The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of its characteristics like open medium, dynamic topology, being infrastructure less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and...
Wireless links in a Mobile Ad Hoc Network (MANET) is unreliable. So the links in between the nodes in a MANET breaks frequently. Mobility of nodes in a MANET increases the level of unreliability of the link between the nodes. Failure of a link also leads to complete route failure and affect the performance of MANET. So, there is a need to study the effect of mobility of nodes that causes a link break...
In the MANET with high mobility, many routing responses of the contiguous nodes in the DSR routing protocol can not arrive to the resource nodes. So the routing requests which broadcast to these nodes produce much unnecessary use. We can acquire relatively steady routing responses if we chose the contiguous nodes to start the routing require which with less mobility compare with resource nodes. This...
The MAODV (Multicast Ad hoc On-demand Vector routing protocol)shows a smooth performance in light load ad hoc networks. However, packets transmission ratio will decrease continuously with the increasingly scale of multicast group. In this paper we discussed the impact of attacks on MAODV protocol. Based on these analyses, we proposed a routing protocol DMAODV (Distensible Multicast Ad Hoc On Demand)...
Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology, lack of...
For the realization of the safe driving support system in the Intelligent Transport System (ITS), many studies are conducted to apply the wireless ad hoc network to the inter-vehicle communication. In the wireless ad hoc network protocol used for the inter-vehicle communication, it is necessary to consider the stability of route because network topology changes dynamically according to movement of...
In this paper, a dynamic shortest path weighted routing mechanism applying to mobile ad hoc networks is proposed based on the complex network theory. This weight routing mechanism uses node energy and link distance which are the two most important factors affecting the performance of mobile ad hoc networks to structure the weights of edges. The routing process presented by this paper uses a mixed...
Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. These routing protocols are designed taking for granted that all nodes are cooperative and willing to forward control and data packets from and to other nodes. However, when selfish nodes exist in the network, the network performance may degrade significantly. In previous research, selfish nodes...
Networking community is largely depending on simulation to evaluate the behavior and performance of protocols for networks. A network simulator is program models the behavior of a network, without an actual network being present. During the past years, varieties of network simulation tools have been developed in the field of communication. In this article, present a case study of implementation and...
Networking community is largely depending on simulation to evaluate the performance and behavior of protocols for networks. A network simulator is a program which models the behavior of a network without an actual network being present. Different network simulation tools have been developed during the past years in the field of communication. In this article, present a comparison and simulation study...
MANETs are temporary networks, that spend less time to be deployed and less resources to keep up and running. MANETs can be implemented in disaster recovery sites, university campuses, military campaigns and so on. MANET nodes cooperate in an autonomous way by forwarding packets to each-other. Considering mobility of the terminals, the routes change dynamically so routing algorithms are very important...
The high mobility and variability of road traffic has hampered the design of efficient communication protocols and the deployment of new services in vehicular networks. Nevertheless, the newly-introduced notion of virtual mobile nodes (VMNs) has the potential to turn wireless ad hoc networks into more predictable environments, facing the significant challenges raised by the mobility of the (real)...
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with serious security concerns, in particular from a wireless transmission medium perspective where such networks may be subject to data tampering and dropping attacks. This paper enhances a recently...
Simulation of Vehicular Ad hoc Networks(VANETs) is an important aspect of the analysis and design of intelligent routing and broadcasting protocols. In VANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. The communication between vehicles is used for safety, comfort and for entertainment as well. The performance...
The availability of accurate location information (for airborne purposes) in unmanned aeronautical ad-hoc networks (UAANETs) makes it possible to deploy geographic routing mechanisms as the main communication protocol in such networks. However, the performance of geographic routing is not obvious, especially for sparse networks (i.e., networks with low connectivity levels). In this paper, the main...
We study the load balancing aspect of routing algorithms in wireless ad hoc networks. We define a statistical measure called local coefficient of variance (lcv) to study the smoothness of the load distribution in the network. The importance of keeping lcv as low as possible in designing load balanced routing algorithms is demonstrated. We analyze how number of nodes, transmission range, network area...
A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile devices connected by a wireless link. In MANETs, the data packet may fail to be delivered for various reasons including nodes movement, packet collision and bad channel condition. Because re-route recovery of traditional on-demand routing protocols has high latency, several ideas have been proposed to solve this problems. AODV-BR...
This paper considers the impact of unidirectional link on Ad-hoc on-demand distance vector routing protocol from a mobility perspective. Most routing protocols assume that all wireless connectivity is symmetrical and bidirectional. Such assumptions are not generally true. Wireless nodes exhibit non-uniform transmission power, non-uniform reception quality and signal to noise ratio which may result...
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.