354 research outputs found

    Performance Analysis between OLSR and FSR Protocols under Black Hole Attack Using FPGA

    Get PDF
    Security is an important part of wireless ad hoc network or mobile ad hoc network. A mobile ad hoc network (MANET) is an infrastructure less category of wireless network. Routing protocols in Mobile ad hoc network is divided into three categories, Reactive (also known as on demand) routing protocol, Proactive (also known as table driven) routing protocol and Hybrid protocol. Security is an important part in MANET because when we send data source node to destination node in mobile ad hoc network, we want protection in path between source to destination and complete transfer data packet between source node to destination node. In this research paper we use two proactive routing protocol known as OLSR (Optimized Link state Routing) Protocol and FSR (Fisheye State Routing) Protocol. OLSR is a flat routing and Unipath protocol based on multipoint relay not multipath. FSR is a hierarchical routing and multipath protocol based on multiple paths. In this research work we check the performance of these two protocols under five different performance matrices known as Packet delivery ratio (PDR), Packet loss (PL), Average end to end delay (AEED), Normalized Routing load (NRL) and Throughput on black hole attack. Black hole attack is an active attack, in this attack attacker node absorbs the data packet and give the fake reply. In this research paper we analysis the performance two protocol one is unipath known as OLSR and second is Multipath known as FSR under Black hole Attack. The performance of FSR is better than OLSR, because OLSR is unipath and maximum data packet is absorbs in OLSR single path. FSR is better because FSR is Multipath and minimum data packet is absorbs in FSR multi path

    Routing Algorithms in MANET Networks

    Get PDF
    Tato bakalářská práce je zaměřena na problematiku sítí MANET, VANET a analýzu směrovacích protokolů. Pozornost budeme věnovat především DSR, OLSR a AODV protokolům. V teoretické části práce je popsán úvod do Ad-hoc sítí, základní informace o MANET a VANET sítí a popis vybraných směrovacích protokolů. Cílem praktické části bakalářské práce je implementace DSR, OLSR a AODV protokolu v prostředí MATLAB a jejich následné simulace, které jsou použity pro vyhodnocení výsledků.This bachelor thesis is focused on problems of MANET, VANET and routing protocols analysis. We will pay particular attention to DSR, OLSR and AODV protocols. The theoretical part describes the introduction to Ad-hoc networks, basic information about MANET and VANET network and description of selected routing protocols. The aim of the practical part of the thesis is the implementation of DSR, OLSR and AODV protocol in MATLAB and their subsequent simulations, which are used for evaluation of results.440 - Katedra telekomunikační technikyvýborn

    Energy Consumption Balancing in OLSR Ad Hoc Wireless Routing Protocol

    Get PDF
    The Mobile computer science requires many processing. Besides the communication activities, the energy consumption is one of the most critical issues as far as the batteries mobile devices are concerned. Especially, in ad hoc networks where each node is responsible to transmit data packets for the neighbour nodes. Thus, a particular wariness must be taken not only to minimize all nodes appropriate energy consumption but also to balance the batteries individual levels. Any unbalanced energy usage can, however, cause a failure on one of the overloaded nodes and thus lead to partitioning and decreasing the network lifetime. In the present paper, we first introduce the state of art the ad hoc networks and then its energy consumption, followed by a detailled description of the standard Optimized Link State Routing (OLSR) protocol. Second, we insert the energy consumption criterion QoS. With such an objective, we bring an the improvement at the heuristics of the nodes selection at multipoint relays (MPR), which represents the strongest point of the OLSR routing. Finally, we suggest three algorithms for the MPR selection process according to the energy constraints

    A Coalition-Formation Game Model for Energy-Efficient Routing in Mobile Ad-hoc Network

    Get PDF
    One of the most routing problems in Mobile Ad-hoc Network is the node’s selfishness. Nodes are generally selfish and try to maximize their own benefit; hence these nodes refuse to forward packet on behalf of others to preserve their limited energy resources. This selfishness may lead to a low efficiency of routing. Therefore, it is important to study mechanisms which can be used encourage cooperation among nodes, to maintain the network efficiency. In this paper, we propose a cooperative game theoretic model to support more energy-aware and available bandwidth routing in MANET. We introduce a novel framework from coalitional-formation game theory, called hedonic coalition-formation game. We integrate this model to OLSR protocol that is an optimization over the classical link state protocol for the MANETs. Within each coalition, a coalition coordinator acts as a special MPR node to improve the energy efficient and the packet success rate of the transmission. Simulation results show how the proposed algorithm improve the performance in terms of the percentage of selected MPR nodes in the network, the percentage of alive nodes by time, and the Packet Delivery Ratio. Which prove that our proposed model leads, to better results compared to the classical OLSR

    Detection and avoidance of routing attack in mobile ad-hoc network using intelligent node

    Get PDF
    The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert message to each mobile node in the network, when the attacker attacks the network. Then, Routing table change Detector identifies exactly how many changes has occurred in each node after receiving the alert messages from the intrusion detection system and also it make some changes in the routing table of each node in the network. From these changes, the Intrusion detection system identifies the attackers and these attackers are isolated from the network. The main drawback of this existing system is whenever the attacker is occurred, the Intrusion detection system has to send an alert message every time and the routing table change detector has to make some changes in the routing table. In order to avoid these drawbacks, the knowledge based intelligent system is proposed. In this proposed system, initially a source node has to get an authorized path from the intelligent node (a node with high energy) to send a data to the destination node. This proposed system discussed with the four routing attacks such as route salvage, sleep deprivation, colluding miss relay and collision attack

    Routing in mobile Ad Hoc Networks

    Get PDF
    A Mobile Ad Hoc Network (MANET) is built on the fly where a number of wireless mobile nodes work in cooperation without the engagement of any centralized access point or any fixed infrastructure. Two nodes in such a network can communicate in a bidirectional manner if and only if the distance between them is at most the minimum of their transmission ranges. When a node wants to communicate with a node outside its transmission range, a multihop routing strategy is used which involves some intermediate nodes. Because of the movements of nodes, there is a constant possibility of topology change in MANET. Considering this unique aspect of MANET, a number of routing protocols have been proposed so far. This chapter gives an overview of the past, current, and future research areas for routing in MANET. In this chapter we will learn about the following things: - The preliminaries of mobile ad hoc network - The challenges for routing in MANET - Expected properties of a MANET routing protocol - Categories of routing protocols for MANET - Major routing protocols for MANET - Criteria for performance comparison of the routing protocols for MANET - Achievements and future research directions - Expectations and realit
    corecore