309 research outputs found

    A Coalition-Formation Game Model for Energy-Efficient Routing in Mobile Ad-hoc Network

    Get PDF
    One of the most routing problems in Mobile Ad-hoc Network is the node’s selfishness. Nodes are generally selfish and try to maximize their own benefit; hence these nodes refuse to forward packet on behalf of others to preserve their limited energy resources. This selfishness may lead to a low efficiency of routing. Therefore, it is important to study mechanisms which can be used encourage cooperation among nodes, to maintain the network efficiency. In this paper, we propose a cooperative game theoretic model to support more energy-aware and available bandwidth routing in MANET. We introduce a novel framework from coalitional-formation game theory, called hedonic coalition-formation game. We integrate this model to OLSR protocol that is an optimization over the classical link state protocol for the MANETs. Within each coalition, a coalition coordinator acts as a special MPR node to improve the energy efficient and the packet success rate of the transmission. Simulation results show how the proposed algorithm improve the performance in terms of the percentage of selected MPR nodes in the network, the percentage of alive nodes by time, and the Packet Delivery Ratio. Which prove that our proposed model leads, to better results compared to the classical OLSR

    A Charging and Rewarding Scheme for Packet Forwarding

    Get PDF
    In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead

    Protector Control PC-AODV-BH in The Ad Hoc Networks

    Full text link
    In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator will be given to compare our proposed approach with SAODV protocol, basing on three performance metrics and taking into account the number of black hole malicious nodesComment: submit 15 pages, 19 figures, 1 table, Journal Indexing team, AIRCC 201

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Simulation Of Vehicular Movement in VANET

    Get PDF
    In the recent years research in the field of vehicular ad-hoc network(VANET) is done extensively. VANET consist of large number of dynamically nodes which are vehicles over a area. Different types of technology and applications are being developed for the VANET . So this VANET technology and applications should be thoroughly checked before deployment in the real world environment. But to test technologies and applications in real world environment is not feasible it involves lot of danger and safety issues, different reports of the testing can’t also be generated so to overcome these limitation we need to carry out simulation of VANET in the computer environment i.e. we should do a computer simulation. Computer simulation is risk and danger free, we can generate different scenario (rural, urban, collision of vehicles) of the VANET using this. So computer simulation is very important in VANET research. Simulation of VANET is divided into two part a. Traffic simulation: Generation of traffic movement, Defining the mobility model for vehicle and creating traffic movement. b. Network simulation: Generating Inter communicating vehicle , Defining communication protocols. And both the simulation are connected in bi-directional coupling

    Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

    Get PDF
    Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme

    The Impact of Rogue Nodes on the Dependability of Opportunistic Networks

    Get PDF
    Opportunistic Networks (OppNets) are an extension to the classical Mobile Ad hoc Networks (MANETs) where the network is not dependent on any infrastructure (e.g. Access Points or centralized administrative nodes). OppNets can be more flexible than MANETs because an end to end path does not exist and much longer delays can be expected. Whereas a Rogue Access Point is typically immobile in the legacy infrastructure based networks and can have considerable impact on the overall connectivity, the research question in this project evaluates how the pattern and mobility of a rogue nodes impact the dependability and overall "Average Latency" in an Opportunistic Network Environment. We have simulated a subset of the mathematical modeling performed in a previous publication in this regard. Ad hoc networks are very challenging to model due to their mobility and intricate routing schemes. We strategically started our research by exploring the evolution of Opportunistic networks, and then implemented the rogue behavior by utilizing The ONE (Opportunistic Network Environment, by Nokia Research Centre) simulator to carry out our research over rogue behavior. The ONE simulator is an open source simulator developed in Java, simulating the layer 3 of the OSI model. The Rogue behavior is implemented in the simulator to observe the effect of rogue nodes. Finally we extracted the desired dataset to measure the latency by carefully simulating the intended behavior, keeping rest of the parameters (e.g. Node Movement Models, Signal Range and Strength, Point of Interest (POI) etc) unchanged. Our results are encouraging, and coincide with the average latency deterioration patterns as modeled by the previous researchers, with a few exceptions. The practical implementation of plug-in in ONE simulator has shown that only a very high degree of rogue nodes impact the latency, making OppNets more resilient and less vulnerable to malicious attacks

    Data Gathering and Dissemination over Flying Ad-hoc Networks in Smart Environments

    Get PDF
    The advent of the Internet of Things (IoT) has laid the foundations for new possibilities in our life. The ability to communicate with any electronic device has become a fascinating opportunity. Particularly interesting are UAVs (Unmanned Airborne Vehicles), autonomous or remotely controlled flying devices able to operate in many contexts thanks to their mobility, sensors, and communication capabilities. Recently, the use of UAVs has become an important asset in many critical and common scenarios; thereby, various research groups have started to consider UAVs’ potentiality applied on smart environments. UAVs can communicate with each other forming a Flying Ad-hoc Network (FANET), in order to provide complex services that requires the coordination of several UAVs; yet, this also generates challenging communication issues. This dissertation starts from this standpoint, firstly focusing on networking issues and potential solutions already present in the state-of-the-art. To this aim, the peculiar issues of routing in mobile, 3D shaped ad-hoc networks have been investigated through a set of simulations to compare different ad-hoc routing protocols and understand their limits. From this knowledge, our work takes into consideration the differences between classic MANETs and FANETs, highlighting the specific communication performance of UAVs and their specific mobility models. Based on these assumptions, we propose refinements and improvements of routing protocols, as well as their linkage with actual UAV-based applications to support smart services. Particular consideration is devoted to Delay/Disruption Tolerant Networks (DTNs), characterized by long packet delays and intermittent connectivity, a critical aspect when UAVs are involved. The goal is to leverage on context-aware strategies in order to design more efficient routing solutions. The outcome of this work includes the design and analysis of new routing protocols supporting efficient UAVs’ communication with heterogeneous smart objects in smart environments. Finally, we discuss about how the presence of UAV swarms may affect the perception of population, providing a critical analysis of how the consideration of these aspects could change a FANET communication infrastructure

    Recommendation based trust model with an effective defence scheme for MANETs

    Get PDF
    YesThe reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment
    corecore