112,822 research outputs found
Zone Routing Protocol (ZRP) - A Novel Routing Protocol for Vehicular Ad-hoc Networks
© ASEE 2016This Paper discusses the capability of the current routing protocols for Mobile ad hoc networks for Vehicular ad hoc networks. VANET is derived from MANET and it is a network consisting of vehicles which can communicate wirelessly. In high traffic conditions the message should be delivered correctly between the vehicles and the communication using Road Side Units. VANETs are characterized by a dynamic topology with patterned mobility consisting on mobile nodes with sufficient resources and varied time channel behavior. The network traffic requirements differ for VANET. There are many routing protocols for mobile ad hoc networks which can be used for vehicular ad hoc networks. In this paper, we are introducing Zone Routing Protocol which can improve the parameters of VANET i.e. less communication delay and delivering the messages on time compared to AODV and DSR protocols while the vehicles are moving at high speeds. We have used a simulation to demonstrate those improvements
Systems Methodology and Framework for Problem Definition in Mobile Ad Hoc Networks
Mobile Ad Hoc Networks are communication networks built up of a collection of mobile devices which can communicate through wireless connections. Mobile Ad Hoc Networks have many challenges such as routing, which is the task of directing data packets from a source node to a given destination. This task is particularly hard in Mobile Ad Hoc Networks: due to the mobility of the network elements and the lack of central control, robustness and adaptability in routing algorithms and work in a decentralized and self organizing way. Through the principles of systems architecting and Engineering; the problem statement in Mobile Ad Hoc Networks could be defined more specifically and accurately. The uncertainties and techniques for mitigating and even taking positive advantages of them can be achieved through a framework of uncertainties as in [1]. The systems methodology framework called Total Systems Intervention (TSI) described by Flood and Jackson [2] select a systems methodology for Mobile Ad Hoc Networks. The purpose of this paper is to show how TSI when integrated with a framework created to understand the risks and opportunities can help develop strategies to minimize the risks and to take advantage of the opportunities for facing challenges in Mobile Ad Hoc Networks
Ubiquitous Interpersonal Communication over Ad-Hoc Networks and the Internet
The hardware and low-level software in many mobile de-
vices are capable of mobile-to-mobile communication, in-
cluding ad-hoc mode for 802.11, Bluetooth, and cognitive
radios.
We have started to leverage this capability to provide in-
terpersonal communication both over infrastructure networks
(the Internet), and over ad-hoc and delay-tolerant networks
composed of the mobile devices themselves.
This network is fully decentralized so it can function with-
out any infrastructure, but takes advantage of Internet con-
nections when available. Devices may communicate when-
ever they are able to exchange packets. All interpersonal
communication is encrypted and authenticated so packets
may be carried by devices belonging to untrusted others.
One challenge in a fully decentralized network is rout-
ing. Our design uses Rendezvous Points (RPs) and Dis-
tributed Hash Tables (DHTs) for delivery over the Internet,
and hop-limited broadcast and Delay Tolerant Networking
(DTN) within the ad-hoc network.
Each device has a policy that determines how many pack-
ets may be forwarded, and a packet prioritization mecha-
nism that favors packets likely to consume fewer network
resources. A goal of this design and implementation is to
provide useful interpersonal communications using at most
1% of any given resource on mobile devices
Spatiotemporal Multicast and Partitionable Group Membership Service
The recent advent of wireless mobile ad hoc networks and sensor networks creates many opportunities and challenges. This thesis explores some of them. In light of new application requirements in such environments, it proposes a new multicast paradigm called spatiotemporal multicast for supporting ad hoc network applications which require both spatial and temporal coordination. With a focus on a special case of spatiotemporal multicast, called mobicast, this work proposes several novel protocols and analyzes their performances. This dissertation also investigates implications of mobility on the classical group membership problem in distributed computing, proposes a new specification for a partitionable group membership service catering to applications on wireless mobile ad hoc networks, and provides a mobility-aware algorithm and middleware for this service. The results of this work bring new insights into the design and analysis of spatiotemporal communication protocols and fault-tolerant computing in wireless mobile ad hoc networks
Recommended from our members
Securing autonomous networks through virtual closure
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures, raising the question of security as the application of such systems in potentially hostile environments. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs). VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up and security overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN)
Virtual closed networks: A secure approach to autonomous mobile ad hoc networks
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures; raising the question of security as the application of such systems in potentially hostile environments becomes a desired function of such networks. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs), at a high cost in network resources during the setup of secure tunnels. VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs, which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication, a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN)
Security Issues in Manet and Counter-Measures
Mobile Ad-hoc Networks (MANET) are self-configuring networks of mobile nodes connected by wireless links. These nodes are able to move randomly and organize themselves and thus, the network's wireless architecture change rapidly and unpredictably. MANETs are usually utilized in situations of emergency for temporary operations or when there are no resources to set up elaborate networks. Mobile Ad-hoc Networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication network, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks due to the nature of the mobile devices (e.g. low power consumption, low processing load). Most of the ad-hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Apart from security objectives like authentication, availability, confidentiality, and integrity, the ad-hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to survey security issues faced by the mobile ad-hoc network environment and provide a classification of the various security mechanisms. We also analyzed the respective strengths and vulnerabilities of the existing routing protocols and proposed a broad and comprehensive frame-work that can provide a tangible solution
Optimized image processing and clustering to mitigate security threats in mobile ad hoc network
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET
- …