496 research outputs found

    Effective link operation duration: a new routing metric for mobile ad hoc networks

    Get PDF
    The dynamic topology of mobile ad hoc networks (MANETs) is caused by node mobility and fading of the wireless link. Link reliability is often measured by the estimated lifetime and the stability of a link. In this paper we propose that the stability of a link can be represented by the time duration in which the two nodes at each end of a link are within each other’s transmission range and the fading is above an acceptable threshold. A novel routing metric, called effective link operation duration (ELOD), is proposed and implemented into AODV (AODV-ELOD). Simulation results show that proposed AODVELOD outperforms both AODV and the Flow Oriented Routing Protocol (FORP)

    Cost Optimization Approach for MANET using Particle Swarm Optimization

    Get PDF
    This paper present the approach require to increase the QoS of MANET network using particle swarm optimization algorithm. To improve data communication between two nodes we propose an efficient algorithm for AODV protocol using PSO where instead of suppling all default parameter with default value of AODV protocol we try to provide selective parameters with optimum value so that overall requirement of control packet get decrease that in turn result in to increase quality of service parameters of MANET. For the enhancement of reliability and reduction of cost, node speed control mechanism is implemented using PSO, The given method which is use for simulation, reduces the overall loss of data and also make transmission effective. We have also tested the performance of network by changing data rates and the speed of the node

    BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Get PDF
    Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET) where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS). Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system

    Signal Strength Based Congestion Control in In MANET

    Get PDF
    All nodes in MANET (Mobile Ad-hoc Network) are mobile and dynamically connected in an arbitrary manner.  Mobility causes frequent link failure which results in packet losses. TCP assumes that these packet losses are due to congestion only. This wrong assumption requires packet retransmissions till packet arrives successfully at the receiver. Goal is to improve TCP performance by using signal strength based cross layer approach which obviously resolves the congestion. We are reviewing a signal strength based measurements to improve such packet losses and no need to retransmit packets. Node based and link based signal strength can be measured. If a link fails due to mobility, then signal strength measurement provides temporary higher transmission power to keep link alive. When a route is likely to fail due to weak signal strength of a node, it will find alternate path. consequently avoids congestion. We will make changes at MAC routing and routing layer to predict link failure. MANET hits the protocol's strength due to its highly dynamic features, thus in testing a protocol suitable for MANET implementation we have selected two routing protocols AODV and DSR. Packet Delivery Ratio, Packet Drop, Throughput and end to end delay are the metrics used for performance analysis of the AODV routing protocols. Keywords: Congestion  control, Signal strength, TCP performance ,Cross layer interaction, Route discover

    RGIM: An Integrated Approach to Improve QoS in AODV, DSR and DSDV Routing Protocols for FANETS Using the Chain Mobility Model

    Get PDF
    Flying ad hoc networks (FANETs) are a collection of unmanned aerial vehicles that communicate without any predefined infrastructure. FANET, being one of the most researched topics nowadays, finds its scope in many complex applications like drones used for military applications, border surveillance systems and other systems like civil applications in traffic monitoring and disaster management. Quality of service (QoS) performance parameters for routing e.g. delay, packet delivery ratio, jitter and throughput in FANETs are quite difficult to improve. Mobility models play an important role in evaluating the performance of the routing protocols. In this paper, the integration of two selected mobility models, i.e. random waypoint and Gauss–Markov model, is implemented. As a result, the random Gauss integrated model is proposed for evaluating the performance of AODV (ad hoc on-demand distance vector), DSR (dynamic source routing) and DSDV (destination-Sequenced distance vector) routing protocols. The simulation is done with an NS2 simulator for various scenarios by varying the number of nodes and taking low- and high-node speeds of 50 and 500, respectively. The experimental results show that the proposed model improves the QoS performance parameters of AODV, DSR and DSDV protocol

    Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS

    Get PDF
    Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge.  The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system

    Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network

    Get PDF
    A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of nodes in the network. This paper proposes a novel hybrid multipath routing algorithm with an efficient clustering technique. A node is selected as cluster head if it has high surplus energy, better transmission range and least mobility. The Energy Aware (EA) selection mechanism and the Maximal Nodal Surplus Energy estimation technique incorporated in this algorithm improves the energy performance during routing. Simulation results can show that the proposed clustering and routing algorithm can scale well in dynamic and energy deficient mobile sensor network.Comment: 9 pages, 4 figure
    corecore