25,218 research outputs found
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
In this paper we present the design and evaluation of intrusion detection
models for MANETs using supervised classification algorithms. Specifically, we
evaluate the performance of the MultiLayer Perceptron (MLP), the Linear
classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and
the Support Vector Machine (SVM). The performance of the classification
algorithms is evaluated under different traffic conditions and mobility
patterns for the Black Hole, Forging, Packet Dropping, and Flooding attacks.
The results indicate that Support Vector Machines exhibit high accuracy for
almost all simulated attacks and that Packet Dropping is the hardest attack to
detect.Comment: 12 pages, 7 figures, presented at MedHocNet 200
Efficient Broadcasting for a Mobile Ad-hoc Network based Peer-to-peer Community Radio Service
Ad-hoc networks consisting entirely of simple mobile phones can be used to deploy village level telephony. We investigate a novel application for such networks – a peer-to peer community radio service. We envision a system, where any user in the network is equally empowered to generate and distribute audio content to the entire network, using his or her mobile phone. This study concentrates on a critical aspect of this service – the choice of the network-wide broadcast protocol. Using extensive simulations, we evaluate the suitability of various broadcast techniques for a rural peer-to-peer mobile adhoc network. Our simulations identify the best choice of protocols under various village network conditions while simultaneously identifying limitations of the current protocols.
Energy Efficient Location Aided Routing Protocol for Wireless MANETs
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes
forming a temporary network without using any centralized access point,
infrastructure, or centralized administration. In this paper we introduce an
Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is
based on the Location Aided Routing (LAR). EELAR makes significant reduction in
the energy consumption of the mobile nodes batteries by limiting the area of
discovering a new route to a smaller zone. Thus, control packets overhead is
significantly reduced. In EELAR a reference wireless base station is used and
the network's circular area centered at the base station is divided into six
equal sub-areas. At route discovery instead of flooding control packets to the
whole network area, they are flooded to only the sub-area of the destination
mobile node. The base station stores locations of the mobile nodes in a
position table. To show the efficiency of the proposed protocol we present
simulations using NS-2. Simulation results show that EELAR protocol makes an
improvement in control packet overhead and delivery ratio compared to AODV,
LAR, and DSR protocols.Comment: 9 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis
Optimisation of Mobile Communication Networks - OMCO NET
The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University.
The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing
Predicting topology propagation messages in mobile ad hoc networks: The value of history
This research was funded by the Spanish Government under contracts TIN2016-77836-C2-1-R,TIN2016-77836-C2-2-R, and DPI2016-77415-R, and by the Generalitat de Catalunya as Consolidated ResearchGroups 2017-SGR-688 and 2017-SGR-990.The mobile ad hoc communication in highly dynamic scenarios, like urban evacuations or search-and-rescue processes, plays a key role in coordinating the activities performed by the participants. Particularly, counting on message routing enhances the communication capability among these actors. Given the high dynamism of these networks and their low bandwidth, having mechanisms to predict the network topology offers several potential advantages; e.g., to reduce the number of topology propagation messages delivered through the network, the consumption of resources in the nodes and the amount of redundant retransmissions. Most strategies reported in the literature to perform these predictions are limited to support high mobility, consume a large amount of resources or require training. In order to contribute towards addressing that challenge, this paper presents a history-based predictor (HBP), which is a prediction strategy based on the assumption that some topological changes in these networks have happened before in the past, therefore, the predictor can take advantage of these patterns following a simple and low-cost approach. The article extends a previous proposal of the authors and evaluates its impact in highly mobile scenarios through the implementation of a real predictor for the optimized link state routing (OLSR) protocol. The use of this predictor, named OLSR-HBP, shows a reduction of 40–55% of topology propagation messages compared to the regular OLSR protocol. Moreover, the use of this predictor has a low cost in terms of CPU and memory consumption, and it can also be used with other routing protocols.Peer ReviewedPostprint (published version
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Distributed and adaptive location identification system for mobile devices
Indoor location identification and navigation need to be as simple, seamless,
and ubiquitous as its outdoor GPS-based counterpart is. It would be of great
convenience to the mobile user to be able to continue navigating seamlessly as
he or she moves from a GPS-clear outdoor environment into an indoor environment
or a GPS-obstructed outdoor environment such as a tunnel or forest. Existing
infrastructure-based indoor localization systems lack such capability, on top
of potentially facing several critical technical challenges such as increased
cost of installation, centralization, lack of reliability, poor localization
accuracy, poor adaptation to the dynamics of the surrounding environment,
latency, system-level and computational complexities, repetitive
labor-intensive parameter tuning, and user privacy. To this end, this paper
presents a novel mechanism with the potential to overcome most (if not all) of
the abovementioned challenges. The proposed mechanism is simple, distributed,
adaptive, collaborative, and cost-effective. Based on the proposed algorithm, a
mobile blind device can potentially utilize, as GPS-like reference nodes,
either in-range location-aware compatible mobile devices or preinstalled
low-cost infrastructure-less location-aware beacon nodes. The proposed approach
is model-based and calibration-free that uses the received signal strength to
periodically and collaboratively measure and update the radio frequency
characteristics of the operating environment to estimate the distances to the
reference nodes. Trilateration is then used by the blind device to identify its
own location, similar to that used in the GPS-based system. Simulation and
empirical testing ascertained that the proposed approach can potentially be the
core of future indoor and GPS-obstructed environments
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs
In this paper, a framework for experimental parameters in which Packet
Delivery Ratio (PDR), effect of link duration over End-to-End Delay (E2ED) and
Normalized Routing Overhead (NRO) in terms of control packets is analyzed and
modeled for Mobile Ad-Hoc NETworks (MANETs) and Vehicular Ad-Hoc NETworks
(VANETs) with the assumption that nodes (vehicles) are sparsely moving in two
different road. Moreover, this paper contributes the performance comparison of
one Proactive Routing Protocol; Destination Sequenced Distance vector (DSDV)
and two reactive protocols; DYnamic Source Routing (DSR) and DYnamic MANET
On-Demand (DYMO). A novel contribution of this work is enhancements in default
versions of selected routing protocols. Three performance parameters; PDR, E2ED
and NRO with varying scalabilities are measured to analyze the performance of
selected routing protocols with their original and enhanced versions. From
extensive simulations, it is observed that DSR outperforms among all three
protocols at the cost of delay. NS-2 simulator is used for simulation with
TwoRayGround propagation model to evaluate analytical results
- …