70,806 research outputs found

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    LD: Identifying Misbehaving Nodes in MANET

    Get PDF
    A mobile ad-hoc network is a collection of mobile nodes connected together over a wireless medium without any fixed infrastructure. Unique characteristics of mobile ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium and highly dynamic topology, pose various challenges to the security design. Mobile ad-hoc networks lack central administration or control, making them very vulnerable to attacks or disruption by faulty nodes in the absence of any security mechanisms. Also, the wireless channel in a mobile ad-hoc network is accessible to both legitimate network users and malicious attackers. So, the task of finding good solutions for these challenges plays a critical role in achieving the eventual success of mobile ad-hoc networks. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. Secure routing protocols and mechanisms to detect routing misbehavior in the direct neighborhood exist; however, collusion of misbehaving nodes has not been adequately addressed yet. We present LeakDetector, a mechanism to detect colluding malicious nodes in wireless multihop networks A mobile ad-hoc network is a collection of mobile nodes connected together over a wireless medium without any fixed infrastructure. Unique characteristics of mobile ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium and highly dynamic topology, pose various challenges to the security design. Mobile ad-hoc networks lack central administration or control, making them very vulnerable to attacks or disruption by faulty nodes in the absence of any security mechanisms. Also, the wireless channel in a mobile ad-hoc network is accessible to both legitimate network users and malicious attackers. So, the task of finding good solutions for these challenges plays a critical role in achieving the eventual success of mobile ad-hoc networks. However,the. LeakDetector enables the calculation of the packet-loss ratio for the individual nodes

    Security in Ad hoc Network through Intrusion Detection Techniques

    Get PDF
    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile wireless networks, ad hoc networks do not depend on any fixed infrastructure. Rather, hosts depend on one another to keep the network associated. Security is the main concern in ad-hoc networks. Owe to the vulnerable nature of the mobile ad hoc network, there are various security threats that upset its improvement. There examine the fundamental vulnerabilities in the mobile ad hoc networks, which have made it a lot simpler to experience the effects of attacks than the conventional wired system. At that point examine the security criteria of the mobile ad hoc network and present the primary attack types that exist in it. At long last study the present security solutions through Intrusion Detection Technique for the mobile ad hoc network. There are two technique cluster based Intrusion Detection Technique for the mobile ad hoc network and misbehaviour Detection through Cross-layer Analysis are described

    The design and development of Mobile Ad Hoc Networks

    Get PDF
    Wireless (and hence mobile) communication networks have become an integral part of our society, significantly enhancing communication capabilities; mobile ad hoc networks (MANETs) extend this capability to any time/anywhere, providing connectivity without the need of an underlying infrastructure. This work aims to investigate the newcoming area of mobile ad hoc networks, focusing on research problems related to the design and development of routing protocols, both from a formal and technical point of view.

    Non-repudiation in pure mobile ad hoc network

    Get PDF
    Within the last decade, the use of wireless technologies has become more prevalent. Wireless networks have flexible architectures with data transferred via radio waves and can be divided into two categories; infrastructure-based wireless networks and mobile ad hoc network. The mobile ad hoc network (MANET) is an autonomous system which can be dynamically built without pre-existing infrastructure or a trusted third party (TTP). Due to these infrastructure-less and self-organized characteristics, MANET encounters different problems from infrastructure-based wired network, such as key management, power shortage, and security issues. This paper will further divide MANETs into pure ad hoc networks which do not contain a TTP and organized ad hoc networks which contain an offline TTP, and then focus on the security issues especially the non-repudiation issue between two mobile nodes which communicate in pure ad hoc networks

    Integrating mobile ad hoc network into mobile IPv6 network

    Get PDF
    In the future more and more devices connected to the Internet will be wireless. Wireless networks can be classified into two types of networks: network with infrastructure (i.e. networks with base stations, gateway and routing support), which is called Mobile IP, and network without infrastructure which is called ad hoc networks. Mobile IP tries to solve the problem of how a mobile node may roam from its network to foreign network and still maintain connectivity to the Internet. Ad hoc network tries to solve the problem if the infrastructure is not available or inconvenient for its use such as in rural environments. Integrating ad hoc into Mobile IP provide new feature for Mobile ad hoc network such as Internet connectivity, streamline communication with another network. This paper presents the development of a test bed for integrating Mobile Ad hoc NETwork (MANET) into Mobile IPv6

    Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN

    Get PDF
    As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light

    Performance Analysis of Distributed Cache Invalidation Method in Mobile Ad hoc Networks using AODV and AOMDV Routing Protocols

    Get PDF
    Mobile Ad hoc Networks (MANETs) is an active wireless network that can be formed without any existing permanent framework networks. Mobile Ad hoc Networks is an independent structure of mobile nodes communicated with wireless channels. Distributed cache invalidation method is performed among intermediate routing mobile nodes. In MANETs routing protocols are provided desirable route establishments of the mobile nodes. Ad hoc On-demand distance vector routing protocol (AODV) was well known single route protocol , Ad hoc On-demand Multipath Distance Vector routing protocol (AOMDV) is extends the AODV protocol with multipath. These results are carried out in network simulator version2 (NS2), the performance is analyzed and compared between AODV and AOMDV routing protocols

    A Study of Cross Layer Design compare with Layer Design for MANET

    Get PDF
    Mobile Ad – hoc networks (MANET) are becoming increasingly popular in wireless technology, especially for providing services in disaster area. Mobile users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Mobile ad – hoc networks suffer from several performance limitations, especially related to excessive burden deriving from the layering approach for the TCP / IP protocol stack design. In fact, TCP / IP protocol stack originally designed for wired networks and it is not suitable for wireless and mobile ad hoc networks. In this paper, it focuses on cross layer network design which is especially for wireless and mobile ad hoc networks. The main objective is to how cross layer differ from layered design, cross layer design approaches, challenges of cross layer design and implementation of cross layer design based MANET. And also this article brief the readers an overview of cross layer concept while discussing different cross layer proposals given by researchers
    • …
    corecore