2,334 research outputs found

    Zone Partition Based Routing Protocol In MANET

    Get PDF
    ABSTRACT -Mobile ad hoc networks use anonymous routing protocol that hide sender receiver location and routes from outside attackers and also gives anonymity protection of wireless network. However, existing anonymous routing protocols mainly based on hop-byhop encryption or redundant traffic, but it's generate high cost and cannot provide full anonymity protection. To offer high anonymity protection, we propose a zone partition based routing protocol. Zone partition based routing protocol dynamically partitions the entire network field into zones and randomly select nodes in zone as intermediate relay nodes, it's form a no traceable anonymous route. Zones contain nodes varies during packet transmissions, so outside observers cannot find packet transmission path. Unfortunately sometime outside observer find sender, receiver locations and route, so this project also proposed neighbor coverage based probabilistic rebroadcast protocol. This protocol correctly indentify attacker's node and preventing from outside attackers. These protocols offer high anonymity protection of entire wireless network. It also effectively prevents the intersection and timing attacks

    Enabling limited traffic scheduling in asynchronous ad hoc networks

    Get PDF
    We present work-in-progress developing a communication framework that addresses the communication challenges of the decentralized multihop wireless environment. The main contribution is the combination of a fully distributed, asynchronous power save mechanism with adaptation of the timing patterns defined by the power save mechanism to improve the energy and bandwidth efficiency of communication in multihop wireless networks. The possibility of leveraging this strategy to provide more complex forms of traffic management is explored

    The impact of propagation environment and traffic load on the performance of routing protocols in ad hoc networks

    Full text link
    Wireless networks are characterized by a dynamic topology triggered by the nodes mobility. Thus, the wireless multi-hops connection and the channel do not have a determinist behaviour such as: interference or multiple paths. Moreover, the nodes' invisibility makes the wireless channel difficult to detect. This wireless networks' behaviour should be scrutinized. In our study, we mainly focus on radio propagation models by observing the evolution of the routing layer's performances in terms of the characteristics of the physical layer. For this purpose, we first examine and then display the simulation findings of the impact of different radio propagation models on the performance of ad hoc networks. To fully understand how these various radio models influence the networks performance, we have compared the performances of several routing protocols (DSR, AODV, and DSDV) for each propagation model. To complete our study, a comparison of energy performance based routing protocols and propagation models are presented. In order to reach credible results, we focused on the notion of nodes' speed and the number of connections by using the well known network simulator NS-2.Comment: 13 pages, 5 figures, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 201

    Multimedia Content Distribution in Hybrid Wireless Networks using Weighted Clustering

    Get PDF
    Fixed infrastructured networks naturally support centralized approaches for group management and information provisioning. Contrary to infrastructured networks, in multi-hop ad-hoc networks each node acts as a router as well as sender and receiver. Some applications, however, requires hierarchical arrangements that-for practical reasons-has to be done locally and self-organized. An additional challenge is to deal with mobility that causes permanent network partitioning and re-organizations. Technically, these problems can be tackled by providing additional uplinks to a backbone network, which can be used to access resources in the Internet as well as to inter-link multiple ad-hoc network partitions, creating a hybrid wireless network. In this paper, we present a prototypically implemented hybrid wireless network system optimized for multimedia content distribution. To efficiently manage the ad-hoc communicating devices a weighted clustering algorithm is introduced. The proposed localized algorithm deals with mobility, but does not require geographical information or distances.Comment: 2nd ACM Workshop on Wireless Multimedia Networking and Performance Modeling 2006 (ISBN 1-59593-485

    An efficient counter-based broadcast scheme for mobile ad hoc networks

    Get PDF
    In mobile ad hoc networks (MANETs), broadcasting plays a fundamental role, diffusing a message from a given source node to all the other nodes in the network. Flooding is the simplest and commonly used mechanism for broadcasting in MANETs, where each node retransmits every uniquely received message exactly once. Despite its simplicity, it however generates redundant rebroadcast messages which results in high contention and collision in the network, a phenomenon referred to as broadcast storm problem. Pure probabilistic approaches have been proposed to mitigate this problem inherent with flooding, where mobile nodes rebroadcast a message with a probability p which can be fixed or computed based on the local density. However, these approaches reduce the number of rebroadcasts at the expense of reachability. On the other hand, counter-based approaches inhibit a node from broadcasting a packet based on the number of copies of the broadcast packet received by the node within a random access delay time. These schemes achieve better throughput and reachability, but suffer from relatively longer delay. In this paper, we propose an efficient broadcasting scheme that combines the advantages of pure probabilistic and counter-based schemes to yield a significant performance improvement. Simulation results reveal that the new scheme achieves superior performance in terms of saved-rebroadcast, reachability and latency

    Development of Advanced Location Based Efficient Routing in MANETs

    Get PDF
    Mobile Ad Hoc Networks (MANETs) use routing protocols that are anonymous and provides hiding of crucial node identities and routes, so that outside observers cannot trace the route and also the crucial nodes, in this way it provides better protection. There are many existing anonymous routing protocols which rely on either hop-by-hop encryption or redundant traffic. Both the methods used are highly costly and also they don't generate full anonymity protection to the nodes or routers and also the source and destination. As the cost is high while using this anonymity protection categories it creates problem in the resource constraints in MANETs especially in multimedia wireless applications high cost exacerbates the intrinsic resource constraint problem are seen in MANETs especially in wireless multimedia applications. To provide protection at low cost, an Advanced Location-based Efficient Routing in MANET (ALER).It dynamically partitions the network field into different zones and it randomly chooses nodes in zones as intermediate relay nodes, these relay nodes forms a non-traceable anonymous route, not only that the proposed protocol also helps in hiding the sender and the destination also very efficiently. It also has strategies to effectively counter intersection, timing attacks. In this routing technique it has tried to overcome the Sybil attack issues which were not solved by the routing technique. It has prevented the Sybil attack entirely by having forwarding nodes check source routes for loops

    Requirement analysis for building practical accident warning systems based on vehicular ad-hoc networks

    Get PDF
    An Accident Warning System (AWS) is a safety application that provides collision avoidance notifications for next generation vehicles whilst Vehicular Ad-hoc Networks (VANETs) provide the communication functionality to exchange these notifi- cations. Despite much previous research, there is little agreement on the requirements for accident warning systems. In order to build a practical warning system, it is important to ascertain the system requirements, information to be exchanged, and protocols needed for communication between vehicles. This paper presents a practical model of an accident warning system by stipulating the requirements in a realistic manner and thoroughly reviewing previous proposals with a view to identify gaps in this area

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements
    • …
    corecore