The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper,...
Routing in mobile ad hoc networks (MANETs) is central to their proper functioning. Network dynamics make the routing a real challenging task. Although a host of studies has been reported in the literature evaluating the performance of proposed routing algorithms, a deeper insight reveals some residual malfunctioning: wall effects, looping and inconsistency. In this paper, we first unleash the cover...
Mobile ad hoc networks are a wireless network in which each node is vested with the responsibility to act as a router. The individual nodes are constrained by the resources such as battery power. To achieve maximum throughput with the available resources the nodes might behave selfishly. This could lead to severe performance degradation in network throughput, packet delivery ratio, packet loss increment,...
A mobile ad hoc network (MANET) operates much depending on node's willingness to cooperate in the network. A node's misbehavior can have severe impact in overall network performance. One of the different kinds of misbehavior a node may exhibit is malicious packet dropping. In this paper, we focus on detecting and excluding nodes that misbehave by dropping some or all packets forwarded through them...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
The term Organic Computing is that the system you used having the Self-X properties and autonomously. Self-organization and self-configuration will be automatically performing some mechanisms after system constructed. Self-healing when the mal-function operates or damaged the system. Self-optimization when system found a way that could be better than it is now. And context-aware is that when the working...
Recent years, the mobile ad hoc networks (MANETs) research community has been very active. Thus, it is of growing importance to build distributed network applications on top of MANETs. DHT is known as a popular technique to build efficient distributed applications in the Internet. However, in MANETs, DHT needs to consider network traffics, moving of nodes and energy efficiency more carefully than...
In Ad Hoc network, the multi-hop networks as the characteristics of the dynamic changing of the interconnection topology make the routing very important. In this paper, an optimized scheme of SMR is presented, which allows the SMR having better performance in low-speed environment, especially can decrease the end-to-end delay, and also expands the range. At last, we compared our optimized scheme with...
Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The Integration of the MANETs and infrastructure networks such as Internet extends the network coverage and increases the application domain of the MANET. Communication between a mobile device in an ad hoc network and a fixed device on the Internet is achieved using gateways, which acts as...
This paper proposes a distributed energy-efficient routing algorithm for mobile Ad Hoc networks (MANETs). We adopt the cross-layer design paradigm. The distance from the source node to the destination node is estimated based on the received signal strength indication (RSSI) of the packets and is used to adaptively adjust the backoff time of the MAC layer. A distance threshold and a packet count threshold...
We propose multicast extensions to the flow oriented routing protocol (M-FORP) and node velocity based stable path (M-NVSP) routing protocol for mobile ad hoc networks. M-FORP predicts the link expiration time and connects the source to each of the multicast receivers through paths with the largest predicted expiration time. M-NVSP connects the source to each of the multicast receivers through paths...
Routing in mobile ad hoc networks (MANETs) is central to their proper functioning. Mobility in such networks makes the routing a real challenging task. Routes validity plays a central leveraging mission to enhance network performances. Forwarding through incorrect routes not only results in traffic wandering inside the network without ever being able to be delivered to their ultimate destinations...
Broadcasting, which usually incurs serious problems by flooding, is a common operation in MANET (mobile Ad hoc networks), especially in on-demand route protocol. In order to relieve such limitations, in this paper, we propose an improvement over the former blind flooding approach by using a scheme based on the mobility of nodes (MON). In MON scheme, we categorize mobile hosts into active nodes and...
The majority of the routing protocols designed and implemented to date for mobile ad hoc networks (MANET) rely on flooding of route requests for the establishment of routes on demand, flooding of topology information, or the hop-by-hop dissemination of distances or paths for each destination. The signaling overhead incurred with these strategies consumes excessive amounts of the scarce bandwidth available...
This paper presents heterogeneity ratio (HR) as a new routing metric for heterogeneous MANETs. This metric is the ratio of number of powerful nodes to hop count that is used to select the best path to destination. Node heterogeneity is modeled in terms of: types and number of different interfaces, power, and transmission ranges. Our proposed routing metric is based on developing route discovery algorithm...
We propose a node-disjoint multi-path extension to the location prediction-based routing protocol (LPBR-M) to reduce the number of broadcast multi-path route discoveries for mobile ad hoc networks. During a broadcast route discovery, the intermediate forwarding nodes include their location and mobility information in the Route-Request messages. Upon failure of all the node-disjoint paths learnt from...
Mobility of nodes and unreliability of wireless channel complicate the task of routing data in mobile ad hoc networks. Using multiple paths for routing instead of just one is an interesting approach to this problem, with the advantage of greater path availability at the cost of higher routing overhead. Existing multipath routing protocols generally involve the destination node in decisions about the...
Most location service approaches for mobile ad hoc network rely on one static server or number of mobile servers distributed over the network area. These approaches suffer from servers' failures which cause out-of-date information and hence, using expired location information of the service. In this paper, a solution of such failures is presented through an adaptive server availability mechanism....
This paper presents a new family of Interference routing metrics, ILR (interference level routing), ILRk (interference level routing to the power of k) and ILRth (interference level routing with a threshold value) for wireless ad hoc networks. Unlike conventional routing metrics, such as shortest path, these proposed routing metrics have been replaced with weight metrics that take into account the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.