve frequent broadcasting of control packets, even when network topology remains unchanged. More recent works take into account additional metrics (such as energy and mobility) and optimize initial clustering. However, in many situations (e.g. in relatively static topologies) re-clustering procedure is hardly ever invoked; hence initially elected CHs soon reach battery exhaustion. Herein, we introduce an efficient distributed clustering algorithm that uses both mobility and energy metrics to provide stable cluster formations. CHs are initially elected based on the time and cost-efficien...

  5. Performance optimisation through EPT-WBC in mobile ad hoc networks

    Science.gov (United States)

    Agarwal, Ratish; Gupta, Roopam; Motwani, Mahesh

    2016-03-01

    Mobile ad hoc networks are self-organised, infrastructure-less networks in which each mobile host works as a router to provide connectivity within the network. Nodes out of reach to each other can communicate with the help of intermediate routers (nodes). Routing protocols are the rules which determine the way in which these routing activities are to be performed. In cluster-based architecture, some selected nodes (clusterheads) are identified to bear the extra burden of network activities like routing. Selection of clusterheads is a critical issue which significantly affects the performance of the network. This paper proposes an enhanced performance and trusted weight-based clustering approach in which a number of performance factors such as trust, load balancing, energy consumption, mobility and battery power are considered for the selection of clusterheads. Moreover, the performance of the proposed scheme is compared with other existing approaches to demonstrate the effectiveness of the work.

  6. On Protocols to Prevent Black Hole Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Umesh Kumar Singh

    2015-01-01

    Full Text Available Wireless or Mobile Networks emerged to replace the wired networks. The new generation of wireless network is relatively different than the comparisons of traditional wired network in many aspects like resource sharing, power usage, reliability, efficient, ease to handle, network infrastructure and routing protocols, etc. Mobile Ad-Hoc Networks (MANETs are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. There is an increasing threat of attacks on the MANET. Thus, in MANET black hole attack are mostly serious security attacks. In this paper, we have examined certain black hole attacks prevention routing protocols. Finally, we have compared some routing protocols using some important parameters and then addressed major issues related to this.

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  8. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  9. A Network QoS Framework for Real-time Event Systems in highly Mobile Ad-hoc Environments

    Directory of Open Access Journals (Sweden)

    H.A. Duran-Limon

    2014-06-01

    Full Text Available A new class of applications can now be envisaged with the emergence of both mobile ad hoc computing and ubiquitous computing, which imposes a number of new unsolved challenges. Examples of such applications include automatic car control systems and air traffic control systems. Applications of such kind have real-time constraints and are characterised by being highly mobile and proactive, i.e. able to operate without human intervention. Moreover, this kind of applications requires multiple-source multicasting. However, current approaches mainly focus on offering support for continuous flows in low mobile environments where single-source multicasting is assumed. In this paper, we present the QoSMMANET (QoS Management in Mobile Ad hoc Networks framework, which offers QoS support for real-time event systems in highly mobile ad hoc environments. Our approach is validated by a number of experiments carried out in the ns-2 network simulator.

  10. Time Synchronization for Mobile Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Guo

    2013-01-01

    Full Text Available Time synchronization is very crucial for the implementation of energy constricted underwater wireless sensor networks (UWSN. The purpose of this paper is to present a time synchronization algorithm which is suitable to UWSN. Although several time synchronization protocols have been developed, most of them tend to break down when implemented on mobile underwater sensor networks. In this paper, we analyze the effect of node mobility, and propose a Mobile Counteracted Time Synchronization approach, called “Mc-Sync”, which is a novel time synchronization scheme for mobile underwater acoustic sensor networks. It makes use of two mobile reference nodes to counteract the effect of node mobility. We also analyze and design the optimized trajectories of the two mobile reference nodes in underwater environment. We show through analysis and simulation that Mc-Sync provides much better performance than existing schemes.

  11. Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    D GEETHA

    2013-01-01

    Full Text Available Mobile ad hoc network (MANET is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. In this paper an attempt has been made to compare the performance of two prominent on demand reactive routing protocols for MANETs: Temporally Ordered Routing Algorithm (TORA, Dynamic Source Routing (DSR protocols. This subjected the protocols to identical loads and environmental conditions and evaluates their relative performance with respect to quantitative metrics; throughput, average delay, packet delivery ratio and routing load. From the detailed simulation results and analysis of presented, we use NS-2 simulator for simulation of DSR and TORA protocol and variation occurs in mobility of packets, time interval between the packets sent and packet size of packets sent in throughout the protocols.

  12. A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

    Directory of Open Access Journals (Sweden)

    Atul Patel

    2011-08-01

    Full Text Available Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System in the context of MANETs. We investigate existing Intrusion Detection Architecture design Issues, challenges and proposed a novel architecture based on a conceptual model for an IDS agent that lead to a secure collaboration environment integrating mobile ad hoc network and the wired backbone. In wireless/mobile ad hoc network, the limited power, weak computation capabilities of mobile nodes, and restricted bandwidth of the open media impede the establishment of a secure collaborative environment.

  13. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks

    Science.gov (United States)

    Irshad, Ehtsham; Noshairwan, Wajahat; Shafiq, Muhammad; Khurram, Shahzada; Irshad, Azeem; Usman, Muhammad

    Mobility of nodes is an important issue in mobile adhoc networks (MANET). Nodes in MANET move from one network to another individually and in the form of group. In single node mobility scheme every node performs registration individually in new MANET whereas in group mobility scheme only one node in a group i.e group representative (GR) performs registration on behalf of all other nodes in the group and is assigned Care of Address (CoA). Internet protocol (IP) of all other nodes in the group remains same. Our simulated results prove that group mobility scheme reduces number of messages and consumes less time for registration of nodes as compared to single node mobility scheme. Thus network load is reduced in group mobility scheme. This research paper evaluates the performance of group mobility with single node mobility scheme. Test bed for this evaluation is based on Network Simulator 2 (NS-2) environment.

  14. A HYBRID APPROACH FOR NODE CO-OPERATION BASED CLUSTERING IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    C. Sathiyakumar

    2013-01-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is termed as a set of wireless nodes which could be built with infrastructure less environment where network services are afforded by the nodes themselves. In such a situation, if a node refuses to co-operate with other nodes, then it will lead to a considerable diminution in throughput and the network operation decreases to low optimum value. Mobile Ad hoc Networks (MANETs rely on the collaboration of nodes for packet routing ahead. Nevertheless, much of the existing work in MANETs imagines that mobile nodes (probably possessed by selfish users will pursue prearranged protocols without variation. Therefore, implementing the co-operation between the nodes turn out to be an significant issue. The previous work described a secured key model for ad hoc network with efficient node clustering based on reputation and ranking model. But the downside is that the co-operation with the nodes is less results in a communication error. To enhance the security in MANET, in this work, we present a hybrid approach, build a node co-operation among the nodes in MANET by evaluating the weightage of cooperativeness of each node in MANET. With the estimation of normal co-operative nodes, nodes are restructured on its own (self. Then clustering is made with the reorganized nodes to form a secured communication among the nodes in the MANET environment. The Simulation of the proposed Hybrid Approach for Node Cooperation based Clustering (HANCC work is done for varying topology, node size, attack type and intensity with different pause time settings and the performance evaluations are carried over in terms of node cooperativeness, clustering efficiency, communication overhead and compared with an existing secured key model. Compared to an existing secured key model, the proposed HANCC performance is 80-90% high.

  15. Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes

    OpenAIRE

    Blazevic, Ljubica; Buttyan, Levente; Capkun, Srdjan; Giordano, Silvia; Hubaux, Jean-Pierre; Le Boudec, Jean-Yves

    2001-01-01

    The Terminodes project is designing a wide area, mobile ad-hoc network, which is meant to be used in a public environment, in our approach, the network is run by users themselves. We give a global description of the building blocks used by the basic operation of the network, they all rely on various concepts of self-organization. Routing uses a combination of geography-based information and local, MANET-like protocols. Terminode positioning is obtained either by GPS, or by a relative positio...

  16. A hierarchical virtual backbone construction protocol for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Bharti Sharma

    2016-07-01

    Full Text Available We propose a hierarchical backbone construction protocol for mobile ad hoc networks. Our protocol is based on the idea of using an efficient extrema finding method to create clusters comprising the nodes that are within certain prespecified wireless hop distance. Afterward, we apply our ‘diameter’ algorithm among clusters to identify the dominating nodes that are, finally, connected via multi-hop virtual links to construct the backbone. We present the analytic as well as simulation study of our algorithm and also a method for the dynamic maintenance of constructed backbone. In the end, we illustrate the use of the virtual backbone with the help of an interesting application.

  17. Performance Analysis for Mobile Ad Hoc Network in Random Graph Models with Spatial Reuse

    Institute of Scientific and Technical Information of China (English)

    Han-xing Wang; Xi Hu; Qin Zhang

    2007-01-01

    In this paper,we present a random graph model with spatial reuse for a mobile ad hoc network (MANET) based on the dynamic source routing protocol.Many important performance parameters of the MANET are obtained,such as the average flooding distance (AFD),the probability generating function of the flooding distance,and the probability of a flooding route to be symmetric.Compared with the random graph model without spatial reuse,this model is much more effective because it has a smaller value of AFD and a larger probability for finding a symmetric valid route.

  18. Hardware in Loop Simulation for Emergency Communication Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    YANG Jie; AN Jian-ping; LIU Heng

    2007-01-01

    For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communicati on network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment.

  19. The MOBI-DIK Approach to Searching in Mobile Ad Hoc Network Databases

    Science.gov (United States)

    Luo, Yan; Wolfson, Ouri; Xu, Bo

    In this chapter, we introduce the mobile ad-hoc network (MANET) database by discussing its definition, historical background and scientific fundamentals. Existing related projects are presented and classified into two main categories, pedestrian and vehicular projects based on their target users. Two main paradigms (i.e., report pulling and report pushing) for answering queries in MANET databases are discussed in details. Then we present the MOBIDIK approach to searching in MANET databases and compare it with alternatives. Finally, the key applications and the future research directions are addressed.

  20. AN ENHANCEMENT SCHEME OF TCP PROTOCOL IN MOBILE AD HOC NETWORKS: MME-TCP

    Institute of Scientific and Technical Information of China (English)

    Kai Caihong; Yu Nenghai; Chen Yuzhong

    2007-01-01

    Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP)designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore, these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs.

  1. QDSR: QoS-aware Dynamic Source Routing Protocol for Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    SHIMinghong; YAOYinxiong; BAIYingcai

    2004-01-01

    QoS routing in wireless ad hoc networks faces many technical challenges due to time varying link and random mobility of nodes in these dynamic networks.In this paper, we design a QoS-aware dynamic source routing protocol (QDSR), based on DSR . QDSR uses minimum cost as the constraint, modifies route discovery, route reply and route maintenance mechanisms in DSR, adds the capability of path testing and initial resource reservation.The results of robustness and stability and performances imulations demonstrate that it suits the fluctuation of dynamic environment very well.

  2. SPIZ: An Effective Service Discovery Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Noh Donggeon

    2007-01-01

    Full Text Available The characteristics of mobile ad hoc networks (MANETs require special care in the handling of service advertisement and discovery (Ad/D. In this paper, we propose a noble service Ad/D technique for MANETs. Our scheme avoids redundant flooding and reduces the system overhead by integrating Ad/D with routing layer. It also tracks changing conditions, such as traffic and service popularity levels. Based on a variable zone radius, we have combined push-based Ad/D with a pull-based Ad/D strategy.

  3. SPIZ: An Effective Service Discovery Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Donggeon Noh

    2006-11-01

    Full Text Available The characteristics of mobile ad hoc networks (MANETs require special care in the handling of service advertisement and discovery (Ad/D. In this paper, we propose a noble service Ad/D technique for MANETs. Our scheme avoids redundant flooding and reduces the system overhead by integrating Ad/D with routing layer. It also tracks changing conditions, such as traffic and service popularity levels. Based on a variable zone radius, we have combined push-based Ad/D with a pull-based Ad/D strategy.

  4. AN MAC PROTOCOL SUPPORTING MULTIPLE TRAFFIC OVER MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    TianHui; LiYingyang

    2003-01-01

    This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks.The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology.The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS.The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.

  5. AN MAC PROTOCOL SUPPORTING MULTIPLE TRAFFIC OVER MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Tian Hui; Li Yingyang; Hu Jiandong; Zhang Ping

    2003-01-01

    This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.

  6. An Assessment of Worm Hole attack over Mobile Ad-Hoc Network as serious threats

    Directory of Open Access Journals (Sweden)

    Vikas Kumar Upadhyay

    2013-07-01

    Full Text Available Now these day Mobile Ad hoc networks vulnerable from number of security threats like black hole attack, DOS attack, Byzantine attack and wormhole attack. Wormhole attack is one of most important attack and having great attention in recent year. Wormhole attack, demonstrate a illusion over the network that show two far away node to be an neighbor node and attracted all traffic by presenting an greediness of shortest path over the network. This paper presents a bird eye over different existing wormhole deduction mechanism and their problem.

  7. A QoS Aware Service Composition Protocol in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    HAN Song-qiao; ZHANG Shen-sheng; ZHANG Yong; CAO Jian

    2008-01-01

    A novel decentralized service composition protocol was presented based on quality of service (QoS) for mobile ad hoc networks (MANETs). A service composition in MANETs is considered as a service path discovery in a service network. Based on the concept of source routing, the protocol integrates route discovery, service discovery and service composition and utilizes a constrained flooding approach to discover the optimal service path. A service path maintenance mechanism was exploited to recover broken service paths. Simulation experiments demonstrate that the proposed protocol outperforms existing service composition protocols.

  8. Power Control in Reactive Routing Protocol for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Maher HENI

    2012-05-01

    Full Text Available The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector inorder to improve the energy consumption in mobile ad hoc networks (MANET. The purpose is tominimize the regular period of HELLO messages generated by the AODV protocol used for the research,development and maintenance of routes. This information is useful to have an idea about battery powerlevels of different network hosts. After storing this information, the node elect the shortest path followingthe classical model used this information to elect safest path (make a compromise in terms of energy.Transmitter node does not select another node as its battery will be exhausted soon.Any node of the network can have the same information’s about the neighborhoods as well as otherinformation about the energy level of the different terminal to avoid routing using a link that will be lostdue to an exhausted battery of a node in this link.Analytical study and simulations by Jist/SWANS have been conducted to note that no divergencerelatively to the classical AODV, a node can have this type of information that improves the energyefficiency in ad hoc networks.

  9. An Opportunistic Routing Protocol for Mobile Cognitive Radio Ad hoc networks

    Directory of Open Access Journals (Sweden)

    S. Selvakanmani

    2014-05-01

    Full Text Available Cognitive radio, an upcoming technology gives the solution for the scarcity of spectrum where the transmitter acts as a sensible device which behaves as per the surrounding environment. A group of devices, which follows this technology, forms a temporary network called mobile cognitive radio ad hoc networks. The widely known ad hoc networks are always in moving fashion and there is no need for central abstraction in collecting the data. In such networks, formation of route(s to the destination becomes a leading problem. In Cognitive Radio ad hoc Networks (CRAHNs a challenging problem is to design the routing metric and also to reduce the packet drop. This problem arrives due to the usage of traditional routing in CRAHNs. Opportunistic routing - a new routing paradigm has been used as an alternate for maximizing the packet delivery ratio. The paper discusses about the routing protocol called CRCN CORMEN discusses about packet delivery ratio, reduces delay in a cooperative way among the nodes, when compared to the traditional Cooperative communications. The proposed protocol is evaluated and compared through NS2 simulation. The result indicates a high performance due to opportunistic routing and the evaluation is shown through by using xgraph.

  10. Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilpreet Kaur

    2013-03-01

    Full Text Available Mobile Ad-Hoc Networks (MANETs are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have been proposed so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols Ad-hoc On Demand Distance Vector Routing (AODV, Optimized link State Routing (OLSR, Temporally Ordered Routing Algorithm (TORA, Dynamic Source Routing (DSR, Destination-Sequenced Distance-Vector Routing (DSDV based on the performance metrics like packet delivery fraction, Average delay, Normalized Routing load, Throughput and Jitter under low mobility and low traffic network as well as under high mobility and high traffic network. Results show that AODV has maximum throughput under low traffic and DSDV has maximum throughput under high traffic. As network becomes dense OLSR, DSR and DSDV perform well in terms of Throughput than AODV and TORA. TORA performs well in dense networks in terms of packet delivery fraction but at the same time Normalized Routing load of TORA is maximum among all the protocols in both the networks. DSDV has least Normalized Routing load in both low and high traffic. OLSR and DSDV give the least Jitter and Average Delay in both networks.

  11. Analyzing Video Streaming Quality by Using Various Error Correction Methods on Mobile Ad hoc Networks in NS2

    Directory of Open Access Journals (Sweden)

    Norrozila Sulaiman

    2014-10-01

    Full Text Available Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer, multipath fading (i.e., impairments at the physical layer [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS parameters that affect the quality of the received video are also investigated.

  12. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    Directory of Open Access Journals (Sweden)

    Shahram Behzad

    2013-05-01

    Full Text Available Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destinations, and the throughput on a network. For achieving this purpose, we use OLSR routing protocol that is a responsive protocol and is currently covered under the IETF standard (RFC 3626. At this paper, we improved the OLSR routing protocol by eliminating the unnecessary loops, and simulation results demonstrated a significant improvement in the criteria of package delivery rate and throughput.

  13. Effective route maintenance and restoration schemes in mobile ad hoc networks.

    Science.gov (United States)

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination's location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR.

  14. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  15. A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Design of an efficient and reliable node authentication protocol for such networks is a particularly challenging task since the nodes are battery-driven and resource constrained. This paper presents a robust and efficient key exchange protocol for nodes authentication in a MANET based on multi-path communication. Simulation results demonstrate that the protocol is effective even in presence of large fraction of malicious nodes in the network. Moreover, it has a minimal computation and communication overhead that makes it ideally suitable for MANETs.

  16. A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network

    CERN Document Server

    Khan, Md Nazmul Islam; Aziz, Md Tariq

    2012-01-01

    Transmission Control Protocol (TCP) is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission in such a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s) for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK). In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As ...

  17. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks

    CERN Document Server

    Agrawal, Sudhir; Sharma, Sanjeev

    2011-01-01

    Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The absence of a central management agency or a fixed infrastructure is a key feature of MANETs. These nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. Due to lack of a defined central authority, securitizing the routing process becomes a challenging task thereby leaving MANETs vulnerable to attacks, which results in deterioration in the performance characteristics as well as raises a serious question mark about the reliability of such networks. In this paper we have attempted to present an overview of the routing protocols, the known routing attacks and the proposed countermeasures to these attacks in various works.

  18. ROUTE MAINTENANCE APPROACH FOR LINK BREAKAGE PREDICTION IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Khalid Zahedi

    2011-10-01

    Full Text Available Mobile Ad hoc Network (MANET consists of a group of mobile nodes that can communicate with each other without the need of infrastructure. The movement of nodes in MANET is random; therefore MANETs have a dynamic topology. Because of this dynamic topology, the link breakages in these networks are something common. This problem causes high data loss and delay. In order to decrease these problems, the idea of link breakage prediction has appeared. In link breakage prediction, the availability of a link is evaluated, and a warning is issued if there is a possibility of soon link breakage. In this paper a new approach of link breakage prediction in MANETs is proposed. This approach has been implemented on the well known Dynamic Source Routing protocol (DSR. This new mechanism was able to decrease the packet loss and delay that occur in the original protocol.

  19. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    Science.gov (United States)

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro).

  20. Multiple Metrics Gateway Selection Scheme in Mobile Ad Hoc Network (MANET) and Infrastructure Network Integration

    Science.gov (United States)

    Setiawan, Fudhiyanto Pranata; Bouk, Safdar H.; Sasase, Iwao

    This paper proposes a scheme to select an appropriate gateway based on multiple metrics such as remaining energy, mobility or speed, and number of hops in Mobile Ad Hoc Network (MANET) and the infrastructure network integration. The Multiple Criteria Decision Making (MCDM) method called Simple Additive Weighting (SAW) is used to rank and to select the gateway node. SAW method calculates the weights of gateway node candidates by considering these three metrics. The node with the highest weight will be selected as the gateway. Simulation results show that our scheme can reduce the average energy consumption of MANET nodes, and improve throughput performance, gateway lifetime, Packet Delivery Ratio (PDR) of the MANET and the infrastructure network.

  1. Location-based route self-recovery for mobile ad hoc networks

    Science.gov (United States)

    Medidi, Sirisha; Wang, Jiong

    2007-04-01

    Mobile ad hoc network (MANET) is a radio packet network without dedicated infrastructures. In recent years it has received tremendous attention because of its self-configuration and self-maintenance capabilities. However, because of node mobility and shared wireless links, its routing protocol design presents nontrivial challenges such as broadcast storm, stale route and delay. This paper proposes a location-based route self-recovery technique for source-initiated routing protocols. The purpose of route self-recovery is to reduce overhead and delay during route maintenance as well as allowing continuous packet forwarding for fault resilience. The ns-2 based simulation shows throughput and overhead improvements of source-initiated routing with route self-recovery and in the case of highly dynamic environments and heavy traffic loads, it is more robust and scalable than other protocols.

  2. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    Science.gov (United States)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  3. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  4. Performance Comparison of Secure Routing Protocols in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ashwani Garg

    2012-08-01

    Full Text Available A mobile Ad-Hoc network (MANET is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Each node operates not only as an end system but, also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A node can get compromised during the route discovery process. Attackers from inside or outside can easily exploit the network. Several secure routing protocols are proposed for MANETs by researchers. In this paper, an attempt has been made to compare the performance of two prominent secure routing protocols for MANETs: Secure Efficient Ad-Hoc Distance Vector Protocol i.e. SEAD (a proactive or table driven protocol and Ariadne (a reactive or on demand protocol.Compared to the proactive routing protocols, less control overhead is a distinct advantage of the reactive protocols. Thus, reactive routing protocols have better scalability than proactive routing protocols. However, when using reactive routing protocols, source nodes may suffer from long delays for route searching before they can forward data packets. Hence these protocols are not suitable for real-time applications. As per our findings the difference in the protocols mechanics leads to significant performance differentials for both of these protocols. The performance differentials are analyzed using varying simulation time. These simulations are carried out using the NS-2 network simulator. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.

  5. Efficient Resource Conservation Design in Mobile Ad hoc Networks Using Reactive Routing Protocol

    Directory of Open Access Journals (Sweden)

    R.Sujitha

    2013-04-01

    Full Text Available Mobile Ad hoc Network is a compilation of wireless mobile terminals that are in contact with each other in the absence of a permanent infrastructure network. This gives a irregular formation. Many resources like power, energy, reliable data delivery and end to end delay plays a significant role in the network. But due to the dynamic movement of nodes, power management and energy conservation stands as a critical area. This is also due to the limited battery power and the maximum utilization of power by the nodes in the network .The responsibility of saving power has increased and it is possible byminimizing the consumption during the routing process. It is done in order to expand the lifetime of the network. In view of such a vital position, we introduce a new algorithm using an MAODV( Modified AdHoc On-Demand Distance Vector Routing Protocol protocol which exactly concentrates on power awareness at the time of route selection. Power status of each and every node is observed to avoid excess consumption. It also makes sure that there is a rise in the speed of route selection and discovery process. Route Patch-Up scheme used in this algorithm results in optimum utilization of power using an Modified AODV (MAODV protocol. Thus the idea proposed provides better performance through simulation over NS2.

  6. Improve Performance of TCP New Reno Over Mobile Ad-Hoc Network Using ABRA

    Directory of Open Access Journals (Sweden)

    Dhananjay Bisen

    2011-05-01

    Full Text Available In a mobile ad hoc network, temporary link failures and route changes occur frequently. With theassumption that all packet losses are due to congestion, TCP performs poorly in such an environment.There are many versions of TCP which modified time to time as per need. In this paper modificationsintroduced on TCP New Reno over mobile ad-hoc networks using calculation of New RetransmissionTime out (RTO, to improve performance in term of congestion control. To calculate New RTO, adaptivebackoff response approach (ABRA in TCP New Reno was applied which suggest ABRA New Reno. Itutilizes an ABRA by which congestion window and slow start threshold values were decreased wheneveran acknowledgement is received and new backoff value calculate from smoothed round trip time.Evaluation based on comparative study of ABRA New Reno with other TCP Variants like New Reno andReno was done using realistic parameters like TCP Packet Received, Packet Drop, Packets Retransmitted,Throughput, and Packet Delivery Ratio calculated by varying attributes of Node Speed, Number of Nodesand Pause Time. Implementation and simulations were performed in QualNet 4.0 simulator.

  7. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  8. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ramesh Sekaran

    2014-01-01

    Full Text Available The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET. The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  9. Fuzzy Logic QoS Dynamic Source Routing for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xu; CHENG Sheng; FENG Mei-yu; DING Wei

    2004-01-01

    Considering the characters of dynamic topology and the imprecise state information in mobile ad hoc network,we propose a Fuzzy Logic QoS Dynamic Source Routing (FLQDSR) algorithm based on Dynamic Source Routing (DSR)protocol while adopting fuzzy logic to select the appropriate QoS routing in multiple paths which are searched in parallel.This scheme considers not only the bandwidth and end-to-end delay of routing, but also the cost of the path. On the other hand the merit of using fuzzy logic is that it can be implemented by hardware. This makes the realization of the scheme easier and faster. However our algorithm is based on DSR, the maximal hop count should be less than 10, i.e., the scale of mobile ad hoc network should not be very large. Simulation results show that FLQDSR can tolerate a high degree of information imprecision by adding the fuzzy logic module which integrates the QoS requirements of application and the routing QoS parameters to determine the most qualified one in every node.

  10. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    Science.gov (United States)

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  11. Improve performance of tcp new reno over mobile ad-hoc network using abra

    CERN Document Server

    Bisen, Dhananjay

    2011-01-01

    In a mobile ad hoc network, temporary link failures and route changes occur frequently. With the assumption that all packet losses are due to congestion, TCP performs poorly in such an environment. There are many versions of TCP which modified time to time as per need. In this paper modifications introduced on TCP New Reno over mobile ad-hoc networks using calculation of New Retransmission Time out (RTO), to improve performance in term of congestion control. To calculate New RTO, adaptive backoff response approach (ABRA) in TCP New Reno was applied which suggest ABRA New Reno. It utilizes an ABRA by which congestion window and slow start threshold values were decreased whenever an acknowledgement is received and new backoff value calculate from smoothed round trip time. Evaluation based on comparative study of ABRA New Reno with other TCP Variants like New Reno and Reno was done using realistic parameters like TCP Packet Received, Packet Drop, Packets Retransmitted, Throughput, and Packet Delivery Ratio calcu...

  12. An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    CERN Document Server

    Al-Omari, Saleh Ali K; 10.5121/jgraphhoc.2010.2107

    2010-01-01

    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any...

  13. Directed Dynamic Small-World Network Model for Worm Epidemics in Mobile ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHU Chen-Ping; WANG Li; LIU Xiao-Ting; YAN Zhi-Jun

    2012-01-01

    We investigate the worm spreading process in mobile ad hoc networks with a susceptible-infected-recovered model on a two-dimensional plane.A medium access control mechanism operates within it,inhibiting transmission and relaying a message by using other nodes inside the node's transmitting circle during speaking.We measure the rewiring probability p with the transmitting range r and the average relative velocity (v) of the moving nodes,and map the problem into a directed dynamic small-world network.A new scaling relation for the recovered portion of the nodes reveals the effect caused by geometric distance,which has been ignored by previous models.%We investigate the worm spreading process in mobile ad hoc networks with a susceptible-infected-recovered model on a two-dimensional plane. A medium access control mechanism operates within it, inhibiting transmission and relaying a message by using other nodes inside the node's transmitting circle during speaking. We measure the rewiring probability p with the transmitting range r and the average relative velocity (v) of the moving nodes, and map the problem into a directed dynamic small-world network. A new scaling relation for the recovered portion of the nodes reveals the effect caused by geometric distance, which has been ignored by previous models.

  14. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Y. Harold Robinson

    2015-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO that uses continuous time recurrent neural network (CTRNN to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  15. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  16. A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-06-01

    and on-demand protocols like the Dynamic Source Routing (DSR) [5], Ad hoc On-demand Distance Vector ( AODV ) routing [6], Location-aided Routing (LAR...minimum residual battery power of a node in the route . MMBCR can be implemented on the top of any on-demand routing protocol like DSR, AODV and etc...Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan1 and Leslie C. Milton2

  17. Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under Mobility Models in Hybrid Ad hoc Network

    OpenAIRE

    Abdusy Syarif; Riri Fitri Sari

    2011-01-01

    In mobile ad hoc networks (MANETs), routing protocol plays the most important role. In the last decade, Ad hoc On-demand Distance Vector (AODV) routing protocol becomes the attention of focussed research on MANETs world wide. A lot of protocols had been proposed to improve and optimize AODV routing protocol to achieve the best in quest of reliable protocol. In this paper, we present some improvement suggestion to AODV routing protocol. Our proposed protocol, called AODV-UI, improved AODV in g...

  18. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    Science.gov (United States)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  19. Link Stability and Node Energy Conscious Local Route-Repair Scheme for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Anuradha Banerjee

    2010-01-01

    Full Text Available Problem statement: A mobile ad hoc network is a self-configuring network of mobile nodes connected by wireless links. As the nodes are free to move randomly, topology of the network may change rapidly and unpredictably. As a result, intermediate nodes in the communication routes tend to lose connection with each other during the communication process. In order to repair a broken link, an end-to-end (from source to destination route discovery is typically performed to establish a new route for communication. The mechanism results in huge communication overhead and long delay in completion of the communication. So, it is rational to locally repair a link, as much as possible, than to discover a whole new route. Approach: In the present article, we proposed a Link Stability and Node Energy Conscious (LSNEC local route repair scheme for mobile ad hoc networks. In case of breakage of a link from node na to another node nb in between a communication session, LSNEC instructs na to broadcast a ROUTE-REPAIR message within its radio-range specifying nb or any successor of nb in the broken route, as a desirable destination. If any node residing within the radio-range of na has an already established single/multi-hop path to any one of those destinations mentioned in the ROUTE-REPAIR message, it sends a REPAIR-ACK message back to na. Attributes of REPAIR-ACK include the identification number (s of the destination (s as well as identification numbers, geographical positions (in terms of latitude and longitude, radio-ranges and residual energies of nodes present in the associated path to that destination along with the intuitively computed stability of links between the consecutive nodes. The stability is computed depending upon relative velocities of the involved nodes, distance between them and the history of survival of the link. The optimal path is chosen depending upon the residual energy of nodes, stability of links and number of hops in that path

  20. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  1. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  2. A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Ramrekha, Tipu A; Politis, Christos

    2010-01-01

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN test-bed” to enable secure routing in MANETs. The us...

  3. ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2010-09-01

    Full Text Available We compare the probability of k-Connectivity of an ad hoc network under Random Way Point (RWP,City Section and Manhattan mobility models. A Network is said to be k-Connected if there exists at least kedge disjoint paths between any pair of nodes in that network at any given time and velocity. Initially, foreach of the three mobility models, the movement of the each node in the ad hoc network at a givenvelocity and time are captured and stored in the Node Movement Database (NMDB. Using themovements in the NMDB, the location of the node at a given time is computed and stored in the NodeLocation Database (NLDB. A weighted graph is created using the location of the nodes from NLDB,which is converted into a residual graph. The k-Connectivity of this residual graph is obtained by runningFord-Fulkerson’s algorithm on it. Ford Fulkerson’s algorithm computes the maximum flow of a networkby recording the flows assigned to different routes from each node to all the other nodes in the network.When run for a particular source-destination pair (s, d pair on a residual network graph with unit edgeweights as capacity, the maximum flow determined by Ford-Fulkerson’ algorithm is the number of edgedisjoint s-d paths on the network graph. Simulations show that the RWP model yields the highestprobability of k-Connectivity compared to City Section and Manhattan mobility models for a majority ofdifferent node densities and velocities considered. Simulation results also show that, for all the threemobility models, as the k value increases, the probability of k-Connectivity decreases for a given densityand velocity and as the density increases the probability of k-Connectivity increases.

  4. Data Dissemination in Mobile Phone Sensor Networks

    NARCIS (Netherlands)

    Unknown, [Unknown; Le, Viet Duc; Le Viet Duc, L Duc

    Deploying sensors over large areas is costly in terms of configuration, hardware, and maintenance. Using onboard sensors of today mobile phones can significantly reduce the expenses in monitoring areas and disseminating events or data. Via the available short-range Bluetooth and/or WiFi interfaces,

  5. Data Dissemination in Mobile Phone Sensor Networks

    NARCIS (Netherlands)

    Le, Viet-Duc; Le, Viet-Duc

    2012-01-01

    Deploying sensors over large areas is costly in terms of configuration, hardware, and maintenance. Using onboard sensors of today mobile phones can significantly reduce the expenses in monitoring areas and disseminating events or data. Via the available short-range Bluetooth and/or WiFi interfaces,

  6. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    Science.gov (United States)

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-12-15

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  7. A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    K.P.Manikandan

    2011-03-01

    Full Text Available A Mobile Ad hoc Network (MANET is a dynamic wireless network that can be formed infrastructure less connections in which each node can act as a router. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operations. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in routing protocols. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions. Finally, we have identified the challenges and proposed solutions to overcome them. In our survey, we focus on the findings and related works from which to provide secure protocols for MANETs. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

  8. Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    P Vijayalakshmi

    2011-07-01

    Full Text Available In Mobile Ad-Hoc Networks (MANETs, mobile devices are equipped with power (energy. In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two routing protocols like Ad-Hoc On Demand Distance Vector Protocol (AODV and Destination Sequenced Distance Vector Routing Protocol (DSDV. The comparison results prove that AODV protocol can be adopted for any routing strategy, in order to increase the performance of the network lifetime in comparison with DSDV.

  9. Power control in reactive routing protocol for Mobile Ad Hoc Network

    CERN Document Server

    Heni, Maher

    2012-01-01

    The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector) in order to improve the energy consumption in mobile ad hoc networks (MANET). The purpose is to minimize the regular period of HELLO messages generated by the AODV protocol used for the research, development and maintenance of routes. This information is useful to have an idea about battery power levels of different network hosts. After storing this information, the node elect the shortest path following the classical model used this information to elect safest path (make a compromise) in terms of energy. Transmitter node does not select another node as its battery will be exhausted soon. Any node of the network can have the same information's about the neighborhoods as well as other information about the energy level of the different terminal to avoid routing using a link that will be lost due to an exhausted battery of a node in this link. Analytical study and simulations by Jist/SWANS have been conducted to no...

  10. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Peng, Sancheng; Jia, Weijia; Wang, Guojun; Wu, Jie; Guo, Minyi

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  11. A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Ukil, Arijit

    2011-01-01

    A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms,absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the propose...

  12. Distinguishing congestion from malicious behavior in mobile ad-hoc networks

    Science.gov (United States)

    Ding, Jin; Medidi, Sirisha R.

    2004-08-01

    Packet dropping in Mobile Ad-hoc Networks could be a result of wireless link errors, congestion, or malicious packet drop attack. Current techniques for detecting malicious behavior either do not consider congestion in the network or are not able to detect in real time. Further more, they usually work at network layer. In this paper, we propose a TCP-Manet protocol, which reacts to congestion like TCP Reno protocol, and has additional capability to distinguish among congestion, wireless link error, and malicious packet drop attack. It is an end-to-end mechanism that does not require additional modifications to the nodes in the network. Since it is an extension of existing TCP protocol, it is compatible with existing protocols. It works in conjunction with the network layer and an unobtrusive monitor to assist the network in the detection and characterization of the nature of the behavior. Experimental results show that TCP-Manet has the same performance as that of TCP-Reno in wired network, and performs better in wireless ad-hoc networks in terms of throughput while having good detection effectiveness.

  13. Dynamic Coverage of Mobile Sensor Networks

    CERN Document Server

    Liu, Benyuan; Nain, Philippe; Towsley, Don

    2011-01-01

    In this paper we study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations are likely to be covered at a later time. A larger area is covered as time continues, and intruders that might never be detected in a stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further characterize the time it takes to detect a randomly located intruder. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders. Our results show that sensor mobility brings about unique dynamic coverage properties not present in a stationary sens...

  14. An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2012-05-01

    Full Text Available We propose an algorithm to determine stable connected dominating sets (CDS for mobile ad hoc networks using the notion of strong neighborhood (SN. The SN-CDS algorithm takes an input parameter called the Threshold Neighborhood Distance Ratio (TNDR; for an edge to be part of a strong neighborhood-based topology, the ratio of the physical Euclidean distance between the end nodes of the edge to that of the transmission range per node has to be less than or equal to the TNDR. The algorithm prefers to include nodes (into the SN-CDS in the decreasing order of the number of uncovered strong neighbors until all nodes in the network are covered. We observe the SN-CDS (TNDR < 1 to have a significantly longer lifetime than a maximum density-based CDS (MaxD-CDS with TNDR = 1.0; the tradeoff being a slightly larger CDS Node Size and hop count per path.

  15. Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rutuja Shah

    2016-09-01

    Full Text Available Mobile ad hoc Networks (MANET, being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior.

  16. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  17. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  18. PCBA: A Priority-Based Competitive Broadcasting Algorithm in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHOU BoSheng(周伯生); WU JieYi(吴介一); FEI Xiang(费翔); ZHAO Jian(赵键)

    2003-01-01

    Broadcasting operations are of great importance in Mobile Ad Hoc Networks(MANETs) since they are frequently executed. A straightforward broadcasting by flooding willproduce serious redundancy, contention and collision, and furthermore it will result in the perfor-mance degradation of the networks. PCBA, a Priority-based Competitive Broadcasting Algorithm,is proposed in this paper to solve the above problem. In this algorithm, hosts with larger PriorityIndex (PI) have higher probability to rebroadcast relevant messages while some other hosts will beprevented from rebroadcasting according to the competing policy. PCBA is a distributed algorithmand will not increase communication overhead. Through the analyses and extensive simulations,the authors demonstrate that PCBA has advantages in availability and scalability. It can signif-icantly reduce the rebroadcast redundancy. In addition, PCBA can also be further used in otherapplications such as routing discovery schemes, enhancing the performance.

  19. A distributed adaptive multi-hop certification authority scheme for mobile Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    Tan Xuezhi; Wu Shaochuan; Jia Shilou

    2005-01-01

    This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.

  20. Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

    CERN Document Server

    Yu, F Richard; Huang, Minyi; Mason, Peter; Li, Zhiqiang

    2011-01-01

    In cognitive radio mobile ad hoc networks (CR-MANETs), secondary users can cooperatively sense the spectrum to detect the presence of primary users. In this chapter, we propose a fully distributed and scalable cooperative spectrum sensing scheme based on recent advances in consensus algorithms. In the proposed scheme, the secondary users can maintain coordination based on only local information exchange without a centralized common receiver. We use the consensus of secondary users to make the final decision. The proposed scheme is essentially based on recent advances in consensus algorithms that have taken inspiration from complex natural phenomena including flocking of birds, schooling of fish, swarming of ants and honeybees. Unlike the existing cooperative spectrum sensing schemes, there is no need for a centralized receiver in the proposed schemes, which make them suitable in distributed CR-MANETs. Simulation results show that the proposed consensus schemes can have significant lower missing detection prob...

  1. Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

    CERN Document Server

    Subramanian, Sridhar

    2012-01-01

    A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehav...

  2. A REVIEW ON ADVANCED TRAFFIC CONTROL TECHNIQUES IN MOBILE AD-HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Babita

    2012-09-01

    Full Text Available A mobile ad hoc network (MANET is a dynamicdistributed system of wireless nodes that moveindependently of each other. The operating transmissionrange of the nodes is limited and as a result, MANETroutes are often multi-hop in nature. Any node in aMANET can become a source or destination, and eachnode can function as a router, forwarding data for its peers.MANET routing protocols are either proactive or reactivein nature. Proactive routing protocols determine andmaintain routes between any pair of nodes irrespective oftheir requirement. The reactive on-demand routingprotocols determine a route only when required. As thenetwork topology changes dynamically, reactive ondemandrouting has been preferred over proactive routing.In this Paper, we will review the routing protocol in theMANET.

  3. A Multi-Path Certification Protocol for Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip

    2012-01-01

    A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. For security, these protocols are highly dependent on cryptographic key exchange operations. This paper presents a multi-path certification protocol for efficient and reliable key exchange among the nodes in a MANET. Simulation results have shown the effectiveness and efficiency of the protocol.

  4. Enhancing congestion control to address link failure loss over mobile ad-hoc network

    CERN Document Server

    Fard, Mohammad Amin Kheirandish; Aflaki, Mohammad

    2011-01-01

    Standard congestion control cannot detect link failure losses which occur due to mobility and power scarcity in multi-hop Ad-Hoc network (MANET). Moreover, successive executions of Back-off algorithm deficiently grow Retransmission Timeout (RTO) exponentially for new route. The importance of detecting and responding link failure losses is to prevent sender from remaining idle unnecessarily and manage number of packet retransmission overhead. In contrast to Cross-layer approaches which require feedback information from lower layers, this paper operates purely in Transport layer. This paper explores an end-to-end threshold-based algorithm which enhances congestion control to address link failure loss in MANET. It consists of two phases. First, threshold-based loss classification algorithm distinguishes losses due to link failure by estimating queue usage based on Relative One-way Trip Time (ROTT). Second phase adjusts RTO for new route by comparing capabilities of new route to the broken route using available i...

  5. POWER-AWARE ROUTING BASED ON DSR FOR MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Huang Jingbo; Hong Peilin; Li Jinsheng

    2007-01-01

    Energy consumption is a crucial design concern in Mobile Ad hoc NETworks (MANETs)since nodes are powered by batteries with limited energy, whereas Dynamic Source Routing (DSR)protocol does not take the energy limitation of MANET nodes into account. This paper proposes an energy-saving routing algorithm based on DSR: Power Aware Routing protocol based on DSR (PAR-DSR). The design objective of PAR-DSR is to select energy-efficient paths. The main features of PAR-DSR are: (1) Nodes use the Signal Attenuation Rate (SAR) to conduct power control operations;(2) Minimum path cost as metric to balance the traffic and energy consumption of wireless nodes. The simulation results show that PAR-DSR can greatly reduce the energy consumption of MANET nodes.The average node lifetime of PAR-DSR is 50%-77% longer than that of DSR.

  6. Security enhancement for mobile ad hoc networks routing with OLSRv2

    Science.gov (United States)

    Wei, Zhexiong; Tang, Helen; Yu, F. Richard; Wang, Maoyu

    2013-05-01

    Some features of Mobile Ad hoc Networks (MANETs), including dynamic membership, topology, and open wireless medium, introduce a variety of security risks. Malicious nodes can drop or modify packets that are received from other nodes. These malicious activities may seriously affect the availability of services in MANETs. Therefore, secure routing in MANETs has emerged as an important MANET research area. In this paper, we propose a scheme that enhances the security of Optimal Link State Routing version 2 (OLSRv2) in MANETs based on trust. In the proposed scheme, more accurate trust can be obtained by considering different types of packets and other important factors that may cause dropping packets in friendly nodes, such as buffer overflows and unreliable wireless connections. Simulation results are presented to demonstrate the effectiveness of the proposed scheme.

  7. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  8. Blackboard Rules for Coordinating Context-aware Applications in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jean-Marie Jacquet

    2012-08-01

    Full Text Available Thanks to improvements in wireless communication technologies and increasing computing power in hand-held devices, mobile ad hoc networks are becoming an ever-more present reality. Coordination languages are expected to become important means in supporting this type of interaction. To this extent we argue the interest of the Bach coordination language as a middleware that can handle and react to context changes as well as cope with unpredictable physical interruptions that occur in opportunistic network connections. More concretely, our proposal is based on blackboard rules that model declaratively the actions to be taken once the blackboard content reaches a predefined state, but also that manage the engagement and disengagement of hosts and transient sharing of blackboards. The idea of reactiveness has already been introduced in previous work, but as will be appreciated by the reader, this article presents a new perspective, more focused on a declarative setting.

  9. EPCM - an efficient power controlled MAC protocol for mobile ad hoc network

    Science.gov (United States)

    Seth, D. D.; Patnaik, S.; Pal, S.

    2014-10-01

    To reduce interference and to save a significant amount of energy, a control of transmission power is employed in Mobile Ad hoc Network. Many researchers have reported numerous transmission power control schemes to achieve the objective. Some of those techniques use higher transmission power for control packets (Request To Send/Clear To Send) and lesser power for Data and ACK packets. These schemes, though save some amount of energy, achieve least aggregate throughput due to poor spatial reuse and hidden terminal interference. In this paper, an efficient Power Controlled Medium Access Control (EPCM) scheme is evinced, which uses uniform interference aware and minimum transmission power for both Control and Data packet. The performance of EPCM is evaluated and compared with three reported Medium Access Control protocols which are based on transmission power control schemes and is observed that the proposed protocol achieves better throughput and minimal energy consumption while avoiding the hidden terminal problem.

  10. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  11. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  12. Ants-Based On-Demand Routing Algorithm for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time,route energy etc. by the continuous delivery of data packets,then calculates the compositive parameter for each route which can be seen as the stigmity and uses it to choose the comparatively optimal route in real time.To adjust the weight of each traffic information,the algorithm can meet the different demand of the network's user. Multipath source self repair routing (MSSRR) algorithm and dynamic source routing (DSR) can be seen as the special samples of AORA. The routing overhead is not increased in this algorithm. By using simulation, it can be seen that the performance of AORA is better than that of DSR in all scenarios obviously,especially the delivery fraction is increased by more than 100%.

  13. Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures

    CERN Document Server

    Anitha, V

    2011-01-01

    The emerging need for mobile ad hoc networks and secured data transmission phase is of crucial importance depending upon the environments like military. In this paper, a new way to improve the reliability of message transmission is presented. In the open collaborative MANET environment, any node can maliciously or selfishly disrupt and deny communication of other nodes. Dynamic changing topology makes it hard to determine the adversary nodes that affect the communication in MANET. An SMT protocol provides a way to secure message transmission by dispersing the message among several paths with minimal redundancy. The multiple routes selected are known as APS -Active Path Set. This paper describes a technique for fault discovery process to identify Byzantine failures which include nodes that drop, modify, or mis-route packets in an attempt to disrupt the routing service. An adaptive probing technique detects a malicious link through binary search and according to the nodes behavior, these links are avoided in th...

  14. Topology Control and Routing in Mobile Ad Hoc Networks with Cognitive Radios

    CERN Document Server

    Guan, Quansheng; Jiang, Shengming

    2011-01-01

    Cognitive radio (CR) technology will have significant impacts on upper layer performance in mobile ad hoc networks (MANETs). In this paper, we study topology control and routing in CR-MANETs. We propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is a midware-like cross-layer module residing between CR module and routing. The proposed PCTC scheme uses cognitive link availability prediction, which is aware of the interference to primary users, to predict the available duration of links in CR-MANETs. Based on the link prediction, PCTC constructs an efficient and reliable topology, which is aimed at mitigating re-routing frequency and improving end-to-end network performance such as throughput and delay. Simulation results are presented to show the effectiveness of the proposed scheme.

  15. Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Ad Hoc Networks

    CERN Document Server

    Kalaiarasi, R; Pari, S Neelavathy; Sridharan, D

    2010-01-01

    Mobile Ad Hoc Network (MANET) is a collection of nodes that can be rapidly deployed as a multi-hop network without the aid of any centralized administration. Misbehavior is challenged by bandwidth and energy efficient medium access control and fair share of throughput. Node misbehavior plays an important role in MANET. In this survey, few of the contention window misbehavior is reviewed and compared. The contention window cheating either minimizes the active communication of the network or reduces bandwidth utilization of a particular node. The classification presented is in no case unique but summarizes the chief characteristics of many published proposals for contention window cheating. After getting insight into the different contention window misbehavior, few of the enhancements that can be done to improve the existing contention window are suggested. The purpose of this paper is to facilitate the research efforts in combining the existing solutions to offer more efficient methods to reduce contention win...

  16. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; G., Harihara S; Reddy, Harish; Balamuralidhar, P

    2011-01-01

    Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. A gray hole is a node that selectively drops and forwards data packets after it advertises itself as having the shortest path to the destination node in response to a route request message from a source node. The proposed mechanism does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to malicious activities of any node. Simulation results show that the scheme has a significantly high detection rate with moderate network traffic overhead.

  17. A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Rajaram

    2010-07-01

    Full Text Available In mobile ad hoc networks (MANETs, it is easy to launch wormhole, man-in-the-middle and denial of service (DoS attacks, or to impersonate another node. Trust based cross layer approach established a network consisting confidentiality and authentication of packets in both routing and link layers., in this paper, we propose to develop an enhanced distributed certificate authority scheme to provide data integrity, thus making the network more secure from both inside and outside attacks. The proposed scheme makes use of Shamir's secret sharing scheme along with a redundancy technique to support certificate renewal and revocation. The malicious nodes are detected by the trusting mechanism by monitoring the behavior hop by hop. By simulation results, we show that the proposed scheme achieves more packet delivery ratio while attaining less delay and overhead, compared with the trust based cross layer approach.

  18. COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    SUNIL K. PARYANI,

    2011-05-01

    Full Text Available Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology such as MANET, we focus on developing effective detection approaches In this paper, we present an intrusion detection system for detection of malicious node in mobile ad hoc network. The technique is designed for detection of malicious nodes in a neighborhood in which each pair of nodes are within radio range of each other. Such a neighborhood of nodes is known as a clique. [1] This technique is aimed to reduce the computation and communication costs to select a monitor node and reduces the message passing between the nodes to detect a malicious node from the cluster hence there very less traffic and less chances of a collision.

  19. AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing,communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.

  20. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  1. HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Mohammad Saiful Islam Mamun

    2010-07-01

    Full Text Available In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs.However, security is one of the significant challenges for sensor network because of their deploymentin open and unprotected environment. As cryptographic mechanism is not enough to protect sensornetwork from external attacks, intrusion detection system needs to be introduced. Though intrusionprevention mechanism is one of the major and efficient methods against attacks, but there might besome attacks for which prevention method is not known. Besides preventing the system from someknown attacks, intrusion detection system gather necessary information related to attack technique andhelp in the development of intrusion prevention system. In addition to reviewing the present attacksavailable in wireless sensor network this paper examines the current efforts to intrusion detectionsystem against wireless sensor network. In this paper we propose a hierarchical architectural designbased intrusion detection system that fits the current demands and restrictions of wireless ad hocsensor network. In this proposed intrusion detection system architecture we followed clusteringmechanism to build a four level hierarchical network which enhances network scalability to largegeographical area and use both anomaly and misuse detection techniques for intrusion detection. Weintroduce policy based detection mechanism as well as intrusion response together with GSM cellconcept for intrusion detection architecture.

  2. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  3. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Directory of Open Access Journals (Sweden)

    Maha Abdelhaq

    Full Text Available A mobile ad hoc network (MANET is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  4. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  5. A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    In a multi-hop mobile ad hoc network (MANET), mobile nodes cooperate to form a network without using any infrastructure such as access points or base stations. The mobility of the nodes and the fundamentally limited capacity of the wireless medium, together with wireless transmission effects such as attenuation, multi-path propagation, and interference combine to create sig-nificant challenges for security in MANETs. Traditional cryptographic mecha-nisms such as authentication and encryption are not capable of handling some kinds of attacks such as packet dropping by malicious nodes in MANETs. This paper presents a mechanism for detecting malicious packet dropping attacks in MANETs. The mechanism is depends on a trust module on each node, which is based on the reputation value computed for that node by its neighbors. The reputation value of a node is computed based on its packet forwarding behavior in the network. The reputation information is gathered, stored and exchanged between the nodes, and computed und...

  6. An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dhirendra Kumar Sharma

    2013-09-01

    Full Text Available Low cost energy-efficient (power based routing protocols of mobile ad hoc networks (MANETs increase the lifetime of static networks by using received signal strength (RSS and battery power status (PS. They require GPS service to find the exact location of mobile nodes. The GPS devices themselves consume power because they need excessive updates to find the stationary nodes for efficient routing. To overcome this, RSS is being used as a metric, followed by, residual battery power. The recent protocols, based on these concepts, provide energy efficient routes during the route discovery phase only. Topological changes make these routes weak in due course of time. To update routes, HELLO process can be used, which however creates unnecessary overhead, delay and consumes power. Hence, these protocols do not update the routes. We propose an energy-efficient reactive routing protocol that uses the RSS and PS of mobile nodes. Proposed Link Failure Prediction (LFP algorithm uses the link-layer feedback system to update active routes. We use ns2 for simulation of the proposed algorithm. Comparing the results of proposed scheme and existing scheme, in terms of energy consumption, link failure probability, and retransmission of packets, we observe that the proposed scheme outperforms the existing one.

  7. Implementation of EnhancedSecurity AlgorithmsinMobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Takialddin A. Al Smadi

    2014-01-01

    Full Text Available Mobile Ad hoc Networks are wireless infrastructure less networks can beeasily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance of the network by securing the data and to minimize the malicious nodes which disturb the stream of the network. Securing data is a critical task which can be achieved by cryptographic algorithms and disturbance detection plays as a crucial ingredient in any comprehensive security solution to address the threats.Hence a Novel Cryptographic Algorithm with a new Disturbance Detection System (DDS has been proposed for Mobile Adhoc Networks. This method prevents the outside attacks to obtain any information from any data exchange in network and also use promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values.The proposed algorithm was implemented and simulated in the Glomosim and the result analysis proved that the performance of the network is increased.

  8. A Survey Of Tcp Reno, New Reno And Sack Over Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Md Nazmul Islam Khan

    2012-02-01

    Full Text Available Transmission Control Protocol (TCP is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission insuch a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK. In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As our simulation results demonstrate, the increases in the node velocity sometimes help the TCP to attain a better performance. The study also reveals that out of the three variants, TCP SACK can adaptrelatively well to the changing network sizes while TCP Reno performs most robustly in the presence ofdifferent mobility rates within MANET.

  9. A time-slotted on-demand routing protocol for mobile ad hoc unmanned vehicle systems

    Science.gov (United States)

    Forsmann, J. Hope; Hiromoto, Robert E.; Svoboda, John

    2007-04-01

    Successful deployment of Unmanned Vehicle Systems (UVS) in military operations has increased their popularity and utility. The ability to sustain reliable mobile ad hoc formations dramatically enhances the usefulness and performance of UVS. Formation movement increases the amount of ground coverage in less time, decreases fuel consumption of the individual nodes, and provides an avenue for mission expansion through cooperative maneuvers such as refueling. In this paper, we study the wireless communication demands that arise from formation and maintenance of UVS within the context of a mobile ad hoc network (MANET). A MANET in formation is typically characterized by tradeoffs between network congestion and the ability to maintain useable communication bandwidth. Maintenance of UVS formations requires each node in the network to be peer-aware, which places a heavy demand on inner node communication. In order to mitigate the inner node network congestion, we introduce a time-slotted communication protocol. The protocol assigns time-slots and allows the designated nodes to communicate directly with other peer-nodes. This approach has been introduced within the context of the Time-Slotted Aloha protocol for station-to-station communication. The approach taken here is to embed the time-slotted reservation protocol into a standard on-demand routing protocol to also address the need to reactively and proactively respond to formation maintenance. The time-slotted on-demand routing protocol is shown to eliminate collisions due to route determination and, therefore, enhance quality of service as well as ensure necessary support for formation movement. A worst-case scenario is described and simulations performed to comparatively demonstrate the advantages of the new protocol.

  10. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  11. Mobility based key management technique for multicast security in mobile ad hoc networks.

    Science.gov (United States)

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  12. Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes

    OpenAIRE

    S Mamatha; A.Damodaram

    2014-01-01

    Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to their open nature and lack of infrastructure, security for MANETS has become an intricate problem than the security in other networks. The conventional security mechanisms of protecting a wired network are not sufficient for these networks. Hence a second level of defense to detect and res...

  13. Inspiration from genetics to promote recognition and protection within ad hoc sensor networks

    CERN Document Server

    Korsnes, Reinert

    2009-01-01

    This work illustrates potentials for recognition within {\\em ad hoc} sensor networks if their nodes possess individual inter-related biologically inspired genetic codes. The work takes ideas from natural immune systems protecting organisms from infection. Nodes in the present proposal have individual gene sets fitting into a self organised phylogenetic tree. Members of this population are genetically ''relatives''. Outsiders cannot easily copy or introduce a new node in the network without going through a process of conception between two nodes in the population. Related nodes can locally decide to check each other for their genetic relation without directly revealing their gene sets. A copy/clone of a gene sequence or a random gene set will appear as alien. Nodes go through a cycle of introduction (conception or ''birth'') with parents in the network and later exit from it (''death''). Hence the phylogenetic tree is dynamic or possesses a genetic drift. Typical lifetimes of gene sets and number of offspring ...

  14. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2014-11-01

    Full Text Available Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  15. Coalescence for Mobile Sensor Networks

    OpenAIRE

    Poduri, Sameera; Sukhatme, Gaurav S.

    2007-01-01

    Coalescence is the problem of isolated mobile robots independently searching for peers with the goal of forming a single connected network. This paper analyzes coalescence time for a worst-case scenario where the robots do not have any knowledge about the environment or positions of other robots and perform independent, memory less search. Using the random direction mobility model, we show that coalescence time has an exponential distribution which is a function of the number of robots, speed...

  16. Opportunistic Hybrid Transport Protocol (OHTP for Cognitive Radio Ad Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousaf Bin Zikria

    2015-12-01

    Full Text Available The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet’s de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  17. Analysis of reactive routing protocols for mobile ad hoc networks in Markov models

    Institute of Scientific and Technical Information of China (English)

    WANG Han-xing; HU Xi; FANG Jian-chao; JIA Wei-jia

    2007-01-01

    Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatial reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing.

  18. Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    San-Cheng Peng; Wei-Jia Jia; Guo-Jun Wang

    2009-01-01

    Survivability refers to the ability of a network system to fulfill critical services in a timely manner to end users in the presence of failures and/or attacks. In order to establish a highly survivable system, it is necessary to measure its survivability to evaluate the performance of the system's services under adverse conditions. According to survivability requirements of large-scale mobile ad-hoc networks (MANETs), we propose a novel model for quantitative evaluation on survivability. The proposed model considers various types of faults and connection states of mobile hosts, and uses the continuous time Markov chain (CTMC) to describe the survivability of MANETs in a precise manner. We introduce the reliability theory to perform quantitative analysis and survivability evaluation of segment-by-segment routing (SSR), multipath-based segment-by-segment routing (MP-SSR), and segment-by-segment-based multipath routing (SS-MPR) in large-scale MANETs. The proposed model can be used to analyze the network performance much more easily than a simulation-based approach. Numerical validation shows that the proposed model can be used to obtain a better evaluation result on the survivability of large-scale MANETs.

  19. An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks

    CERN Document Server

    Iyengar, N Ch Sriman Narayana; Nagar, Piyush; Sharma, Siddharth; Atrey, Akshay; 10.5121/ijcnc.2010.2303

    2010-01-01

    Efficiency and simplicity of random algorithms have made them a lucrative alternative for solving complex problems in the domain of communication networks. This paper presents a random algorithm for handling the routing problem in Mobile Ad hoc Networks [MANETS].The performance of most existing routing protocols for MANETS degrades in terms of packet delay and congestion caused as the number of mobile nodes increases beyond a certain level or their speed passes a certain level. As the network becomes more and more dynamic, congestion in network increases due to control packets generated by the routing protocols in the process of route discovery and route maintenance. Most of this congestion is due to flooding mechanism used in protocols like AODV and DSDV for the purpose of route discovery and route maintenance or for route discovery as in the case of DSR protocol. This paper introduces the concept of random routing algorithm that neither maintains a routing table nor floods the entire network as done by vari...

  20. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  1. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  2. QoS Support in TDMA-Based Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Imad Jawhar; Jie Wu

    2005-01-01

    Mobile ad hoc networks (MANETs) are gaining a lot of attention in research lately due to their importance in enabling mobile wireless nodes to communicate without any existing wired or predetermined infrastructures. Furthermore,in order to support the growing need for multimedia and realtime applications, quality of service (QoS) support by the networking protocol is required. Several important QoS parameters that are needed by such applications can be identified.They include bandwidth, end-to-end delay, delay jitter, and bit error rate. A good amount of research has been developed in this area covering different issues and challenges such as developing routing protocols that support bandwidth reservation and delay management. In this paper, the current state of research for QoS support in TDMA-based MANETs at different layers of the networking model is presented and categorized. In addition, the current issues and future challenges involved in this exciting area of research are also included.

  3. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Science.gov (United States)

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  4. Peer-to-Peer Overlay in Mobile Ad-hoc Networks

    Science.gov (United States)

    Castro, Marcel C.; Kassler, Andreas J.; Chiasserini, Carla-Fabiana; Casetti, Claudio; Korpeoglu, Ibrahim

    Wireless multi-hop networks such as mobile ad-hoc (MANET) or wireless mesh networks (WMN) have attracted big research efforts during the last years as they have huge potential in several areas such as military communications, fast infrastructure replacement during emergency operations, extension of hotspots or as an alternative communication system. Due to various reasons, such as characteristics of wireless links, multi-hop forwarding operation, and mobility of nodes, performance of traditional peer-to-peer applications is rather low in such networks. In this book chapter, we provide a comprehensive and in-depth survey on recent research on various approaches to provide peer-to-peer services in wireless multi-hop networks. The causes and problems for low performance of traditional approaches are discussed. Various representative alternative approaches to couple interactions between the peer-to-peer overlay and the network layer are examined and compared. Some open questions are discussed to stimulate further research in this area.

  5. Impact of Vehicle Mobility on Performance of Vehicular Ad Hoc Network IEEE 1609.4

    Directory of Open Access Journals (Sweden)

    M. Ahyar

    2014-01-01

    Full Text Available Vehicular Ad hoc Network (VANET is a new communications system for moving vehicles at high speed, which are equipped with wireless communication devices, together with additional wireless roadside units, enabling communications among nearby vehicles (vehicle-to-vehicle communication as well as between vehicles and nearby fixed equipment (vehicle-to-infrastructure communication. Inter-vehicular communications aim to improve road traffic safety and provide multimedia services. VANET has become an important communication infrastructure for the Intelligent Transportation System (ITS. In this work we have studied the impact of vehicle mobility on the quality of service in VANET based on IEEE 1609.4. The performance of this network is evaluated through exhaustive simulations using the VanetMobiSim and Network Simulator-NS2 under different parameters like delay, packet delivery ratio, packet loss and throughput. The simulation results are obtained when vehicles are moving according to a freeway mobility model is significantly different from results based on Manhattan model. When the Manhattan model is used, there is an increase in the average end-to-end delay and packet loss.

  6. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  7. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  8. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  9. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  10. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  11. A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ayman EL-SAYED

    2014-05-01

    Full Text Available The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.

  12. INTRUSION DETECTION IN MOBILE AD HOC NETWORK USING SECURE ROUTING FOR ATTACKER IDENTIFICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    S. Gopalakrishnan

    2014-01-01

    Full Text Available In past few decades, the migration of communication takes place from wired networks to wireless networks because of its mobility and scalability and Mobile Ad hoc Network (MANET is a unique and significant application in recent years which does not necessitates any pre-existing network infrastructure. Each node can act as both transmitters as well as receivers that are communicating with each other when they are in same communication/transmission range. Otherwise, these nodes depend on neighbor nodes to transmit their packets and they possess self-configuring ability which makes MANETs popular in various critical mission applications such as military and other emergency applications. In general, MANETs are open medium network and their nodes are widely distributed which makes the network more vulnerable to various attackers. Some times, the transmitted packets are viewed or modified or corrupted by the attackers through the way to reach destination and the destination could not find such type of packets. So, the receiver can deliver modified packets with wrong information. Thus, it is essential to present an efficient secure routing protocol to preserve MANET from several attacks. In this study, we are going to propose and implement a novel routing protocol named Secure Routing for Attacker Identification (SRAI protocol that executes at receiver/destination side to discover the modified packets in delivered nodes and generate misbehaviour report to the source. Compared to modern approaches, SRAI protocol establishes higher attacker identification rates in certain considerations.

  13. Passing VBR in Mobile Ad Hoc Networks – for effective live video Streaming

    Directory of Open Access Journals (Sweden)

    V. Saravanan

    2013-01-01

    Full Text Available Mobile ad hoc networks (often referred to as MANETs consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. This technique can be used effectively in disaster management, intellectualconference and also in the battlefield environments. It has the significant attention in the recent years. This research paper depicts the remuneration of using suggestion tracking for selecting energy-conserving routes in delay-tolerant applications and it sends Variable Bit Rate delivery. The previous investigation set up from earlier period surveillance that delay can be traded for energy efficiency in selecting a path. The Prior objective is to find an experiential upper bound on the energy savings by assuming that each node accurately knows or predicts its future path. It examines the effect of varying the amount of future information on routing. Such a bound may prove useful in deciding how far to look in advance, and thus how much convolution to provide in mobility tracking.

  14. A New Strategy to Improve Proactive Route Updates in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Abolhasan Mehran

    2005-01-01

    Full Text Available This paper presents two new route update strategies for performing proactive route discovery in mobile ad hoc networks (MANETs. The first strategy is referred to as minimum displacement update routing (MDUR. In this strategy, the rate at which route updates are sent into the network is controlled by how often a node changes its location by a required distance. The second strategy is called minimum topology change update (MTCU. In this strategy, the route updating rate is proportional to the level of topology change each node experiences. We implemented MDUR and MTCU on top of the fisheye state routing (FSR protocol and investigated their performance by simulation. The simulations were performed in a number of different scenarios, with varied network mobility, density, traffic, and boundary. Our results indicate that both MDUR and MTCU produce significantly lower levels of control overhead than FSR and achieve higher levels of throughput as the density and the level of traffic in the network are increased.

  15. Agent based Bandwidth Reservation Routing Technique in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Vishnu Kumar Sharma,

    2011-12-01

    Full Text Available In mobile ad hoc networks (MANETs, inefficient resource allocation causes heavy losses to the service providers and results in inadequate user proficiency. For improving and automating the quality of service of MANETs, efficient resource allocation techniques are required. In this paper, we propose an agent based bandwidth reservation technique for MANET. The mobile agent from the source starts forwarding the data packets through the path which has minimum cost, congestion and bandwidth. The status of every node is collected which includes the bottleneck bandwidth field and the intermediate node computes the available bandwidth on the link. At the destination, after updating the new bottleneck bandwidth field, the data packet is feedback to the source. In resource reservation technique, if the available bandwidth is greater than bottleneck bandwidth, then bandwidth reservation for the flow is done. Using rate monitoring and adjustment methodologies, rate control is performed for the congested flows. By simulation results, we show that the resource allocation technique reduces the losses and improves the network performance.

  16. A Rough Penalty Genetic Algorithm for Multicast Routing in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chih-Hao Lin

    2013-01-01

    Full Text Available Multicast routing is an effective way to transmit messages to multiple hosts in a network. However, it is vulnerable to intermittent connectivity property in mobile ad hoc network (MANET especially for multimedia applications, which have some quality of service (QoS requirements. The goal of QoS provisioning is to well organize network resources to satisfy the QoS requirement and achieve good network delivery services. However, there remains a challenge to provide QoS solutions and maintain end-to-end QoS with user mobility. In this paper, a novel penalty adjustment method based on the rough set theory is proposed to deal with path-delay constraints for multicast routing problems in MANETs. We formulate the problem as a constrained optimization problem, where the objective function is to minimize the total cost of the multicast tree subject to QoS constraints. The RPGA is evaluated on three multicast scenarios and compared with two state-of-the-art methods in terms of cost, success rate, and time complexity. The performance analyses show that this approach is a self-adaptive method for penalty adjustment. Remarkably, the method can address a variety of constrained multicast routing problems even though the initial routes do not satisfy all QoS requirements.

  17. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  18. Ubiquitous Mobile Awareness from Sensor Networks

    Science.gov (United States)

    Kanter, Theo; Pettersson, Stefan; Forsström, Stefan; Kardeby, Victor; Österberg, Patrik

    Users require applications and services to be available everywhere, enabling them to focus on what is important to them. Therefore, context information (e.g., spatial data, user preferences, available connectivity and devices, etc.) has to be accessible to applications that run in end systems close to users. In response to this, we present a novel architecture for ubiquitous sensing and sharing of context in mobile services and applications. The architecture offers distributed storage of context derived from sensor networks wirelessly attached to mobile phones and other devices. The architecture also handles frequent updates of sensor information and is interoperable with presence in 3G mobile systems, thus enabling ubiquitous sensing applications. We demonstrate these concepts and the principle operation in a sample ubiquitous Mobile Awareness service.

  19. Sensor Fusion for Autonomous Mobile Robot Navigation

    DEFF Research Database (Denmark)

    Plascencia, Alfredo

    Multi-sensor data fusion is a broad area of constant research which is applied to a wide variety of fields such as the field of mobile robots. Mobile robots are complex systems where the design and implementation of sensor fusion is a complex task. But research applications are explored constantly....... The scope of the thesis is limited to building a map for a laboratory robot by fusing range readings from a sonar array with landmarks extracted from stereo vision images using the (Scale Invariant Feature Transform) SIFT algorithm....

  20. Misbehaving Node Detection in Mobile Ad Hoc Networks using Multi Hop Acknowledgement Scheme

    Directory of Open Access Journals (Sweden)

    U. Sakthivel

    2011-01-01

    Full Text Available Problem statement: For any node in a Mobile Ad hoc Network conservation of battery power and bandwidth are the priority. Hence, they try to reduce the overload they would otherwise incur when they forward packets. This selfish behavior of a node affects the throughput of the network. The nodes may also choose a back off value of shorter duration. These problems are handled effectively by the methodology proposed in this study. A conscious effort has been made keeping the constraints of the MANETs in mind. Approach: Misbehavior is best identified at the lower levels as the upper levels of the OSI standard primarily deals with the data the packets carry and less about how, so the network and the MAC layers is where the primary focus lies. Thus, keeping these points in mind, we propose algorithms that work along with the 802.11 MAC protocol to monitor the behavior of neighboring nodes by listening to the channel, specifically monitoring parameters like back off values sent by the nodes. A counter is maintained which is incremented every time node misconduct is detected, subsequently after a particular value is cross the node is labeled as misbehaving and the information is broadcast over the network. Results: Performance parameters like throughput, packet delivery ratio were monitored with traffic of the magnitude 10 to 60 nodes. Also the performance of the network based on the percentage of selfish nodes present in the network was monitored and a graph was generated based on the statistics. Conclusion: An algorithmic approach for misbehaving node detection and isolation in ad hoc networks by modifying the protocol being used in the lower layers which consequently improves performance of the network had been proposed. Simulation results show considerable performance increase upon implementing the proposed algorithm. Further research can confirm the practicality of the proposed idea.

  1. Investigating on Mobile Ad-Hoc Network to Transfer FTP Application

    Directory of Open Access Journals (Sweden)

    Ako Muhammad Abdullah

    2015-07-01

    Full Text Available Mobile Ad-hoc Network (MANET is the collection of mobile nodes without requiring of any infrastructure. Mobile nodes in MANET are operating as a router and MANET network topology can change quickly. Due to nodes in the network are mobile and thus can move randomly and organize arbitrarily regardless of the directions that generate great complexity in routing traffic from source to destination. To communicate with other nodes MANET nodes contain multiple applications and it needs the different level of data traffic. While data communicate different routing protocols require whereas every node must act as a router. Nowadays, different routing protocols have available for MANET. MANET protocols designed and implemented at the network layer have vital roles that affect the application running at the application layer. In this paper, the performance of On Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Geographic Routing Protocol (GRP will be evaluated. The main purpose of this research is to analyze the performance of MANET routing protocols to identify “Which routing protocol has ability to provide the best performance to transfer FTP Application in high mobility case under low, medium and high density scenario?”. The performance analyze with respect to Average End-to-End Delay, Media Access Delay, Network Load, Retransmission Attempt and Throughput. All simulations have been done using OPNET. On the basis of results show that the GRP gives better performance in End-to-End Delay, Media Access Delay, and Retransmission Attempt when varying network size and provide the best Throughput in small and medium network size. Simulation results verify that AODV gives better Throughput in a large network and lower Network Load in small and medium network size compared to GRP. DSR produces low Average Network load as compared to other protocols. The overall study of the FTP application shows that the performance of theses routing protocols

  2. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  3. Estimating Human Predictability From Mobile Sensor Data

    DEFF Research Database (Denmark)

    Jensen, Bjørn Sand; Larsen, Jakob Eg; Jensen, Kristian

    2010-01-01

    Quantification of human behavior is of prime interest in many applications ranging from behavioral science to practical applications like GSM resource planning and context-aware services. As proxies for humans, we apply multiple mobile phone sensors all conveying information about human behavior...

  4. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    2010-01-01

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from no

  5. 移动Ad Hoc网络原理及技术研究%Principle and Technology Research of Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    张书侨

    2014-01-01

    移动Ad Hoc网络移动通信领域具有十分广泛的应用,本文主要分析其通信原理及应用前景。%Mobile Ad Hoc network has the extremely widespread application in mobile communication ifeld. This paper mainly analyzes the communication principle and application prospect of mobile Ad Hoc Network.

  6. A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs)

    CERN Document Server

    Vasudevan, Rangarajan A

    2011-01-01

    In this paper, we present a novel encryption-less algorithm to enhance security in transmission of data packets across mobile ad hoc networks. The paper hinges on the paradigm of multipath routing and exploits the properties of polynomials. The first step in the algorithm is to transform the data such that it is impossible to obtain any information without possessing the entire transformed data. The algorithm then uses an intuitively simple idea of a jigsaw puzzle to break the transformed data into multiple packets where these packets form the pieces of the puzzle. Then these packets are sent along disjoint paths to reach the receiver. A secure and efficient mechanism is provided to convey the information that is necessary for obtaining the original data at the receiver-end from its fragments in the packets, that is, for solving the jigsaw puzzle. The algorithm is designed to be secure so that no intermediate or unintended node can obtain the entire data. An authentication code is also used to ensure authenti...

  7. A New Dynamic Route Discovery Mechanism for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Humaira Nishat

    2012-11-01

    Full Text Available Nodes in a mobile ad hoc network have limited battery power for their operation. Energy efficient routing protocol such as Min-Max Battery Cost Routing (MMBCR selects a path with nodes having maximum battery capacity for transmission of data packets from source to destination. Though MMBCR considers individual node battery power during route discovery process, the route selected does not change unless any node in that route is exhausted completely resulting in link failure. This paper proposes a new dynamic route discovery mechanism which adapts a new route periodically resulting in decreasing the probability of link failure and increasing the lifetime of the network. The proposed routing protocol is named Dynamic Route Discovery (DRD protocol. In this DRD protocol, the energy and cost function of each node is computed periodically by initializing route discovery process at regular intervals. Simulation results show that the proposed algorithm not only increases the lifetime of the network but also gives better throughput, packet delivery ratio and delay performance at the cost of increased routing overhead and normalized routing load compared to the existing MMBCR protocol.

  8. An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Md. Mahbubur Rahman

    2016-07-01

    Full Text Available In this paper we introduced an efficient scheme based on a weighted metric of remaining battery power, speed and distance of nodes for determining routes in wireless Mobile Ad hoc Networks (MANET. For the cases where significant difference in the velocities of the communicating nodes or the battery power of the intermediate nodes is low, traditional schemes fail to establish the communication among nodes with reliable QoS. We proposed a new algorithm that uses weighted combination of metrics of distance, velocity and battery power in selecting the route over earlier MFR (Most Forward within Radius method. The proposed scheme encompasses the load balancing issues and eventually it increases the network lifetime and network performance. Simulation experiment showed that the proposed algorithm reduces the packet loss than that of existing MFR algorithm. Experimental results also revealed that besides packet loss, the proposed strategy achieves higher throughput (14.35% rate than that of existing MFR. Furthermore, usages of these new metrics ensure the higher mean time to node failure.

  9. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  10. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    Science.gov (United States)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  11. A novel bandwidth allocation scheme for QoS routing in mobile ad hoc networks

    Science.gov (United States)

    Wu, Bin; Kuo, Geng-Sheng

    2004-09-01

    The main purpose of this paper is to propose a novel bandwidth allocation scheme for facilitating quality of service (QoS) routing in mobile ad hoc networks (MANETs). In a MANET using time division multiple access (TDMA), each node communicates with its neighbors in the same time slot. In general, finding a route with the maximum end-to-end bandwidth subject to the constraint of collision-free transmission is an NP-complete problem. This paper proposed a sub-optimal solution to this problem. The solution is based on a centrally controlled bandwidth allocation scheme to properly assign the available time slots to each intermediate link. The advantage of our proposed scheme is that the resource utilization of MANET is maximized and the end-to-end QoS is guaranteed during the route establishment period. Performance analyses show that when using the proposed scheme with AODV to perform QoS routing, it achieves about 25% throughput higher than its best-effort counterpart if the node is moving at 5mps speed.

  12. Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Khan, Ashiq; Suzuki, Toshihiro; Kobayashi, Motonari; Takita, Wataru; Yamazaki, Kenichi

    In Mobile AD-hoc Networks (MANET), transportation capability of wireless links' varies according to the size of the packets they transport. This instability, which is more acute in long links, has received little attention in the stabilizing schemes proposed so far for MANET. A lot of research has been carried out to utilize more reliable links in making end-to-end routes to avoid frequent route failures and realize higher packet delivery ratio. However, these approaches mainly consider the availability of a link over time and depend on link history which is difficult to acquire in highly dynamic systems. In this paper, we present an easy-to-implement but efficient method to find suitable end-to-end routes that are capable of transporting different sizes of the application data packets. Our scheme is stateless and does not rely on the underlying data link and physical layers. An extensive simulation shows the validity of our concept and highlights the improvement achieved by our proposal.

  13. Opportunistic Information Dissemination in Mobile Ad-hoc Networks: adaptiveness vs. obliviousness and randomization vs. determinism

    CERN Document Server

    Farach-Colton, Martin; Milani, Alessia; Mosteiro, Miguel A; Zaks, Shmuel

    2011-01-01

    In this paper the problem of information dissemination in Mobile Ad-hoc Networks (MANET) is studied. The problem is to disseminate a piece of information, initially held by a distinguished source node, to all nodes in a set defined by some predicate. We use a model of MANETs that is well suited for dynamic networks and opportunistic communication. In this model nodes are placed in a plane, in which they can move with bounded speed, and communication between nodes occurs over a collision-prone single channel. In this setup informed and uninformed nodes can be disconnected for some time (bounded by a parameter alpha), but eventually some uninformed node must become neighbor of an informed node and remain so for some time (bounded by a parameter beta). In addition, nodes can start at different times, and they can crash and recover. Under the above framework, we show negative and positive results for different types of randomized protocols, and we put those results in perspective with respect to previous determin...

  14. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  15. Mean field game theoretic approach for security in mobile ad-hoc networks

    Science.gov (United States)

    Wang, Yanwei; Tang, Helen; Yu, F. Richard; Huang, Minyi

    2013-05-01

    Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

  16. Efficient data transfer in mobile ad-hoc network using OPSM for disaster response applications

    Directory of Open Access Journals (Sweden)

    V. Bhanumathi

    2015-06-01

    Full Text Available The nodes in mobile ad-hoc network depend on battery for its power. Therefore, effective utilization of energy is necessary for efficient transfer of data between the persons involved in rescue without connection termination in disaster situation. An Optimal Path Selection Model (OPSM is proposed to achieve this. First, routes are identified with the links having high power ratio and link duration. The path selection aims at reducing the number of node failures which in turn obtains energy saving. Then, the source will select a node-disjoint path based on energy and hop for data transfer and store the remaining paths in cache. Priority based path maintenance is also proposed for the selection of routes from cache based on remaining energy if the primary selection fails. Path selection and maintenance extend the network lifetime by reducing the energy usage in transmission. Simulation results revealed that OPSM achieves 64% and 50% reduction in energy consumption compared to Dynamic Source Routing (DSR and Multipath DSR (MDSR. The number of path breakages is also 11 times and 5.5 times lesser than DSR and MDSR. Thus, it can be said that OPSM is a better choice for optimal path selection for performance enhancement by saving energy and improving lifetime.

  17. A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Sahar Adabi

    2008-01-01

    Full Text Available This paper proposed a new Distributed Score Based Clustering Algorithm (DSBCA for Mobile Ad-hoc Networks (MANETs.In MANETs, select suitable nodes in clusters as cluster heads are so important. The proposed Clustering Algorithm considers the Battery Remaining, Number of Neighbors, Number of Members, and Stability in order to calculate the node's score with a linear algorithm. After each node calculates its score independently, the neighbors of the node must be notified about it. Also each node selects one of its neighbors with the highest score to be its cluster head and, therefore the selection of cluster heads is performed in a distributed manner with most recent information about current status of neighbor nodes. The proposed algorithm was compared with Weighted Clustering Algorithm and Distributed Weighted Clustering Algorithm in terms of number of clusters, number of re-affiliations, lifespan of nodes in the system, end-to-end throughput and overhead. The simulation results proved that the proposed algorithm has achieved the goals.

  18. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Reijo M. Savola

    2009-09-01

    Full Text Available We propose an integrated security measurement architecture and framework for a dynamic self-organizing monitoring system based on mobile ad hoc networks (MANETs, structured according to currently known security challenges. The aim is to predict, as well as to monitor, the security performance, concentrating on the principal effects contributing to it. We introduce an on-thefly security level estimation mechanism for MANETs. The mechanism can be used to support node-level, network segment-level and network-level decision making. At the node level, it is possible to constantly estimate the security level when choosing applications and communication mechanisms. At the network level, democratic voting among independent estimates originating from different nodes is used to increase the level of security. Furthermore, we introduce a generic security evaluation framework based on definition and decomposition of security requirements, behaviour modelling, evidence collection, and decision making. The goal of the decision making process is to make an assessment of and form conclusions about the information security level or performance of the system under investigation.

  19. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  20. A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Murugan

    2010-01-01

    Full Text Available Problem statement: In Mobile Ad hoc Network (MANET, both the routing layer and the Medium Access Control (MAC layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for detecting MAC layers attacks, data forwarding behavior based detection technique for detecting packet drops and message authentication code based technique for packet modification. Results: Our combined solution presents a reputation value for detecting the malicious nodes and isolates them from further network participation till its revocation. Our approach periodically checks all nodes, including the isolated nodes, at regular time period λ. A node which recovers from its misbehaving condition is revoked to its normal condition after the time period λ. Conclusion/Recommendations: By simulation results, we show that our combined solution provides more security by increased packet delivery ratio and reduced packet drops. We also shown that our approach has less overhead compared to the existing technique.

  1. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  2. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  3. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    Science.gov (United States)

    Yang, Juan; Yang, Dan; Huang, Bin; Zhang, Xiao-Hong; Luo, Jian-Lu

    2014-07-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm.

  4. A Novel Multiple Access Protocol for Mobile Ad Hoc Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong; ZHOUXiaodong

    2004-01-01

    The approach to employ smart antennas in Mobile ad hoc network (MANET) nodes is presented. An adaptive beamforming-Carrier-Sense multiple access/collison avoidance) (ABF-CSMA/CA) protocol is proposed. In the ABF-CSMA/CA, Request-to-Send/Clear-to-Send (RTS/CTS) dialogue is used to distribute channel reservation information. Training sequences are transmitted just before RTS and CTS packets, so the Temporal reference beamforming (TRB) can be performed by the source node and the destination node.An improved virtual carrier-sense mechanism is also proposed to enhance Collision avoidance (CA) and obtain efficient Space division multiple access (SDMA). In this scheme, every node has two kinds of Network allocation vector (NAV): an oNAV maintains the interval of ongoing transmission of neighbors whose smart antennas operate in omnidirectional mode, and multiple bNAVs maintain those intervals of neighbors whose smart antennas operate in beamforming mode. Theoretical analysis of channel utilization of the proposed protocol is presented. Results show that ABF-CSMA/CA protocol combining with smart antennas can provide higher channel utilization.

  5. A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Adib M. Monzer Habbal

    2013-01-01

    Full Text Available Transmission Control Protocol (TCP is a fundamental protocol in the TCP/IP Protocol Suite.TCP was well designed and optimized to work over wired networks where most packet loss occurs due to network congestion. In theory, TCP should not care whether it is running over wired networks, WLANs, or Mobile Ad hoc Networks (MANETs. In practice, it does matter because most TCP deployments have been carefully designed based on the assumption that congestion is the main factor of network instability. However, MANETs have other dominating factors that cause network instability. Forgetting the impact of these factors violates some design principles of TCP congestion control and open questions for future research to address. This study aims to introduce a model that shows the impact of MANET factors on TCP congestion control. To achieve this aim, Design Research Methodology (DRM proposed by BLESSING was used as a guide to present this model. The proposed model describes the existing situation of TCP congestion control. Furthermore, it points to the factors that are most suitable to be addressed by researchers in order to improve TCP performance. This research proposes a novel model to present the impact of MANET factors on TCP congestion control. The model is expected to serve as a benchmark for any intended improvement and enhancement of TCP congestion control over MANET.

  6. Intelligent Routing Techniques for Mobile Ad hoc Networks using Swarm Intelligence

    Directory of Open Access Journals (Sweden)

    P. Suresh Varma

    2012-12-01

    Full Text Available A Mobile Ad hoc Network (MANET is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other’s transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An emerging area that has recently captured much attention in network routing researches is Swarm Intelligence (SI. Besides conventional approaches, many new researches have proposed the adoption of Swarm Intelligence for MANET routing. Swarm Intelligence (SI refers to complex behaviors that arise from very simple individual behaviors and interactions, which is often observed in nature, especially among social insects such as ants, bees, fishes etc. Although each individual has little intelligence and simply follows basic rules using local information obtained from the environment. Ants routing resembles basic mechanisms from distributed Swarm Intelligence (SI in biological systems and turns out to become an interesting solution where routing is a problem. Ants based routing is gaining more popularity because of its adaptive and dynamic nature. A number of Swarm Intelligence (SI based algorithms were proposed by researchers. In this paper, we study bio-inspired routing protocols for MANETs.

  7. A System of Umpires for Security of Wireless Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ayyaswamy Kathirvel

    2010-06-01

    Full Text Available A mobile ad hoc network (MANET is a self-created self-organized and self-administering set of nodes connectedvia wireless links without the aid of any fixed infrastructure or centralized administrator. Protecting the network layer frommalicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even morechallenging in the case of MANET. In this paper we propose a solution of umpiring system (US that provides security forrouting and data forwarding operations. Umpiring system consist of three models, are single umpiring system (SUS, doubleumpiring system (DUS, and triple umpiring system (TUS. In our system each node in the path from source to destination hasdual roles to perform: packet forwarding and umpiring.US does not apply any cryptographic techniques on the routing andpacket forwarding message. In the umpiring role, each node in the path closely monitors the behavior of its succeeding nodeand if any misbehavior is noticed immediately flags off the guilty node. For demonstration, we have implemented the umpiringsystem by modifying the popular AODV protocol.

  8. Securing Mobile Ad-Hoc Networks Against Jamming Attacks Through Unified Security Mechanism

    Directory of Open Access Journals (Sweden)

    Arif Sari

    2012-06-01

    Full Text Available The varieties of studies in the literature have been addressed by the researchers to solve security dilemmas of Mobile Ad-Hoc Networks (MANET. Due to the wireless nature of the channel and specific characteristics of MANETs, the radio interference attacks cannot be defeated through conventional security mechanisms. An adversary can easily override its medium access control protocol (MAC and continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS frames to the access point node in order to access to shared medium and start data transfer. However, due to jamming attacks on the network, the access point node cannot assign authorization access to shared medium. These attacks cause a significant decrease on overall network throughput, packet transmission rates and delay on the MAC layer since other nodes back-off from the communication. The proposed method applied for preventing and mitigating jamming attacks is implemented at the MAC layer that consist of a combination of different coordination mechanisms. These are a combination of Point Controller Functions (PCF that are used to coordinate entire network activities at the MAC layer and RTS/CTS (Clear-To-Send mechanisms which is a handshaking process that minimizes the occurrence of collisions on the wireless network. The entire network performance and mechanism is simulated through OPNET simulation application.

  9. A Policy Based Scheme for Combined Data Security in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2012-01-01

    Full Text Available Problem statement: In Mobile Ad hoc Networks (MANET routing protocols, we require a network-level or link layer security. Since without appropriate security provisions, the MANETs is subjected to attacks like network traffic, replay transmissions, manipulate packet headers and redirect routing messages. In order to address these needs, a policy based network management system that provides the capability to express network requirements is required. Approach: In this study, we propose a policy based scheme for combined data security which focuses mainly on three policies: Integrity, authentication and Confidentiality. For providing security not only to data, but also for routing information, we calculate the trust indexes of the nodes and the route is selected according to the trust value which improves integrity. Then in order to provide authentication, we propose a Distributed Certificate Authority (DCA technique in which multiple DCA is required to construct a certificate. Next we propose an RSA based novel encryption mechanism in order to provide Confidentiality among the nodes. Thus, the desired level of security is provided by the system based on the policy of the user by executing the corresponding security modules. Results: By simulation results, we show that this scheme provides a combined data security in MANETs and can be used efficiently. Conclusion: Our proposed combined data security policy provides complete protection for the data in MANET communications.

  10. A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    CH. V. Raghavendran

    2013-04-01

    Full Text Available Wireless networks, in particular Mobile Ad hoc Networks (MANETs have revolutionized the field of networking with increasing number of their commercial and military applications. Security on the other hand, is now an essential requirement for these applications. However, the limitations of the dynamic, infrastructure-less nature of MANETs impose major difficulties in establishing a secure framework suitable for such services. Security for MANETs is a dynamic area of research. Most of the traditional routing protocols proposed for MANETs are focused on routing only not on the security aspects. As in traditional wired networks, wireless networks also require security. Unlike the wired networks, where dedicated routers, servers control the network, in MANETs nodes act both as terminals and also as routers for other nodes. A popular mechanism to satisfy the security requirements is the Group Key Management in which the group key is to be shared by each group communication participant. But to establish and manage the group key efficiently imposes new challenges – especially in infrastructure less MANETs. The basic needs of such networks require that the group key schemes must demonstrate not only high performance but also fault-tolerance.

  11. A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-10-01

    Full Text Available Contemporary personal computing devices are increasingly required to be portable and mobileenabling user’s wireless access, to wired network infrastructures and services. This approach tomobile computing and communication is only appropriate in situations where a coherentinfrastructure is available. There are many situations where these requirements are not fulfilledsuch as; developing nations, rural areas, natural disasters, and military conflicts to name but a few.A practical solution is to use mobile devices interconnected via a wireless medium to form anetwork, known as a Mobile Ad-hoc Network (MANET, and provide the services normally found inwired networks. Security in MANETs is an issue of paramount importance due to the wireless natureof the communication links. Additionally due to the lack of central administration security issues aredifferent from conventional networks. For the purposes of this article we have used the “WMN testbed”to enable secure routing in MANETs. The use of cryptography is an efficient proven way ofsecuring data in communications, but some cryptographic algorithms are not as efficient as othersand require more processing power, which is detrimental to MANETs. In this article we haveassessed different cryptographic approaches to securing the OLSR (Optimised Link State Routingprotocol to provide a basis for research. We conclude the paper with a series of performanceevaluation results regarding different cryptographic and hashing schemes. Our findings clearlyshow that the most efficient combination of algorithms used for authentication and encryption areSHA-1 (Secure Hash Algorithm-1 and AES (Advanced Encryption Standard respectively. Usingthis combination over their counterparts will lead to a considerable reduction in processing timeand delay on the network, creating an efficient transaction moving towards satisfying resourceconstraints and security requirements.

  12. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Ramratan Ahirwal

    2012-06-01

    Full Text Available In Wireless mobile Ad Hoc Networks (MANET every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the Intrusion Detection System (IDS can collect and analyse audit data for the entire network. A number ofneighbour-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad-hoc networks. The resourcesconsumed by ad-hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. In this paperwe are trying to protect our network from distributed denial of service attack (DDOS, In this paper we present method for determining intrusion or misbehave in MANET using intrusion detection system and protect the network from distributed denial of service (DDOS and analysis the result on the bases of actual TCP flow monitoring, routing load ,packet delivery ratio and average end-to-end delay in normal , DDOS attack and IDS time .

  13. The Design and Implementation of a Novel Skew Scenario Model in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    N. Vetrivelan

    2010-01-01

    Full Text Available Problem statement: In this research, it had been presented a novel Skew Scenario Model that has been developed and implemented for mobile ad hoc networks. There exist several mobility patterns that try to capture the behavior of the mobile devices under different circumstances, whereas in our work, the direction movement of the nodes is significantly specified horizontally, vertically and diagonally in the simulation area. Approach: Our novel Skew Scenario Model and the impact of mobility on MANET protocols had been compared and analyzed. The performance of DSDV and DSR under SSM in terms of packet delivery fraction, routing load and latency for varying source and destination traffic from 10, 20, 30, 40 and 50 under 100 nodes environment had been analyzed. Apart from this, our SSM with the existing waypoint model in 100 nodes environment had been compared. A suitable algorithm for SSM has also been developed. Results: Our simulation result showed that the functioning of our SSM had greatly influenced the performance of routing protocols in MANET environment. Simulation experiments confirm that for DSR under SSM, the PDF is highest between 93.56-99.43%, routing load is lowest between 1.005-1.068 and Latency is very less between 0.0163-0.049 sec, in the case of DSDV under SSM, the PDF is 63.22-79.104%, routing load is 1.20-1.58 and latency is 0.018-0.050 sec. The result revealed the fact that the reactive routing protocol DSR outperforms much more than the Proactive routing protocol DSDV. Our Novel Model has performed well when we compared it with existing waypoint mobility model while setting many source-destination connections. In DSR under SSM and waypoint model, PDF is between 93.56-99.43% in SSM and in waypoint 94.20-98.88%. Routing load in SSM is 1.0056-1.068, waypoint 1.01-1.06 seconds. Latency is between 0.026-0.063 in SSM and in waypoint 0.026-0.1235 sec. Conclusion: This study revealed the fact that the DSR discovers new routes faster

  14. A Reliability-based Framework for Multi-path Routing Analysis in Mobile Ad-Hoc Networks

    CERN Document Server

    Caleffi, Marcello; Paura, Luigi

    2008-01-01

    Unlike traditional routing procedures that, at the best, single out a unique route, multi-path routing protocols discover proactively several alternative routes. It has been recognized that multi-path routing can be more efficient than traditional one mainly for mobile ad hoc networks, where route failure events are frequent. Most studies in the area of multi-path routing focus on heuristic methods, and the performances of these strategies are commonly evaluated by numerical simulations. The need of a theoretical analysis motivates such a paper, which proposes to resort to the terminal-pair routing reliability as performance metric. This metric allows one to assess the performance gain due to the availability of route diversity. By resorting to graph theory, we propose an analytical framework to evaluate the tolerance of multi-path route discovery processes against route failures for mobile ad hoc networks. Moreover, we derive a useful bound to easily estimate the performance improvements achieved by multi-pa...

  15. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks

    Science.gov (United States)

    Wang, Yi; Dong, Liang; Liang, Taotao; Yang, Xinyu; Zhang, Deyun

    Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet

  16. Autonomous Gossiping: A self-organizing epidemic algorithm for selective information dissemination in mobile ad-hoc networks

    OpenAIRE

    Datta, Anwitaman; Quarteroni, Silvia; Aberer, Karl

    2004-01-01

    We introduce autonomous gossiping (A/G), a new genre epidemic algorithm for selective dissemination of information in contrast to previous usage of epidemic algorithms which flood the whole network. A/G is a paradigm which suits well in a mobile ad-hoc networking (MANET) environment because it does not require any infrastructure or middleware like multicast tree and (un)subscription maintenance for publish/subscribe, but uses ecological and economic principles in a self-organizing manner in o...

  17. Mobile cluster rekeying in tracking sensor network

    Institute of Scientific and Technical Information of China (English)

    WANG Jia-hao; QING Zhi-guang; GENG Ji; LI Zhi-jun

    2006-01-01

    The wireless sensor network has a broad application in target tracking and locating, and is especially fit for military detection or guard. By arranging the sensor nodes around the target, this article establishes a tracking cluster which can follow the target logically, process data on the target and report to the sink node,thus achieving the tracking function. To improve the security, this article proposes a mobile cluster rekeying protocol (MCRP) to manage the tracking cluster's season key. It is based on a random key predistribution algorithm (RKP), which is composed of a multi-path reinforcement scheme, a q-composition scheme and a oneway cryptographic hash function.

  18. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  19. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    Science.gov (United States)

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  20. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    Directory of Open Access Journals (Sweden)

    Angelica Reyes-Muñoz

    2016-01-01

    Full Text Available The emergence of Body Sensor Networks (BSNs constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1 an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving that may cause traffic accidents is presented; (2 A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3 as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  1. 移动Ad Hoc网络技术的分析%Analysis of mobile Ad Hoc Networks technology

    Institute of Scientific and Technical Information of China (English)

    刘巧平; 王建望

    2014-01-01

    移动Ad Hoc网络,它是Mobile Ad Hoc Networks的简称,它不会受到空间与时间的制约,更加快捷和方便,不但能够在危险环境、远距离、战场、会议和救援等环境当中应用,而且还能够扩展末端网络,它的应用具有普遍性。为此,本文论述了移动Ad Hoc网络的基本概念和特点,接着分析了移动Ad Hoc网络设计面临的挑战,最后讨论了它的应用。%It would not be space and time constraints,more efficient and convenient,not only in hazardous environments,remote battlefield,conferences and rescue environment in which applications,but also to extend the end of the network,its application is universal.Therefore,this article discusses the basic concepts and features of Mobile Ad Hoc Networks,and then analyzes the challenges faced by mobile Ad Hoc network design, it is best to discuss its applications.

  2. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  3. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  4. Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sridhar Subramanian

    2012-02-01

    Full Text Available A mobile ad-hoc network (MANET is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust valuenodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET.

  5. SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    SHEENU SHARMA

    2009-06-01

    Full Text Available A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Blackhole attacks on the network performance. We simulated Blackhole attacks in Qualnet Simulator and measured the packet loss in the network with and without a blackhole. The simulation is done on AODV (Ad hoc On Demand Distance Vector Routing Protocol. The network performance in the presence of a blackhole is reduced up to 26%.

  6. Routing Protocols to Minimize the Number of Route Disconnections for Communication in Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-09-01

    Routing Protocol MAODV [5] is the multicast extension of the well-known Ad hoc On-demand Distance Vector ( AODV ...extensions of the Dynamic Source Routing (DSR) protocol [4] or the Ad hoc On-demand Distance Vector ( AODV ) routing protocol [5]. The multi-path routing ...Multi-path Distance Vector (AOMDV) routing protocol [7], an extension of AODV to compute multiple loop-free link- disjoint routes ; (iii) AODV

  7. Sensor Fusion Based Model for Collision Free Mobile Robot Navigation

    OpenAIRE

    Marwah Almasri; Khaled Elleithy; Abrar Alajlan

    2015-01-01

    Autonomous mobile robots have become a very popular and interesting topic in the last decade. Each of them are equipped with various types of sensors such as GPS, camera, infrared and ultrasonic sensors. These sensors are used to observe the surrounding environment. However, these sensors sometimes fail and have inaccurate readings. Therefore, the integration of sensor fusion will help to solve this dilemma and enhance the overall performance. This paper presents a collision free mobile robot...

  8. Performance analysis of a self-locating mobile sensor

    DEFF Research Database (Denmark)

    Bøgsted, Martin; Rasmussen, Jakob Gulddahl; Lundbye-Christensen, Søren

    radio propagation characteristics for received signals from sensors in the proximity of the mobile sensor. It is of fundamental importance that such systems also works in critical situations such as loss of observability or the presence of multipath. The present paper suggest a framework to assess...... the performance of localization algorithms in mobile and critical situations. This is done by exploring the performance of various filtering techniques for self-localization of a mobile sensor in a field of sensors. More specifically, we model the mobility of the sensor such that the velocity varies according...

  9. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...represents that important data are compromised. The second condition represents that the mobile group is unable to function correctly and is compromised as a...include mobile computing, wireless systems, dependable and secure computing, multimedia, sensor networks, data and service management, trust management

  10. Transmission of Successful Route Error Message(RERR) in Routing Aware Multiple Description Video Coding over Mobile Ad-Hoc Network

    CERN Document Server

    Shah, Kinjal; Sharma, Dharmendar; Mishra, Priyanka; Rakesh, Nitin

    2011-01-01

    Video transmission over mobile ad-hoc networks is becoming important as these networks become more widely used in the wireless networks. We propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with single and multiple path transport. We build a model to estimate the packet loss probability of each packet transmitted over the network based on the standard ad-hoc routing messages and network parameters without losing the RERR message. We then calculate the frame loss probability in order to eliminate error without any loss of data.

  11. Impact Of Mobility and Transmission Range On The Performance of Backoff Algorithms For IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks

    CERN Document Server

    Saini, Pooja

    2010-01-01

    In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the existing backoff algorithms in multi-hop ad hoc networks. Thus, in this paper, we considered two important multi-hop adhoc network scenarios: (a) Node Mobility Scenario and (b) Transmission Range Scenario and analyze and evaluate both the impact of mobility (i.e. node speed) and the impact of transmission range of nodes on the performance of various backoff algorithms

  12. GLOBAL APPROACH OF CHANNEL MODELING IN MOBILE AD HOC NETWORKS INCLUDING SECOND ORDER STATISTICS AND SYSTEM PERFORMANCES ANALYSIS

    Directory of Open Access Journals (Sweden)

    Basile L. AGBA

    2008-06-01

    Full Text Available Mobile ad hoc networks (MANET are very difficult to design in terms of scenarios specification and propagation modeling. All these aspects must be taken into account when designing MANET. For cost-effective designing, powerful and accurate simulation tools are needed. Our first contribution in this paper is to provide a global approach process (GAP in channel modeling combining scenarios and propagation in order to have a better analysis of the physical layer, and finally to improve performances of the whole network. The GAP is implemented in an integrated simulation tool, Ad-SMPro. Moreover, channel statistics, throughput and delay are some key points to be considered when studying a mobile wireless networks. A carefully analysis of mobility effects over second order channel statistics and system performances is made based on our optimized simulation tool, Ad-SMProl. The channel is modeled by large scale fading and small scale fading including Doppler spectrum due to the double mobility of the nodes. Level Cross Rate and Average Duration of Fade are simulated as function of double mobility degree, a defined to be the ratio of the nodes' speeds. These results are compared to the theoretical predictions. We demonstrate that, in mobile ad hoc networks, flat fading channels and frequency-selective fading channels are differently affected. In addition, Bit Error rate is analysed as function of the ratio of the average bit energy to thermal noise density. Other performances (such as throughput, delay and routing traffic are analysed and conclusions related to the proposed simulation model and the mobility effects are drawn.

  13. Context sensitive trust based geographic opportunistic routing in mobile ad hoc networks

    Indian Academy of Sciences (India)

    A RAJESH; N MOHAN KUMAR

    2016-11-01

    Position based opportunistic routing (POR) is a stateless, robust, and reliable geographic routing protocol in Mobile AdHoc NETwork (MANET). The opportunistic routing embraces broadcast property of wireless channels and utilizes it for opportunistic forwarding. Both the malicious node behavior and the backupnodes’ behavior are equally treated as malicious in the existing misbehavior detection mechanisms. Hence, incorporating a general trust model in POR is not combative with routing attacks. It is necessary to determine whether the misbehavior is likely a result of malicious activity or due to the backup scenario of opportunistic forwarding. On the other hand, if context-sensitive trust information is available on every node, it ensures a fair decision making and also supports secured routing in an opportunistic approach. This work investigates the utilization of context attributes along with generic trust model to allow POR for secure and reliable data forwarding. This paper introduces context-sensitive trust for choosing the data forwarding node in POR (CPOR) to assist opportunistic routing in selecting the trusted optimal data forwarding node and to cope with both security and reliability of communications. The proposed work exercises both coarse- and fine-grained trust evaluation to strengthen the trustworthiness. The coarse-grained trust measure includes positive progress per hop and behavioral attribute of the nodes in terms of routing service. The fine-grained trust evaluation differs the opportunistic routing environment from the adverse scenarios and aids the source node such that it builds a highly trusted positive progress set using contextual attributes. The fine-grained trust evaluation deduces the ideal contextual information such as the link quality, battery energy, and the backup service to determine the accurate trust value of nodes. As a result, it involves optimal routes and enables CPOR to maintain the routingperformance equal to the POR even

  14. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance......This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  15. Cooperative distributed target tracking algorithm in mobile wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The paper proposes a cooperative distributed target tracking algorithm in mobile wireless sensor networks.There are two main components in the algorithm:distributed sensor-target assignment and sensor motion control.In the key idea of the sensor-target assignment,sensors are considered as autonomous agents and the defined objective function of each sensor concentrates on two fundamental factors:the tracking accuracy and the tracking cost.Compared with the centralized algorithm and the noncooperative distrib...

  16. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  17. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Science.gov (United States)

    Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit

    2008-12-01

    Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.

  18. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  19. Design and Implementation of Key Techniques for Mobile Ad hoc Network Adaptive QoS Provisioning Framework

    Institute of Scientific and Technical Information of China (English)

    YAOYinxiong; LIUJianxun; TANGXinhuai

    2004-01-01

    MAQF is a newly proposed adaptive QoS provisioning framework for Mobile Ad hoc network (MANET) by the authors. Through modifying the architecture of INSIGNIA and adding some components, MAQF overcomes many disadvantages appearing in related works and supports QoS guarantees for MANET. This paper focuses on the design and implementation of some key techniques in MAQF, including QoS routing, signaling in band, adaptive control mechanism, dynamic resource adaptation algorithm and, etc. Simulation results are presented and have verified the validity of MAQF.

  20. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...

  1. A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

    Directory of Open Access Journals (Sweden)

    Edna E. Nallathambi

    2011-01-01

    Full Text Available Problem statement: Network security in Mobile Ad hoc Network (MANET is a major issue. Some of the attacks such as modification, impersonation, Time To Live (TTL and sleep deprivation are due to misbehaviour of malicious nodes, which disrupts the transmission. Some of the existing security protocols such as ARAN, SAODV and SEAD are basically used to detect and eliminate one or two types of attacks. The major requirement of a secure protocol is to prevent and eliminate many attacks simultaneously which will make the MANETs more secured. Approach: We propose the algorithm that can prevent and also eliminate multiple attacks simultaneously, called MIST algorithm (Modification, Impersonation, Sleep deprivation and TTL attacks. This algorithm is written on Node Transition Probability (NTP based protocol which provides maximum utilization of bandwidth during heavy traffic with less overhead. Thus this has been named MIST NTP. Results: The proposed MIST NTP has been compared with NTP without the MIST algorithm, Authenticated Routing for Ad hoc Networks (ARAN and Ad hoc on Demand Distance Vector (AODV. Extensive packet level simulations show that MIST NTP produces around 10% less end to end delay than ARAN, it even drops 30% fewer packets compared to malicious NTP on an average and around 50-60% fewer packets compared to AODV during multiple attacks. Conclusion: The results ensure that MIST NTP can break the greatest security challenge prevailing in MANETs by securing the MANET against several attacks at once.

  2. Leader Election Protocol for Fenergy Efficient Mobile Sensor Networks (EYES)

    NARCIS (Netherlands)

    Dulman, Stefan; Havinga, Paul; Hurink, Johann

    2002-01-01

    In this paper we develop and analyze a wireless wave leader election protocol (WWLE) for wireless mobile ad hoc networks, with emphasis on the resulting energy consumption. Within the operating system of the EYES architecture we apply a power model to schedule tasks in order to minimize energy consu

  3. A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks

    CERN Document Server

    Narasimhan, B

    2009-01-01

    In Heterogeneous mobile ad hoc networks (MANETs) congestion occurs with limited resources. Due to the shared wireless channel and dynamic topology, packet transmissions suffer from interference and fading. In heterogeneous ad hoc networks, throughput via a given route is depending on the minimum data rate of all its links. In a route of links with various data rates, if a high data rate node forwards more traffic to a low data rate node, there is a chance of congestion, which leads to long queuing delays in such routes. Since hop count is used as a routing metric in traditional routing, it do not adapt well to mobile nodes. A congestion-aware routing metric for MANETs should incorporate transmission capability, reliability, and congestion around a link. In this paper, we propose to develop a hop-by-hop congestion aware routing protocol which employs a combined weight value as a routing metric, based on the data rate, queuing delay, link quality and MAC overhead. Among the discovered routes, the route with min...

  4. Enhanced Route Re-Construction Method for Associativity Based Routing Protocol for Mobile Ad hoc NETworks (MANET

    Directory of Open Access Journals (Sweden)

    Fawaz A.M. Masoud

    2006-01-01

    Full Text Available A mobile Ad-hoc NETwork (MANET is wireless network composed of mobile nodes that are dynamically and randomly located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction and maintenance should be done with a minimum of overhead and bandwidth consumption. The ABR is a source-initiated protocol and is working on the assumption of stable route from the source to the destination node. Maintenance for the route when the destination node moves will be performed in backtracking scheme starting from the immediate upstream node from the destination. If this process results in backtracking more than halfway to the source, it will discontinue and a new route request will be initiated from the source. In the case if the Source Node moves, then the Source Node will invoke a route reconstruction because the ABR is source-initiated protocol. This study presents an enhanced method for the route re-construction in case the source, the intermediate, or the destination node changes its location by giving more active role to the moving node in maintaining the established route.

  5. Multi-Hop Bandwidth Management Protocol for Mobile Ad Hoc Networks

    CERN Document Server

    Pattanayak, Binod Kumar; Jagadev, Alok Kumar; Nayak, Manojranjan

    2010-01-01

    An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations. KEYWORDS

  6. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    Coast, Australia, 21-26 May 2006. [4] P. Albers , O. Camp, J.-M. Percher, B. Jouga, L. Mé, and R. Puttini, “Security in Ad Hoc Networks: a General...10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing, Canary Islands, Spain, Jan . 2002, pp. 403-410. [7] S. Buchegger and...DETECTION Albers et al.(2002) [4] -Direct observation for anomaly detection or misuse detection -General misbehaving nodes No experimental results

  7. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    reverse path formation in AODV . . . . . . . . . . . . . . . . . . . . . . 15 4 Channel selection in CA-AODV...Routing Algorithm ACO Ant Colony Optimization AODV Ad hoc On-demand Distance Vector CA-AODV Channel Assignment AODV CAN Content Addressable Network CDS...of MANETs. Most prominently has been the standard IEEE 802.11 protocols ( Wifi ), specifically the a, b, g, and n variations. The 802.11 specification

  8. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  9. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  10. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One...

  11. uRbAn: A Multipath Routing based Architecture with Energy and Mobility Management for Quality of Service Support in Mobile Ad hoc Networks

    CERN Document Server

    Abbas, Ash Mohammad

    2011-01-01

    Designing a wireless node that supports quality of service (QoS) in a mobile ad hoc network is a challenging task. In this paper, we propose an architecture of a wireless node that may be used to form a mobile ad hoc network that supports QoS. We discuss the core functionalities required for such a node and how those functionalities can be incorporated. A feature of our architecture is that the node has the ability to utilize multiple paths, if available, for the provision of QoS. However, in the absence of multiple paths it can utilize the resources provided by a single path between the source and the destination. We follow a modular approach where each module is expanded iteratively. We compare the features of our architecture with the existing architectures proposed in the literature. Our architecture has provisions of energy and mobility management and it can be customized to design a system-on-chip (SoC).

  12. Video Guidance Sensor for Surface Mobility Operations

    Science.gov (United States)

    Fernandez, Kenneth R.; Fischer, Richard; Bryan, Thomas; Howell, Joe; Howard, Ricky; Peters, Bruce

    2008-01-01

    Robotic systems and surface mobility will play an increased role in future exploration missions. Unlike the LRV during Apollo era which was an astronaut piloted vehicle future systems will include teleoperated and semi-autonomous operations. The tasks given to these vehicles will run the range from infrastructure maintenance, ISRU, and construction to name a few. A common task that may be performed would be the retrieval and deployment of trailer mounted equipment. Operational scenarios may require these operations to be performed remotely via a teleoperated mode,or semi-autonomously. This presentation describes the on-going project to adapt the Automated Rendezvous and Capture (AR&C) sensor developed at the Marshall Space Flight Center for use in an automated trailer pick-up and deployment operation. The sensor which has been successfully demonstrated on-orbit has been mounted on an iRobot/John Deere RGATOR autonomous vehicle for this demonstration which will be completed in the March 2008 time-frame.

  13. Mobile quantum gravity sensor with unprecedented stability

    CERN Document Server

    Freier, Christian; Schkolnik, Vladimir; Leykauf, Bastian; Schilling, Manuel; Wziontek, Hartmut; Scherneck, Hans-Georg; Müller, Jürgen; Peters, Achim

    2015-01-01

    Changes of surface gravity on Earth are of great interest in geodesy, earth sciences and natural resource exploration. They are indicative of Earth system's mass redistributions and vertical surface motion, and are usually measured with falling corner-cube- and superconducting gravimeters (FCCG and SCG). Here we report on absolute gravity measurements with a mobile quantum gravimeter based on atom interferometry. The measurements were conducted in Germany and Sweden over periods of several days with simultaneous SCG and FCCG comparisons. They show the best-reported performance of mobile atomic gravimeters to date with an accuracy of $\\mathrm{39\\,nm/s^2}$ and long-term stability of $\\mathrm{0.5\\,nm/s^2}$ short-term noise of $96\\,\\mathrm{nm/s^2/\\sqrt{Hz}}$. These measurements highlight the unique properties of atomic sensors. The achieved level of performance in a transportable instrument enables new applications in geodesy and related fields, such as continuous absolute gravity monitoring with a single instrum...

  14. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  15. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    Science.gov (United States)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  16. Mobile Wireless Sensor Networks for Advanced Soil Sensing and Ecosystem Monitoring

    Science.gov (United States)

    Mollenhauer, Hannes; Schima, Robert; Remmler, Paul; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    For an adequate characterization of ecosystems it is necessary to detect individual processes with suitable monitoring strategies and methods. Due to the natural complexity of all environmental compartments, single point or temporally and spatially fixed measurements are mostly insufficient for an adequate representation. The application of mobile wireless sensor networks for soil and atmosphere sensing offers significant benefits, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate (e.g. by using optimization approaches or event triggering modes) to the local test conditions. This can be essential for the monitoring of heterogeneous and dynamic environmental systems and processes. One significant advantage in the application of mobile ad-hoc wireless sensor networks is their self-organizing behavior. Thus, the network autonomously initializes and optimizes itself. Due to the localization via satellite a major reduction in installation and operation costs and time is generated. In addition, single point measurements with a sensor are significantly improved by measuring at several optimized points continuously. Since performing analog and digital signal processing and computation in the sensor nodes close to the sensors a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of nodes. Furthermore, the miniaturization of the nodes and energy harvesting are current topics under investigation. First results of field measurements are given to present the potentials and limitations of this application in environmental science. In particular, collected in-situ data with numerous specific soil and atmosphere parameters per sensor node (more than 25) recorded over several days illustrates the high performance of this system for advanced soil sensing and soil-atmosphere interaction monitoring. Moreover, investigations of biotic and abiotic process interactions and optimization

  17. Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In traditional networks ,the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short,the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust requirement of hosts better.

  18. BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

    Directory of Open Access Journals (Sweden)

    S.Sivagurunathan

    2016-02-01

    Full Text Available Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In order to share information within the network, a proper routing protocol is required to establish routes between nodes. This article discusses which of the routing protocols such as reactive or proactive has better performance in such scenario. In order to implement the test bed, we choose a real area in Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol that is correct and used for efficient route establishment between nodes so that message could be delivered on time without loss and it will be implemented and used in future based on the model that we propose.

  19. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Raja Gunasekaran; Vaidheyanathan Rhymend Uthariaraj; Uamapathy Yamini; Rajagopalan Sudharsan; Selvaraj Sujitha Priyadarshini

    2009-01-01

    Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium.. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.

  20. Security in Mobile Ad Hoc Networks%移动Ad Hoc网络中的安全问题

    Institute of Scientific and Technical Information of China (English)

    朱晓妍

    2004-01-01

    移动自组网(Mobile Ad HoC Network)是一种无基础设施的无线网络由于它具有开放的媒质、分布式的合作、动态的拓扑结构和受限的网络能力等特点,所以特别容易受到攻击.为此文章结合移动Ad Hoc网络的特点分析了移动Ad Hoc网络面临的安全威胁,并对移动Ad Hoc网络的安全路由和安全报文传送问题进行了详细讨论.