The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack...
This paper first analyzes the mathematical model of mobile Ad Hoc networks by considering a weighted value of the ratio between sustainable energy and the total consumed energy of nodes in order to find a balance point between them. And it proposes a solution to the problem of energy efficient and load balance. Finally it presents some improvement suggestions to the AODV protocol.
This paper focuses on performance investigation of reactive and proactive MANET routing protocols, namely AODV, DSR, TORA and OLSR. MANET is a type of Ad Hoc network, and here its functionality is based on 802.11 IEEE standards to communicate in a discrete and disperse environment with no central management. Hence, the main investigation done in this paper is of the discrete feature and routing in...
The emergence of ubiquitous communication helps make safer and unobstructed street. Sensor detection is a valid technology to collect and process traffic data (vehicular speed, vehicle density, images from street) with the help of equipped sensors under the road or installed along the street. Vehicular sensor network (VSN), developed from wireless sensor network (WSN), is characterized by unlimited...
Redundancy is the key notion to bring robustness in the highly dynamic environment of the ad hoc network. Traditionally, the reactive MANET routing protocol brings repair process after a route failure, on the contrary, the multipath routing protocol proposes redundancy on a prefailure scheme so that repair of a route is done by on-the fly replacement. Another way to improve the communication resiliency...
In this study the author carried out an experiment to transmit a datagram through mobile node using ad hoc routing technique directly without using smooth handoff when forwarding to MN fails with DSDV protocol. DSDV. In case of using routing protocol, it showed almost as same performance as when no handoff occurred, and the number of MN could increase transmission delay but had little relation with...
One of the most important routing protocols used in ad hoc networks is AODV. This protocol is a reactive protocol that searches routes only when they are needed. It always exchanges control packets between neighbor nodes for routing. For reduction of control overheads and bandwidth consumption and make AODV usable for VANET, we have eliminated route discovery phase by restricting neighborpsilas distance...
In recent years, various types of ad hoc routing protocols have been studied in the mobile ad hoc networks. Specifically, the clustering hierarchical routing algorithms have been developed to increase the system performance. Hierarchical structure has inevitably brought some drawbacks, maintaining the hierarchical structure needs more complicated cluster heads selection algorithm, which may result...
The ad hoc network is a non-infrastructure mobile network that consists of many mobile nodes. Since the nodes have a mobility features in ad hoc network, the ability of communication between the nodes is limited by nodespsila power. The power consumption and bandwidth of each mobile node becomes an important issue and needs to be addressed. The paper discusses the energy efficient routing problem...
A vehicular network is a promising application of mobile ad hoc networks. In this paper, we introduce a near-optimal broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning...
A mobile ad hoc network (MANET) is a kind of self-configuring ad hoc network of mobile routers connected by wireless links. Vehicular Ad Hoc Networks (VANETs) are MANETs used for communication among vehicles, and between vehicles and roadside equipment. In order to create a new routing protocol applied to car-to-car networks, we define some parameters to evaluate the efficiency of some of the existing...
In this paper, we propose a social relation aware routing protocol for mobile ad hoc networks, which is designed for content sharing mobile social applications. Since a content can be shared by a group of users who have similar interests, the similarity of users' interests is a good metric to predict who will consume which contents. Shared interests can be exploited in routing and replication of content...
This paper presents evaluation and comparison of the CBR performance in different mobile scenarios generated by Random Waypoint (RW) model. To our knowledge, CBR performance in RW mobility is discussed. The impact of AODV and DSDV routing protocols on the CBR delay and drop rate performance is also discussed. Extensive simulation results and analysis showed that CBR has better performance over AODV...
To secure a mobile ad hoc network (MANET) in adversarial environments, a particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, particularly internal attacks, such as a Byzantine attack. In this paper, we propose a novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. The route-discovery...
Most of the researcher worked on routing protocol in mobile ad hoc network but very less work has been done in data access. Caching in frequently accessed data in multi hop environment can improve the availability and performance of the network. However designing efficient distributed caching technique is not an easy task because of the movement of nodes. Connected dominating set is a frequently used...
In this paper, we attempt to elongate the network lifetime by balancing energy usage, namely, allocating packets via multiple paths proportionally to the energy metric of each path. We propose the static and dynamic strategies of collecting energy metric values and allocating packets, and apply them to AOMDV. Performance comparisons of the proposed methods and original AOMDV are carried out in simulation...
Nearly all performance analysis results for ad hoc routing protocols use a model in which each node in the network moves independently. In most real environments, however, very commonly a group or multiple groups move under the direction of a group leader or group leaders rather as independent individuals. This paper presents the performance analysis of routing protocols for a mobile ad hoc network...
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive...
The goal of this work is to design a new adaptive routing technique for ad hoc wireless networks. This paper proposed the basic deign of the algorithm that works based on the principle of ant colony optimization (ACO). This is a probabilistic adaptive technique that changes its routes with the change of network topology over the period of time by learning its environment. It identifies appropriate...
Many works has researched on homogeneous ad hoc networks. This paper is focused on heterogeneous ad hoc networks. In such networks, two types of nodes are discussed. One type is location server which provides location service, and the other type is general node. A location server can be an individual device or be attached to a host which has the capabilities of providing location service. A location...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.