41,968 research outputs found
Mobile ad hoc network testbed using mobile robot technology
MANET (Mobile Ad Hoc Network) researchers have shown increased interest in using mobile robot technology for their testbed platforms. Thus, the main motivation of this paper is to review various robot-based MANET testbeds that have been developed in previously reported research. Additionally, suggestions to heighten mobility mechanisms by using mobile robots to be more practical, easy and inexpensive are also included in this paper, as we unveils ToMRobot, a low-cost MANET robot created from an ordinary remote control car that is capable of performing a real system MANET testbed with the addition of only a few low-cost electronic components. Despite greatly reduced costs, the ToMRobot does not sacrifice any of the necessary MANET basic structures and will still be easily customizable and upgradeable through the use of open hardware technology like Cubieboard2 and Arduino, as its robot controller. This paper will also include guidelines to enable technically limited MANET researchers to design and develop the ToMRobot. It is hoped that this paper achieves its two pronged objectives namely (i) to facilitate other MANET researchers by providing them with a source of reference that eases their decision making for selecting the best and most suitable MANET mobile robots for real mobility in their MANET testbeds (ii) to provide MANET researchers with a prospect of building their own MANET robots that can be applied in their own MANET testbed in the future
Optimal Caching and Routing in Hybrid Networks
Hybrid networks consisting of MANET nodes and cellular infrastructure have
been recently proposed to improve the performance of military networks. Prior
work has demonstrated the benefits of in-network content caching in a wired,
Internet context. We investigate the problem of developing optimal routing and
caching policies in a hybrid network supporting in-network caching with the
goal of minimizing overall content-access delay. Here, needed content may
always be accessed at a back-end server via the cellular infrastructure;
alternatively, content may also be accessed via cache-equipped "cluster" nodes
within the MANET. To access content, MANET nodes must thus decide whether to
route to in-MANET cluster nodes or to back-end servers via the cellular
infrastructure; the in-MANET cluster nodes must additionally decide which
content to cache. We model the cellular path as either i) a
congestion-insensitive fixed-delay path or ii) a congestion-sensitive path
modeled as an M/M/1 queue. We demonstrate that under the assumption of
stationary, independent requests, it is optimal to adopt static caching (i.e.,
to keep a cache's content fixed over time) based on content popularity. We also
show that it is optimal to route to in-MANET caches for content cached there,
but to route requests for remaining content via the cellular infrastructure for
the congestion-insensitive case and to split traffic between the in-MANET
caches and cellular infrastructure for the congestion-sensitive case. We
develop a simple distributed algorithm for the joint routing/caching problem
and demonstrate its efficacy via simulation.Comment: submitted to Milcom 201
A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks
A Mobile Ad hoc NETwork (manet) is a mobile, multi-hop wireless
network which is capable of autonomous operation. It is characterized
by energy-constrained nodes, bandwidth-constrained, variable-capacity
wireless links and dynamic topology, leading to frequent and
unpredictable connectivity changes.
In the absence of a fixed infrastructure, manet nodes cooperate to
provide routing services, relying on each other to forward packets to
their destination. Routing protocols designed for the fixed network
are not effective in the dynamic and resource-constrained manet
environment; many alternative routing protocols have been suggested.
This report provides an overview of a number of manet routing
protocols. More importantly, it defines a taxonomy that is suitable
for examining a wide variety of protocols in a structured way and
exploring tradeoffs associated with various design choices. The
emphasis is on practical design and implementation issues rather than
complexity analysis
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
HYMAD: Hybrid DTN-MANET Routing for Dense and Highly Dynamic Wireless Networks
In this paper we propose HYMAD, a Hybrid DTN-MANET routing protocol which
uses DTN between disjoint groups of nodes while using MANET routing within
these groups. HYMAD is fully decentralized and only makes use of topological
information exchanges between the nodes. We evaluate the scheme in simulation
by replaying real life traces which exhibit this highly dynamic connectivity.
The results show that HYMAD outperforms the multi-copy Spray-and-Wait DTN
routing protocol it extends, both in terms of delivery ratio and delay, for any
number of message copies. Our conclusion is that such a Hybrid DTN-MANET
approach offers a promising venue for the delivery of elastic data in mobile
ad-hoc networks as it retains the resilience of a pure DTN protocol while
significantly improving performance.Comment: 7 pages, 6 figure
- …