The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications...
In this paper, we propose a multi-band multi-channel adaptation algorithm to enhance the performance of single-hop mobile ad hoc networks (MANETs) running the IEEE802.11 standard. The algorithm takes into consideration medium contention, coverage range and obstacle penetration in selecting both the operating band and the channel within the selected band. Applying the algorithm, a MANET with its usual...
The paper presents a brief overview of routing protocols in wireless ad-hoc networks. The main focus is on solving security issues. We conclude that the concept of trust is fundamental in the design of secure routing protocols today. Based on SAR (Security-Aware Ad-hoc Routing) protocol, we propose a role-based approach to secure routing. This approach enhances the flexibility and security of information...
Within Mobile Ad-Hoc Network(MANETs) unusual categories of routing protocols have been determined. It is a group of wireless system. MANET is other susceptible to a variety of attack than wired system. Black hole attack is further meticulous intimidation to MANETs. The routing protocols of MANET is less protected and therefore consequenced the system with malicious node. There are various routing...
On-demand routing protocols are the most commonly used protocols for the MANETs. It is the dynamic protocol and suitable for many applications. Wireless mobile adhoc networks have gained a lot of significance in wireless communications. The data transmission between the nodes in the wireless communication was established by adopting the routing protocol. The node in mobile ad-hoc networks acts as...
Flooding is the simplest way of broadcasting, in which each node in the network retransmits an incoming message once. Simple flooding technique in wireless Ad-hoc networks causes the broadcast storm problem. However, this technique is inefficient in terms of resource consumption such as bandwidth and energy. This paper presents a new hybrid scheme that combines different techniques that collaborate...
Mobile Ad hoc networks (MANETs) is wholly a wireless community with a dynamic nature of position and network topology, which may change instantaneously with respect to time and application demand. Mobility factor of mobile nodes not only open gates for various applications but give big reason of packet loss. Transport Layer protocols like Transmission Control Protocol (TCP) have been designed for...
This paper presents a novel multicast routing protocol for wireless mobile ad hoc networks (MANETs) that uses distribution trees to efficiently forward multicast traffic. The proposed multicast routing protocol is built as a MANET extension to the popular Protocol Independent Multicast (PIM) routing protocol used in wired networks; hence, we call our scheme PIM-MANET. Similar to PIM, PIM-MANET is...
A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selective with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to...
A wireless navigation system (WNS) is proposed that autonomously coordinates the motions of cooperating robots. The proposed WNS employs both Bluetooth technologies and wireless routing protocols that can discover routes around obstacles and other barriers to communications. A time-slotted, ad hoc on-demand distance vector routing (TAODV) protocol is designed to maintain secure, wireless communication...
A novel approach has been introduced in this paper to detect and avoid black hole nodes during formation of reliable path for wireless data transmission. A valid acknowledgement is transmitted to the data packet sending node and its predecessor connected node. A trusted routing table created with valid acknowledgement receiver node. Secure data transmission is dependent upon the trusted routing table...
Mobile ad-hoc networks allow communication between mobile nodes without the existence of an infrastructure, so they are adaptable also in hostile environments. Using the wireless communication leads to a lack of security. Due to the characteristics of mobile nodes, they have batteries as power source, so their energy is constrained. A routing protocol for MANETs has to take into account this constraint,...
A wireless ad-hoc network is a collection of nodes that are dynamically and arbitrarily located in such a manner that the interconnections between each node are capable of changing on a continual basis. In this paper, we provide a novel way to improve node interconnects without changing the overall network topology by allowing nodes to have limited mobility. Received signal strength (RSS) measurements...
Peer-to-peer file sharing routine in mobile ad hoc networks (MANETs) adapts to the opportunistic nature in lieu of disconnected Manets on the other hand fails to consider the social interests of mobile nodes voguish widespread site, which can be subjugated to mend the file searching efficacy. We put forward, SPOON (Social network based P2P content-based file sharing in mObile ad hOc Network) shares...
The traditional Ad Hoc routing protocols do not scale well in heterogeneous networks, since they have not been designed to exploit different communication capabilities of network nodes. Building a heterogeneous hierarchical structure is a promising approach to achieve higher scalability in heterogeneous Ad Hoc networks. In this paper, we propose a novel heterogonous routing protocol based on DSDV,...
In this paper, we address an important problem in mobile ad hoc networks, namely, the intrinsic inefficiency of the standard transmission control protocol (TCP), which has not been designed to work in these types of networks. After an initial training phase, we predict the mobility status of the network through a probabilistic approach, and we propose a series of ad hoc strategies to counteract the...
The advancement in wireless technology in the present era have created networks with low cost and low power consumption. One of such networks which exist is called as Mobile Ad-hoc network which is characterized by wirelessly connected nodes with frequent change in network topology. As the nodes are connected wirelessly a routing mechanism (routing protocols) is required for successful transmission...
There are serious security issues in mobile ad hoc networks due to its wireless transmissions. The fact that mobile ad-hoc networks (MANET) lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks. The paper proposes protocols which will protect ad hoc networks from blackhole and wormhole attacks and to improve network stability...
This paper addresses security and performance issues of MANET. A novel cluster oriented concept is proposed to enhance security and efficiency of the network. Proposed strategy insures the optimum performance of MANET in presence of black hole attack. The simulation of the proposed methodology is carried out using NS2 network simulator and the simulation results reflects the performance of scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.