The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
Mobile ad hoc Network (MANET) consists of autonomous mobile nodes without any centralized control. These mobile nodes move arbitrarily within the self-configurable MANET environment. Each of these mobile nodes can act as router while receiving and forwarding information. Secure routing is an important issue in MANET as mobile nodes are prone to attacks from malicious nodes and the overall performance...
For making Mobile ad hoc network (MANET) more energy efficient swarm intelligence is used as a base and the clustered based approach as Bee-Ad Hoc-C which is an evolution from Bee-Ad-Hoc has been chosen as the best method in our previous work along with Stable Cluster Maintenance Scheme. In the proposed method parallel routing has been considered to improve the scalability of the system, reduce the...
Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node. The absence of centralized administration and openness make MANETs...
Adhoc networking field has been interestingly accepted by the research society due to its surprising features. Almost every aspect of the network has been explored by the researchers at some level of detail. A lot of analyses/ surveys have been presented in the literature for showing the performance of well accepted adhoc routing protocols viz. AODV, DSR, AOMDV, CBRP etc. This paper presents some...
As per need of recent applications, new research aspects related to scalability, heterogeneity, and power consumption have been emerged. These issues are supposed to be fixed for better utilization of MANETs. MANET nodes interact through multi-hop routing. AODV is a commonly used on-demand protocol for routing in MANETs. In the existing literature, AODV has been analyzed a number of times but heterogeneity...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Routing security challenges significantly impact the wide-scale adoption of mobile ad hoc networks (MANET), with wormholes constituting an especially severe threat. Wormhole detection algorithms like traversal time and hop count analysis (TTHCA) and modified transmission time-based mechanism (M-TTM) combine effective detection with low traffic overheads. TTHCA measures packet traversal time (PTT)...
Mobile ad hoc networks (MANETs) are temporary networks which are formed for a specific purpose. They are infrastructureless, autonomous and entirely distributed systems where different wireless mobile nodes are capable of arbitrary movement and power switching without breaking the network connectivity since it is physically possible. In these networks, nodes must operate both as hosts and as routers...
TCP — Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
This paper proposes a new multipath protocol, Low Energy Consumption Stability and Energy Aware Reverse Ad hoc On-demand Distance Vector (LEC-SEAR-AODV) Routing Protocol. This is a modification of existing SEAR Ad hoc On-demand Distance Vector (SEAR-AODV) Routing Protocol. The LEC-SEAR-AODV uses the path with high RF value as the primary path to route the data packets whereas secondary paths are used...
MANET technology develops when the mobile device users are faced situation without support of a fixed network infrastructure. This technology allows communication without a fixed infrastructure. The high mobility in MANET network makes it very vulnerable to attack. Attacks in MANET can destructive routing scheme formed by routing protocols. This study designed a MANET network using AOMDV (Ad Hoc on-demand...
Wireless data transfer between mobile users has become more popular nowadays. In Mobile Ad-hoc Network, mobile nodes communicate with each other through the wireless medium, within the transmission range. If we use the data access applications in the wired network, the physical cabling in the wired network is restricting the connection topology and the bandwidth. But there is no such a restriction...
In our basic model, we study a stationary Poisson pattern of nodes on a line embedded in an independent planar Poisson field of interfering nodes. Assuming slotted Aloha and the signal-to-interference-and-noise ratio capture condition, with the usual power-law path loss model and Rayleigh fading, we explicitly evaluate several local and end-to-end performance characteristics related to the nearest-neighbor...
When some wireless networks are formed only for a particular purpose, they are the Mobile Ad-hoc Networks (MANETs). They do not depend on any access point for communication; they self-organize, and change topology dynamically. A routing protocol is necessary to help a node discover the routes to other nodes of the network and enable its communication with them. Each routing protocol tends to find...
Broadcasting is the primary procedure employed in Mobile ad hoc network for different kinds of functions like sending data and route discovery. Simple flooding is the direct method for broadcasting which can degrade the network performance. To resolve the broadcast storm issue which potentially leads to contention, collision and replicated messages, recently a new probabilistic approach has been proposed...
In Ad hoc networks, there is no central infrastructure but it allows mobile devices to establish communication path. Since, there is no central infrastructure and mobile devices are moving randomly, gives rise to various kinds of problems, such as security and routing. Here the problem of routing will be considered. In this work, a new Route Selection Technique for AODV will be proposed that selects...
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. In a distributed Mobile Ad Hoc Network (MANET), collaboration and cooperation is critical concern to managing trust. The networks work well only if the mobile nodes are trusty and behave cooperatively. Due to the openness in network topology and absence of a centralized...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.