782 research outputs found
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes
or terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it's
an autonomous system in which mobile hosts connected by wireless links are free
to be dynamically and some time act as routers at the same time, and we discuss
in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time, there is no direction
or limit the movement and so on, and thus needed a new optional path Agreement
(Routing Protocol) to identify nodes for these actions communicate with each
other path, An ideal choice way the agreement should not only be able to find
the right path, and the Ad Hoc Network must be able to adapt to changing
network of this type at any time. and we talk in details in this paper all the
information of Mobile Ad Hoc Network which include the History of ad hoc,
wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc
networks, and then we present more than 13 types of the routing Ad Hoc Networks
protocols have been proposed. In this paper, the more representative of routing
protocols, analysis of individual characteristics and advantages and
disadvantages to collate and compare, and present the all applications or the
Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa
Quality and Availability of spectrum based routing for Cognitive radio enabled IoT networks
With the recent emergence and its wide spread applicability Internet of Things (IoT) is putting pressure on network resources and most importantly on availability of spectrum. Spectrum scarcity is the issue to be addressed in networking within IoT. Cognitive radio is the technology which addresses the problem of spectrum scarcity in an efficient way. Equipping the IoT devices with cognitive radio capability will lead to a new dimension called cognitive radio enabled IoT devices. To achieve ON-demand IoT solutions and interference free communications cognitive radio enabled IoT devices will become an effective platform for many applications. As there is high dynamicity in availability of spectrum it is challenging for designing an efficient routing protocol for secondary users in cognitive device networks. In this work we are going to estimate spectrum quality and spectrum availability based on two parameters called global information about spectrum usage and instant spectrum status information. Enhanced energy detector is used at each and every node for better probability of detection. For estimating spectrum quality and availability we are introducing novel routing metrics. To have restriction on the number of reroutings and to increase the performance of routing in our proposed routing metric only one retransmission is allowed. Then, two algorithms for routing are designed for evaluating the performance of routing and we find that the bit error rates of proposed algorithms (nodes are dynamic) have decreased a lot when compared to conventional methods (Nodes are static) and throughput of proposed algorithm also improved a lot
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute
Game theory based Ad-hoc On Demand Distance Vector Routing Protocol to Extend the Wireless Sensor Networks Life Time
This paper proposes a solution to increase the energy life time of wireless sensor networks (WSNs) via a concept of game theory enabled ad-hoc on demand distance vector (AODV) routing algorithm. Game theory is an optimal promising candidate for decision making in a wireless networking scenario to find the optimal path for data packets transfer between source node and destination node, where combination with the AODV routing algorithm, a procedure of game theory enabled AODV (GTEAODV) is developed and proposed in this research paper. The developed and proposed methodology is validated through simulation in NS2 environment and the results show an improvement in energy life time of the order of 30-35% in comparison to the existing routing methodology which uses co-operative routing techniques among the nodes in WSN. Further, the throughput of game theory enabled adhoc on demand routing is also highly improved in comparison to existing traditional approaches though obtained results. Though, game theory approach is an existing approach concatenation of it with AODV can provide increased network performance which is significant as portrayed in research results shown in the paper. Hence, by virtue of providing enhanced energy life time and data security through the nature of the algorithm, the proposed GTEAODV algorithm can be employed in defence applications for secure data transmission and reception for forthcoming deployment of 5G systems which are blossoming in world wide scenario
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
PERFORMANCE STUDY FOR CAPILLARY MACHINE-TO-MACHINE NETWORKS
Communication technologies witness a wide and rapid pervasiveness of wireless machine-to-machine (M2M) communications. It is emerging to apply for data transfer among devices without human intervention. Capillary M2M networks represent a candidate for providing reliable M2M connectivity. In this thesis, we propose a wireless network architecture that aims at supporting a wide range of M2M applications (either real-time or non-real-time) with an acceptable QoS level. The architecture uses capillary gateways to reduce the number of devices communicating directly with a cellular network such as LTE. Moreover, the proposed architecture reduces the traffic load on the cellular network by providing capillary gateways with dual wireless interfaces. One interface is connected to the cellular network, whereas the other is proposed to communicate to the intended destination via a WiFi-based mesh backbone for cost-effectiveness. We study the performance of our proposed architecture with the aid of the ns-2 simulator. An M2M capillary network is simulated in different scenarios by varying multiple factors that affect the system performance. The simulation results measure average packet delay and packet loss to evaluate the quality-of-service (QoS) of the proposed architecture. Our results reveal that the proposed architecture can satisfy the required level of QoS with low traffic load on the cellular network. It also outperforms a cellular-based capillary M2M network and WiFi-based capillary M2M network. This implies a low cost of operation for the service provider while meeting a high-bandwidth service level agreement. In addition, we investigate how the proposed architecture behaves with different factors like the number of capillary gateways, different application traffic rates, the number of backbone routers with different routing protocols, the number of destination servers, and the data rates provided by the LTE and Wi-Fi technologies. Furthermore, the simulation results show that the proposed architecture continues to be reliable in terms of packet delay and packet loss even under a large number of nodes and high application traffic rates
Routing in MobileWireless Sensor Networks: A Leader-Based Approach
This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.Research supported by the Spanish Research Council (MINECO), Grant TIN2016-79897-P, and the Department of Education, Universities and Research of the Basque Government, Grant IT980-16
Data Communication in Internet of Things: Vision, Challenges and Future Direction
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …