The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot of attack but introduce only collaborative black hole and worm hole attack. A group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. When two malicious node is create a tunnel is called worm hole attack...
Mobile ad-hoc network have been innovated in communication network as introduce to wireless environment with dynamic scenario where infrastructure existence based on on-demand. MANET network has been easily set upped as veridical key stone of dynamic wireless environment with self configuring at low prices in compare to wired network. Due to roving and movable behavior of the node, MANET network are...
Ad hoc communications are attracting more and more attention in today's research and technology, because of low cost implementation, and simple initialization procedures. They are being projected to be used in several fields such as collaborative computing and disaster recovery environments. However, route instabilities and scalability are issues that still need to be addressed. In this paper we implement...
Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major...
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile...
All major mobile communication architectures are mainly centralized. When the mobile devices are switched on it will search for nearby base station or access point. The content being searched is mostly stored in a centralized directory manner. Peer-to-Peer platform can be one of the best possibilities to overcome the restrictions and resolve issues incurred due to centralization. Mobile environment...
Peer-to-peer file sharing routine in mobile ad hoc networks (MANETs) adapts to the opportunistic nature in lieu of disconnected Manets on the other hand fails to consider the social interests of mobile nodes voguish widespread site, which can be subjugated to mend the file searching efficacy. We put forward, SPOON (Social network based P2P content-based file sharing in mObile ad hOc Network) shares...
The paper presents mechanism of detection and isolation of sinkhole attack in MANET, substitution of routing protocol to enhance network capability after grievous attack. However, the open shared wireless medium and dynamic nature of MANET makes their routing protocols vulnerable to attacks. First, we analyzed an ad hoc on demand routing protocol over sinkhole attacks. After that use of multi path...
Information technology plays an important role in facilitating disaster management and allowing planners for a more efficient disaster handling. Climate change can reasonably be expected to increase countries' vulnerability to natural hazards in future. We are already witnesses of extreme meteorological phenomena, such as expanded fires and floods. This paper gives Mobile Ad-Hoc Network (MANET) along...
Now a days there is a remarkable growth in telecommunication technology which makes users of mobile electronic devices accessible to a communication network. These electronic devices are nothing but the nodes of the Mobile Ad hoc Network (MANET). Each node can move from one place to other during communication and this mobility is having its effect on performance of the network. Mobility changes when...
The objective of the work is to improve the mechanism for selecting trust nodes which will participate in the key generation process for secured group communication in a distributed environment like MANET. The selection is proposed in two stages, the first phase adopts clustering technique to identify trust worthy nodes across the network and the second phase makes use of the backtracking approach...
Mobile adhoc networks (MANETs) consist of mobile nodes with no fixed infrastructure. Dynamic Source Routing (DSR) which is on-demand routing protocol is a widely accepted mobile adhoc network routing protocol used to provide connectivity to mobile nodes. However, DSR and other on-demand routing protocols are vulnerable to different types of security attacks and black hole attack is one of them. In...
Mobile ad hoc networks (MANET) are self-configured and self-maintained network without any central authority. In MANET the route discovery from source node to destination node is a critical issue due to frequent changes in network topology and mobility of nodes. The MANET consists of problems such as load balancing, scalability, stability, reliability security and robustness. It is therefore necessary...
Mobile ad hoc network is a collection of mobile nodes which are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. This paper examined routing protocols by varying CBR traffic but having identical...
This paper presents the revision of our concept to improve the public key infrastructure deploy ability and service reach ability in the mobile ad-hoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node's trust-worthiness...
Multicast routing is more effective than unicast routing as it transmits a single copy of message to all its group members within single transmission. Multicast routing protocols require the individual nodes to maintain the state information, as they typically rely on the creation of multicast tree or mesh. Maintaining this state information creates a large amount of communication, processing, memory...
Ad-Hoc network is the ultimate solution for mobile (movable) user's network. Now a day the huge growth of mobile users in network, so such infrastructure less (MANET) network are needed. Mobile Ad-Hoc Network (MANET) is a collection of mobile device, multi hop and self configured network. In this infrastructure less (MANET) network the routing is a challenging work, because there is no fixed device,...
MANET is gaining more popularity due to two main characteristics, dynamic topology and no requirement of centralized administration. But due to these two properties, MANET is highly prone to various security attacks. One of the most important categories of attack is the Denial of Service (DoS) and the most important attacks under this category are the Blackhole and Grayhole Attacks. Lot of research...
Service discovery is an integral part in establishing an independent and self-organizing mobile ad-hoc network(MANET). In this paper a new distributed semantic service discovery scheme is proposed for MANET consisting of various mobile terminals. The proposed scheme based on the proactive routing protocol, Destination-Sequenced Distance Vector (DSDV), maintains the information on the network in the...
Recently, mobile devices have become increasingly affordable, reliable and pervasive in contemporary society. Meanwhile, cloud computing is playing an increasingly role in people's daily life. Together with these two promising technologies, Mobile Cloud Computing (MCC) has been introduced as a potential technology in future. However, since the mobility of cloud users in MCC, service availability becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.