1,624 research outputs found
An enhanced Multipath Strategy in Mobile Ad hoc Routing Protocols
The various routing protocols in Mobile Ad hoc Networks follow different
strategies to send the information from one node to another. The nodes in the
network are non static and they move randomly and are prone to link failure
which makes always to find new routes to the destination. This research mainly
focused on the study of the characteristics of multipath routing protocols in
MANETS. Two of the multipath routing protocols were investigated and a
comparative study along with simulation using NS2 was done between DSR and AODV
to propose an enhanced approach to reach the destination maintaining the QoS. A
possible optimization to the DSR and AODV routing protocols was proposed to
make no node to be overburdened by distributing the load after finding the
alternate multipath routes which were discovered in the Route discovery
process. The simulation shows that the differences in the protocol highlighted
major differences with the protocol performance. These differences have been
analyzed with various network size, mobility, and network load. A new search
table named Search of Next Node Enquiry Table (SONNET) was proposed to find the
best neighbor node. Using SONNET the node selects the neighbor which can be
reached in less number of hops and with less time delay and maintaining the
QoS
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. One of the goals in the research is to find a method to prevent black hole attacks without decreasing network throughput or
increasing routing overhead. The routing mechanism in define uses route requests (RREQs; for discovering routes) and route replies (RREPs; for receiving paths). However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using
the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the
routing process. This method avoids dependency exclusively on the hop counts and destination sequence numbers (DSNs) that are exploited by malicious nodes in the standard AODV protocol. The experiment by performance metrics End-to-End delay
and packet delivery ratio are compared in order to determine the best effort traffic. The results showed the PGO-DLLA improvement of the shortest and secure routing from black hole attack in MANET. In addition, the results indicate better performance
than the related works algorithm with respect to all metrics excluding throughput which AntNet is best in routing when the pause time be more than 40 seconds. PGODLLA is able to improve the route discovery against the black hole attacks in AODV.
Experiments in this thesis have shown that PGO-DLLA is able to reduce the normalized routing load, end-to-end delay, and packet loss and has a good throughput and packet delivery ratio when compared with the standard AODV protocol, BAODV protocol, and the current related protocols that enhance the routing security of the AODV protocols
Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks
In recent years, the application of Mobile Ad-hoc Network (MANET) with Voice over Internet Protocol (VoIP) has been increased. However, the level of Quality of Service (QoS) for VoIP traffic in MANET, while there is no infrastructure, will reduce when dealing with a large number of calls. In this type of dynamic environment, the developing of a new infrastructure becomes more costly and time-consuming. In this paper, we proposed an efficient method, called the Quality of Service-Nearest Neighbor (QoS-NN), to improve the QoS level for VoIP in order to manage the huge number of calls over MANET network. We utilized the Ad-hoc On-demand Distance Vector (AODV) protocol as the underlying routing protocol to implement our proposed method. We evaluated the proposed QoS-NN method using Network Simulator version 2 (NS2). The performance of the proposed QoS-NN method was compared with Lexicographic order method. The comparison was evaluated in terms of R-factor, end-to-end delay, packet loss ratio, and packet delivery ratio performance metrics. In addition, the proposed method evaluated under different network parameters such as VoIP CODECs, node mobility speed, number of calls and number of nodes. The comparison results indicate that the proposed QoS-NN outperform the Lexicographic order method
Recommended from our members
A twoâstep authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
- âŠ