1,481 research outputs found
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Modeling Probability of Path Loss for DSDV, OLSR and DYMO above 802.11 and 802.11p
This paper presents path loss model along with framework for probability
distribution function for VANETs. Furthermore, we simulate three routing
protocols Destination Sequenced Distance Vector (DSDV), Optimized Link State
Routing (OLSR) and Dynamic MANET On-demand (DYMO) in NS-2 to evaluate and
compare their performance using two Mac-layer Protocols 802.11 and 802.11p. A
novel approach of this work is modifications in existing parameters to achieve
high efficiency. After extensive simulations, we observe that DSDV out performs
with 802.11p while DYMO gives best performance with 802.11.Comment: IEEE 8th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
Recommended from our members
Optimizing the beacon exchange rate for proactive autonomic configuration in ubiquitous MANETs
Proactive self-configuration is indispensable for MANETs like ubiquitous sensor networks (USNs), as component devices of the network are usually exposed to natural or man-made disasters due to the hostile deployment and ad hoc nature of the USNs. Network state beacons (NSBs) are exchanged among the key nodes of the network for crucial and effective monitoring of the network for steady state operation. The rate of beacon exchange (F/sub E/) and its contents, define the time and nature of the proactive action. Therefore it is very important to optimize these parameters to tune the functional response of the USN. This paper presents a comprehensive model for monitoring and proactively reconfiguring the network by optimizing the F/sub E/. The results confirm the improved throughput while maintaining QoS over longer periods of network operation
The impact of mobility models on the performance of mobile Ad Hoc network routing protocol
A mobility model represents nodes distribution and movement over the network. Several research works have shown that a selection of mobility model can affect the outcome of routing performance simulation in Mobile Ad Hoc Networks. Thus, a routing protocol may only be effective in a particular mobility model or scenario but performs inferiorly in another. As a result, analyses of routing protocol performance are often based on inadequate information leading to inaccurate argument and conclusion. In this paper, three different mobility models have been selected, where each of them is highly distinctive in terms of nodes movement behavior. In addition, a new measurement technique called probability of route connectivity is introduced. The technique is used to quantify the success rate of route established by a routing protocol. Extensive simulation runs are done and results are compared between each mobility model
- …