15,588 research outputs found

    QoS-Based Web Service Discovery in Mobile Ad Hoc Networks Using Swarm Strategies

    Get PDF
    Mobile ad hoc networks are noncentralised, multihop, wireless networks that lack a common infrastructure and hence require self-organisation. Their infrastructureless and dynamic nature entails the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing, IP address autoconfiguration and Web service discovery are among the most challenging tasks in the ad hoc network domain. Swarm intelligence is a relatively new approach to problem solving that takes inspiration from the social behaviours of insects, such as ants and bees. Self-organization, decentralization, adaptivity, robustness, and scalability make swarm intelligence a successful design paradigm for the above-mentioned problems. In this paper we proposeBeeAdHocServiceDiscovery, a new service discovery algorithm based on the bee metaphor, which also takes into account quality metrics estimates. The protocol has been specifically designed to work in mobile ad hoc network scenarios operating withBeeadhoc, a well-known routing algorithm inspired by nature. We present both the protocol strategy and the formal evaluation of the discovery overhead and route optimality metrics showing thatBeeAdHocServiceDiscoveryguarantees valuable performances even in large scale ad hoc wireless networks. Eventually, future research suggestions are sketched

    Many-to-Many Invocation: A New Framework for Building Collaborative Applications in Ad Hoc Networks

    Get PDF
    Many-to-Many Invocation (M2MI) is a new paradigm for building collaborative systems that run in wireless proximal ad hoc networks of fixed and mobile computing devices. M2MI is useful for building a broad range of systems, including service discovery frameworks; groupware for mobile ad hoc collaboration; systems involving networked devices (printers, cameras, sensors); and collaborative middleware systems. M2MI provides an object oriented method call abstraction based on broadcasting. An M2MI invocation means ``Every object out there that implements this interface, call this method.\u27\u27. M2MI is layered on top of a new messaging protocol, the Many-to-Many Protocol (M2MP), which broadcasts messages to all nearby devices using the wireless network\u27s inherent broadcast nature instead of routing messages from device to device. In an M2MI-based system, central servers are not required; network administration is not required; complicated, resource-consuming ad hoc routing protocols are not required; and system development and deployment are simplified

    Cross-Layer Routing Based on Semantic Web Services Discovery with Energy Evaluation and Optimization in MANET

    Get PDF
    The web services discovery process in mobile adhoc networks is considered as a very difficult challenge due to the continuous change in the topology of the network and also the lack of a fixed central directory for publishing web services. Several approaches have been proposed which are based on either keywords or identifiers representing the service to be searched or by using a specific scenario of discovery. All of those proposed solutions try to respect the constraints of ad hoc networks such as energy, bandwidth, throughput ... etc. In this paper we present our new proposed model for measuring the cost of the overall energy consumption in ad hoc networks depending on the web services discovery protocols. We also present a new optimized web services discovery protocol in MANET based on cross_layer routing techniques with the dissemination in the routing process at the same time the semantic web services information and a Discovery_Diameter parameter that we have proposed to limit the area of discovery in the network. Finally, we present simulation results of our defined approach showing a significant optimization of the energy consumption level and the average throughput

    A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks

    Get PDF
    It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs) where the nodes seek for cooperative and trusted behaviour from the peer nodes in the absence of well-established infrastructure and centralized authority. Due to the inherent absence of security considerations in the traditional ad-hoc routing protocols, providing security and reliability in the routing of data packets is a major challenge. This work addresses this issue by proposing a composite trust metric based on the concept of social trust and quality-of-service (QoS) trust. Extended from the ad-hoc on-demand distance vector (AODV) routing protocol, we propose an enhanced trust-based model integrated with an attack-pattern discovery mechanism, which attempts to mitigate the adversaries craving to carry out distinct types of packet-forwarding misbehaviours. We present the detailed mode of operations of three distinct adversary models against which the proposed scheme is evaluated. Simulation results under different network conditions depict that the combination of social and QoS trust components provides significant improvement in packet delivery ratio, routing overhead, and energy consumption compared to an existing trust-based scheme

    Design and Implementation of ID Based MANET Autoconfiguration Protocol

    Get PDF
    Auto-configuration protocols are used for assignment of unique IP addresses to nodes in Mobile ad hoc networks. Without the assignment of unique IP addresses, service provisioning between the nodes is not possible. Such protocols use various heuristics to ensure the uniqueness in IP address assignment; such aspects increase the overall complexity in MANET system design. Moreover the overriding role of IP address as an ID in Application layer and Locator in routing space is a bottleneck in future wireless network (FWN) design. Contemporary FWN research is focusing on ID/Locator split concept designs. In this paper we propose an ID/Locator based architecture for MANETs which also solves               auto-configuration requirements for MANETs. Our proposed architecture is an adaptation from available ID/Locator split concepts for infrastructure oriented networks for usage in MANET context. The designed protocol uses identifiers for node identification, node discovery and traffic flow between end points. The protocol support provision for running contemporary IP oriented services. We have also verified various use cases of our proposed protocol through Linux based implementation

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    Konzeption und Realisierung eines kontextsensitiven Routingverfahrens

    Get PDF
    Communication and information services both depend on the individual needs of the users and on the possibilities of the used network techniques. To provide an optimal service level adapted to the user, his context must be considered. Thereby, service access should be carried out as flexibly and independently from the network as possible. Infrastructure networks, due to their topology, cannot give mobile access to such services everywhere. Mobile ad hoc networks are not bound to any infrastructure and are therefore very flexibly applicable. As a result of their dynamic topology, there are special requirements to routing and service discovery compared to conventional networks. Conventional methods usually are neither usable in ad hoc networks, nor suitable in heterogeneous environments. Especially because of the progressive convergence of the networks a network-wide solution is inevitable. This work therefore is concerned with the topics of ad hoc networks as well as routing protocols and procedures which are used for these. Possibilities for service discovery are described and compared. Based on this, an architectural concept is developed, which permits service discovery both in ad hoc networks and in conventional infrastructure networks. Service discovery is combined with a routing protocol especially extended for this purpose. Why this kind of service discovery on network level is advantageous is described and well founded. Principal components of the developed architecture are the so-called context-routers, which support service discovery independently of the address of a service provider. Thus, the user does not need to know such an address. Service discovery is, therefore, depending on the service itself and on the available information about the context of the user. Hence, a service optimally adapted to the user is selected. The concept supports rerouting data messages to an alternative server, if the original server breaks down, and offers the possibility for the provider to control service discovery and communication. A verification of the presented concept is carried out with practical implementations. The demonstrator network developed for this is used for a set of tests to verify the functions and the efficiency of the architecture. The results prove that the concept can meet the requirements. Finally, suggestions for future advancements conclude this dissertation.Das Angebot von Kommunikations- und Informationsdiensten richtet sich einerseits nach den individuellen Bedürfnissen der Nutzer andererseits aber auch nach den Möglichkeiten der verwendeten Netztechniken. Um einen optimal auf den Nutzer angepassten Dienst bereitstellen zu können, muss dessen Kontext berücksichtigt werden. Ein Dienstzugriff soll dabei möglichst flexibel und unabhängig vom Netz erfolgen. Den mobilen Zugriff auf solche Dienste können Infrastrukturnetze, durch ihre Topologie bedingt, nicht überall bedienen. Mobile Ad-hoc-Netze sind dagegen an keine Infrastruktur gebunden und deshalb sehr flexibel einsetzbar. Durch deren dynamische Topologie ergeben sich jedoch gegenüber den herkömmlichen Netzen auch spezielle Anforderungen an die Routen- und Dienstsuche. Konventionelle Verfahren sind hierbei in der Regel weder nutzbar, noch für einen Einsatz in heterogenen Umgebungen geeignet. Gerade mit der fortschreitenden Konvergenz der Netze ist aber eine netzübergreifende Lösung unumgänglich. Die vorliegende Arbeit befasst sich deshalb mit den Themen Ad-hoc-Netze sowie den hierbei eingesetzten Routingprotokollen und -verfahren. Es werden Möglichkeiten zur Dienstsuche erläutert und gegenübergestellt. Mit den Erkenntnissen daraus wird ein Architekturkonzept entwickelt, das die Dienstsuche sowohl in Ad-hoc- als auch in herkömmlichen Infrastrukturnetzen erlaubt. Die Dienstsuche erfolgt dabei in Verbindung mit einem für diesen Zweck erweiterten Routingverfahren. Warum diese Art einer Dienstsuche auf Netzwerkebene vorteilhaft ist, wird erläutert und begründet. Kernstück der entwickelten Architektur bilden die so genannten Kontextrouter, die eine Dienstsuche unabhängig von der Adresse eines Dienstanbieters unterstützen. Auch der Nutzer benötigt keine Kenntnis über eine solche Adresse. Eine Suche erfolgt lediglich über den Dienst und den zur Verfügung stehenden Informationen über den Kontext des Nutzers. Damit wird ein auf den Nutzer optimal angepasster Dienst ausgewählt. Das Konzept unterstützt die Weiterleitung von Daten zu einem alternativen Server, sofern der ursprüngliche Server ausfällt, und bietet Providern die Möglichkeit, steuernd auf die Dienstsuche und -kommunikation einzuwirken. Das Verifizieren des vorgestellten Konzeptes erfolgt auf Basis praktischer Realisierungen. Das dazu aufgebaute Demonstratornetzwerk dient für eine Reihe von Tests zum Nachweis der Funktionen und der Leistungsfähigkeit der Architektur. Die daraus resultierenden Ergebnisse beweisen, dass das Konzept den gestellten Anforderungen genügen kann. Abschließend werden in der Arbeit Vorschläge für zukünftige Weiterentwicklungen unterbreitet
    corecore