1,592 research outputs found

    Named data for mobile AdHoc networks

    Get PDF
    For the needs of future Internet, many researchers are proposing a paradigm shift towards a new information-centric approach. The Named-Data Networking (NDN) is one these proposals. Instead of addresses, packets should use only names, either expressing interest on specific information or naming the data content carried in. Applying the NDN model in a mobile ad-hoc network can greatly simplify the routing, since there is no need for global addresses and all nodes in the network can cache data packets.In this paper we propose a new strategy, called MultiPoint Relay (MPR) Strategy, targeted to minimize redundancy in Interest and Data packet forwarding in Ad-Hoc NDN networks. Interest packets sent by each node are only retransmitted by a subset of selected relay neighbors, as in OLSR. A time delay is also used to detect and prevent duplicated transmissions. Data packets can either be forwarded using the reverse path or by using similar delay technique in case of topology changes. The proposed strategy was implemented in ndnSIM simulator and compared with related works. Obtained results show that the strategy is effective in improving interest satisfaction ratio with reduced network overhead.This work has been supported by COMPETE: POCI-01-0145-FEDER-007043 and FCT – Fundação para a Ciência e Tecnologia within the Project Scope: UID/CEC/00319/201

    Bandwidth reservation in mobile adhoc networks

    Get PDF
    International audienceThe bandwidth reservation is one of most adopted solutions to meet QoS requirements in 802.11 ad hoc networks. The efficiency of these solutions depends on the accuracy of their estimations of available bandwidth; otherwise, their application can be catastrophic on networks. Therefore, accurate bandwidth estimation is fundamental, where each networks characteristic must be taken into consideration, including mobility and medium sharing. Current solutions do not take into account all networks characteristics, resulting to wrong bandwidth estimations and QoS violations. In this paper, we present a new approach for bandwidth reservation-Accurate Bandwidth Reservation (ABR)-which embeds an improved method of available bandwidth measurement, where all criteria of such networks are considered. Evaluation of ABR is performed by simulations and comparisons with some existing approaches

    Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks

    Get PDF
    —Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to disrupt network performance, obtain extra bandwidth and conserve resources. These MAC layer misbehaviours can lead to Denial of Service (DoS) attacks which can disrupt the network operation. There is a lack of comprehensive analysis of MAC layer misbehaviour driven DoS attacks for the IEEE 802.11 protocol. This research studied possible MAC layer DoS attack strategies that are driven by the MAC layer malicious/selfish nodes and investigates the performance of the IEEE 802.11 protocol. Such DoS attacks caused by malicious and selfish nodes violating backoff timers associated with the protocol. The experimental and analytical approach evaluates several practical MAC layer backoff value manipulation and the impact of such attacks on the network performance and stability in MANETs. The simulation results show that introducing DoS attacks at MAC layer could significantly affect the network throughput and data packet collision rate. This paper concludes that DoS attacks with selfish/malicious intend can obtain a larger throughput by denying well-behaved nodes to obtain deserved throughput, also DoS attacks with the intend of complete destruction of the network can succee

    A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

    Full text link
    In mobile ad hoc networks, by attacking the corresponding routing protocol, an attacker can easily disturb the operations of the network. For ad hoc networks, till now many secured routing protocols have been proposed which contains some disadvantages. Therefore security in ad hoc networks is a controversial area till now. In this paper, we proposed a Lightweight and Attack Resistant Authenticated Routing Protocol (LARARP) for mobile ad hoc networks. For the route discovery attacks in MANET routing protocols, our protocol gives an effective security. It supports the node to drop the invalid packets earlier by detecting the malicious nodes quickly by verifying the digital signatures of all the intermediate nodes. It punishes the misbehaving nodes by decrementing a credit counter and rewards the well behaving nodes by incrementing the credit counter. Thus it prevents uncompromised nodes from attacking the routes with malicious or compromised nodes. It is also used to prevent the denial-of-service (DoS) attacks. The efficiency and effectiveness of LARARP are verified through the detailed simulation studies.Comment: 14 Pages, IJWM

    Analysis of Mobile Networks’ Protocols Based on Abstract State Machines

    Get PDF
    We define MOTION (MOdeling and simulaTIng mObile adhoc Networks), a Java application based on the framework ASMETA (ASM mETAmodeling), that uses the ASM (Abstract State Machine) formalism to model and simulate mobile networks. In particular, the AODV (Ad-hoc On-demand Distance Vector) protocol is used to show the behaviour of the application
    • …
    corecore