5,430 research outputs found

    The Impact of Signal Strength over Routing Protocols in Wireless Networks

    Get PDF
    In ad hoc routing protocols the source node may need an intermediate nodes to transmit the packets into the destination if the destination is not within transmission range of the source. This paper studies the impact of signal strength of nodes over ad hoc routing protocols and explains an important effect of signal strength on ad hoc routing protocols in four different directions including the routes and the nodes. As a result the study give an important improvement in ad hoc routing protocols when using signal strength compared to other ad hoc routing protocols without considering signal strength

    A performance study of routing protocols for mobile grid environment

    Get PDF
    Integration of mobile wireless consumer devices into the Grid initially seems unlikely due to limitation such as CPU performance,small secondary storage, heightened battery consumption sensitivity and unreliable low-bandwidth communication. The current grid architecture and algorithm also do not take into account the mobile computing environment since mobile devices have not been seriously considered as valid computing resources or interfaces in grid communities. This paper presents the results of simulation done in identifying a suitable ad hoc routing protocol that can be used for the target grid application in mobile environment. The simulation comparing three ad hoc routing protocols named DSDV, DSR and AODV

    Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols

    Get PDF
    Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as authentication, cannot be obtained. Threat models drive analysis capabilities, affecting how we evaluate trust. Current attacker threat models limit the results obtained during protocol security analysis over ad hoc routing protocols. Developing a proper threat model to evaluate security properties in mobile ad hoc routing protocols presents a significant challenge. If the attacker strength is too weak, we miss vital security flaws. If the attacker strength is too strong, we cannot identify the minimum required attacker capabilities needed to break the routing protocol. In this paper we present an adaptive threat model to evaluate route discovery attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc routing process and allows us to identify minimum requirements an attacker needs to break a given routing protocol

    Adaptation Process for Ad hoc Routing Protocol

    Get PDF
    International audienceBecause of several constraints in ad hoc networks, an adaptive ad hoc routing protocol is increasingly required. In this paper, we propose a synopsis of an adaptation process for an adaptive ad hoc routing protocol. Next, we put into practice the analysis of the process of adaptation to mobility by realizing an adaptive routing protocol: CSR (Cluster Source Routing) which is an extension of a widely used ad hoc routing protocol: DSR (Dynamic source Routing). Mobility and density metrics are considered to CSRDSR mode switching, it moves from a flat architecture working in DSR to a virtual hierarchical architecture. With this mode switching, CSR can enhance the scalability of the DSR routing protoco

    A Comparison of Routing Strategies for Vehicular Ad Hoc Networks

    Full text link
    On this paper we investigate the use of ad-hoc routing algorithms for the exchange of data between vehicles. There are two main aspects that are of interest in this context: the specific characteristics of ad-hoc networks formed by vehicles and the applicability of existing ad-hoc routing schemes to networks that display these characteristics. In order to address both aspects we generate realistic vehicular movement patterns of highway traffic scenarios using a well validated traffic simulation tool. Based on these patterns we show that the characteristics of vehicular ad-hoc networks are quite different from the frequently used random waypoint model. We then proceed to evaluate the performance of a reactive ad-hoc routing protocol (DSR) and of a position-based approach (greedy forwarding as done in GPSR) in combination with a simple reactive location service. Our analysis suggests that for vehicular networks where communication spans more than 2 or 3 hops position-! based ad-hoc routing has significant advantages over reactive non-position-based approaches both in the number of successfully delivered packets and in routing overhead

    A quantitative comparison of ad hoc routing protocols with and without channel adaptation

    Get PDF
    To efficiently support tetherless applications in ad hoc wireless mobile computing networks, a judicious ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well-known protocols are also being implemented in practical situations. However, one major imperfection in existing protocols is that the time-varying nature of the wireless channels among the mobile terminals is ignored, let alone exploited. This could be a severe design drawback because the varying channel quality can lead to very poor overall route quality in turn, resulting in low data throughput. Indeed, better performance could be achieved if a routing protocol dynamically changes the routes according to the channel conditions. In this paper, we first propose two channel adaptive routing protocols which work by using an adaptive channel coding and modulation scheme that allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated. We then present a qualitative and quantitative comparison of the two classes of ad hoc routing protocols. Extensive simulation results indicate that channel adaptive ad hoc routing protocols are more efficient in that shorter delays and higher rates are achieved, at the expense of a higher overhead in route set-up and maintenance. © 2005 IEEE.published_or_final_versio

    BGCA: bandwidth guarded channel adaptive routing for ad hoc networks

    Get PDF
    To support truly peer-to-peer applications in ad hoc wireless networks, a judicious and efficient ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well known protocols are also being implemented in practical situations. However, one major drawback in existing state-of-the-art protocols, such as the AODV (ad hoc on demand distance vector) routing protocol, is that the time-varying nature of the wireless channels among the mobile terminals is ignored, let alone exploited. In this paper, by using a previously proposed adaptive channel coding and modulation scheme which allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated, we devise a new ad hoc routing algorithm that dynamically changes the routes according to the channel conditions. Extensive simulation results indicate that our proposed protocol is more efficient in that shorter delays and higher rates are achieved.published_or_final_versio

    A survey of evaluation platforms for ad hoc routing protocols: a resilience perspective

    Full text link
    Routing protocols allow for the spontaneous formation of wireless multi-hop networks without dedicated infrastructure, also known as ad hoc networks. Despite significant technological advances, difficulties associated with the evaluation of ad hoc routing protocols under realistic conditions, still hamper their maturation and significant roll out in real world deployments. In particular, the resilience evaluation of ad hoc routing protocols is essential to determine their ability of keeping the routing service working despite the presence of changes, such as accidental faults or malicious ones (attacks). However, the resilience dimension is not always addressed by the evaluation platforms that are in charge of assessing these routing protocols. In this paper, we provide a survey covering current state-of-the-art evaluation platforms in the domain of ad hoc routing protocols paying special attention to the resilience dimension. The goal is threefold. First, we identify the most representative evaluation platforms and the routing protocols they have evaluated. Then, we analyse the experimental methodologies followed by such evaluation platforms. Finally, we create a taxonomy to characterise experimental properties of such evaluation platforms.This work is partially supported by the Spanish Project ARENES (TIN2012-38308-C02-01), the ANR French Project AMORES (ANR-11-INSE-010), and the Intel Doctoral Student Honour Programme 2012.Friginal López, J.; Andrés Martínez, DD.; Ruiz García, JC.; Martínez Raga, M. (2014). A survey of evaluation platforms for ad hoc routing protocols: a resilience perspective. Computer Networks. 75(A):395-413. https://doi.org/10.1016/j.comnet.2014.09.010S39541375

    Security in Ad-Hoc Routing Protocols

    Full text link
    Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public, besides traditional" uses such as military battlefields and disaster situations they are being used more and more in every-day situations. With this increased usage comes the need for making the networks secure as well as efficient, something that is not easily done as many of the demands of network security conflicts with the demands on mobile networks due to the nature of the mobile devices (e.g. low power consumption, low processing load). The concept and structure of MANETs make them prone to be easily attacked using several techniques often used against wired networks as well as new methods particular to MANETs. Security issues arise in many different areas including physical security, key management, routing and intrusion detection, many of which are vital to a functional MANET. In this paper we focus on the security issues related to ad hoc routing protocols in particular. The routing in ad hoc networks remains a key issue since without properly functioning routing protocols, the network simply will not work the way it's intended to. Unfortunately, routing may also be one of the most difficult areas to protect against attacks because of the ad hoc nature of MANETs. We will present the main security risks involved in ad-hoc routing as well as the solutions to these problems that are available today.
    corecore