The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANETs are a group of wireless computers which do not have pre-existing infrastructure in the form of communication network. Administration of these kinds of networks are not dependent on any special user. There are many problems in the creation of MANETs. such as routing in wireless media, power consumption, transportability and efficiency. Here we have concentrated mainly on the importance of efficiency...
Mobile Ad Hoc networks (MANET) are essential in situations where no communications infrastructure exists and the communicating entities are mobile. Design of such MANETs face serious challenges due to the dynamic topologies resulting in frequent route breaks and failed medium access attempts as nodes move and in some cases due to lack of scalable solutions as the number of communicating nodes increase...
In mobile ad hoc networks (MANET), due to rapidly changing network topology, routing break occurs frequently. Ad hoc on-demand distance vector adaptive backup with local repair routing (AODV-ABL) protocol creates and maintains backup routes to the destination node by overhearing data packets to increase the success rate of repairing invalid routes. However, AODV-ABL may lose some backup routes with...
Nowadays dynamic networks have been growing and have made mobile ad hoc network (MANET). One of the most important tasks in mobile and dynamic environments is service discovery, i.e. how a client can use his service of interest. Context information that show status of entity, play important roles for service discovery. In this paper, we propose a context aware and group based service discovery solution...
In this paper, we present the impact of mobility on our scheme called Location-based Routing with Adaptive Request Zone (LoRAReZ). In LoRAReZ, the size of expected zone and request zone are set adaptively based on the distance between the source node and destination node. We evaluate the impact of mobility on the performance of LoRAReZ in terms of packet delivery fraction, routing overhead, end-to-end...
The need for communication is highest in disaster scenarios when the infrastructure is also adversely affected. A recent protocol for ad hoc communication, the BATMAN protocol, is dependent on minimal infrastructure, in the form of mesh nodes that are used as access points, or nodes acting as an intermediary in a multi-hop connection. While BATMAN works well in a scenario in which there is a multihop...
Mobile peer-to-peer networks combining a mobile ad hoc network underlay with a peer-to-peer overlay offer a flexible means for providing communication services in absence of a communication infrastructure. However, mobile peer-to-peer networks inherit several challenges from the underlying architectures as, e.g., strongly limited resources and a highly dynamic topology. Due to this, the overlay has...
Wireless ad hoc network is an infrastructure less, self organized, multi hop packet switched network. In an ad hoc network, node movement results in dynamic topology and cause link failures. In this paper, we are using packet scheduling technique for Ad Hoc on Demand Distance Vector (AODV) routing protocol. We are using weight hop based scheduling for AODV routing protocols. In this paper, intermediate...
Packet forwarding in a multihop wireless network is always prone to jeopardy by the selfish behavior of participating nodes striving to save scarce energy resources. There are many mechanisms which offer appealing incentives to a node in order to instigate cooperation. These incentives are rather unnatural or in some cases the nodes are allured to adapt a tempered proof policy. In this paper, a natural...
In this paper, effects of non-line of sight propagation in an urban-street environment on routing performance in mobile ad hoc network are investigated. We implement a reliable propagation model in network simulator (NS2) named peer to peer propagation model which has been proved to be suitable for our street-grid environment by taking into account non-line of sight paths. Our simulation result shows...
In this paper, we study information propagation in a 2D mobile ad-hoc network, where mobile nodes are randomly and independently distributed on a torus following a homogeneous Poisson process with a given density. Nodes in the network move following a random direction mobility model. A piece of information is broadcast from a source node to all other nodes in the network, using a Susceptible-Infectious-Recovered...
Security and quality of service (QoS) are two areas of mobile ad hoc network (MANET) research which have so far been largely carried out separately. Some of the unique characteristics of MANETs make them extremely vulnerable to security attacks, and these attacks have a direct impact on QoS provisioning. We therefore argue that integrating security and QoS may be the most effective way of providing...
A critical challenge for mobile ad hoc networks is the design of efficient routing protocols that are able to provide high bandwidth utilization and desired fairness in mobile wireless environment without any fixed communication establishments. While extensive efforts have already been devoted to providing optimization based, distributed congestion elusion schemes for efficient bandwidth utilization...
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black...
Disruption-tolerant networks (DTNs) have gained great attractions recently by addressing intermittent network connectivity suffered due to short radio transmission range, high node mobility, sporadic node densities, etc. Data communication across DTN is achieved over store-carry-forward (SCF) paradigm by exploiting temporary wireless links and connections opportunistically arising from mobility nature...
Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges...
Traceback technique is useful to identify the source of an attack. Several types of traceback schemes have been proposed for wired networks. But most of them are not suitable for mobile ad hoc networks (MANETs) due to limited resource and dynamically-changing topology. Among all of existing schemes, probabilistic packet marking (PPM) scheme might be the most promising scheme for MANET because it is...
The lookup mechanism used to locate services in Peer-to-Peer systems can be attacked with little effort due to its decentralized and self-organizing nature. Security mechanisms aiming at rendering the lookup mechanism more robust mostly require a high amount of network resources. These mechanisms cannot be applied without adaptations when network resources are limited. In this paper, we introduce...
Traffic analysis is considered the most powerful strategy of disclosing the hidden communication relations in an anonymous communication system. Statistical traffic analysis attacks are even more subtle in that the attackers are usually eavesdroppers who do not modify the network's behaviors. Moreover, the attackers even do not need to look into the traffic content, which may be encrypted, in order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.