The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In mobile ad-hoc networks (MANETs), nodes use hello messages to detect neighbor nodes and to maintain link connectivity. In a typical MANET routing, a node broadcasts hello messages at a fixed interval. However, a fixed hello interval causes a long delay of neighbor discovery (too long hello intervals) or a more bandwidth waste by unnecessary protocol overhead (too short hello intervals). In this...
On-demand routing protocols for Mobile Ad Hoc Networks (MANETs) have been extensively studied. Generally, on-demand routing protocols establish routes by flooding route requests throughout the entire network, which is not a scalable approach. On the other hand, geographic routing protocols do not establish route a priory but route data packets in a greedy fashion towards the destination. When a packet...
In MANETs, link failures are caused frequently due to node's mobility and use of unreliable wireless channels for data transmission. Multipath routing strategy can cope with the problem of the traffic overloads while balancing the network resource consumption. This article proposes an improved approach named DNDR (Dual Node-Disjoint Paths Routing) to enhance the network reliability and robustness...
MANETs is a collection of mobile nodes. There infrastructure is neither fixed nor has any control station. So it is affected by various types of malicious attack. AODV is a standard MANETs protocol so every malicious node tries to attack on this routing protocol. A black hole attack is a type of malicious attack in which black hole node replies to route request packet with the highest destination...
Mobile ad-hoc sensor networks (MASNETs) have promised a wide variety of applications such as military sensor networks to detect and gain as much as possible about enemy movements and explosions. Most of these applications can be deployed either in static or mobile environment. In static WSNs, the change of sensor nodes topology is normally caused by node failure which is due to energy depletion. However,...
Dynamically changing network conditions pose a challenge for routing in Mobile Adhoc Networks (MANETs). The network conditions like topology, node density, energy constraint makes difficult to decide which protocol suits best for the scenario. The routing in MANETs exploits Proactive and Reactive Routing. Proactive routing provides better packet delivery while Reactive routing has low overheads. Thus,...
This paper discusses an enhanced AODV routing protocol as a method for defence against JellyFish (JF) Delay Variance attack in Mobile Ad-hoc networks. The JF delay variance attack introduces delay in forwarding the packets at network layer. It uses MAC addresses to calculate the route for forwarding the packets to destination. The attacker node creates delay in forwarding the packets, which increases...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
In recent years, MANETs have been developing rapidly and are increasingly being used in many applications, ranging from military to civilian and commercial uses. The security has become one of the primary concerns as MANETS are being used widely. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key is necessary to be shared between the sender and the receiver...
A Mobile ad hoc network is a collection of mobile nodes connected through wireless links forming an temporary network without fixed topology, centralized access point, infrastructure. In such a network, each node can act as a router and host simultaneously, it can move out or join in the network freely as required. Various routing protocols have been discussed so far in this paper a brief comparison...
Non-geographical routing protocols have difficulties to scale to large scale MANETs composed by hundred of nodes. Geographical routing protocols have the drawback of requiring an extra component, normally a GPS device, to gather localisation data. In this work we analyse the performance of a new routing protocol, HRAN, which is scalable to large networks. HRAN is suited for nodes with limited resources...
In a public network, it is unlikely for a node which has limited resources to collaborate without gain. For avoidance of the fact that nodes refuse to cooperate in MANET, several schemes classified as reputation-based and credit-based, are considered suitable for ad-hoc networks, whereas many of these schemes are based on proactive or reactive routing protocols but none of them is based on a hybrid...
This paper presents a detailed simulation study of Dynamic Source Routing (DSR), Optimized Link State Routing Protocol (OLSR) and Zone Routing Protocol (ZRP) in different mobile scenarios generated by Random Waypoint model for Mobile Ad hoc networks. The impact of these routing protocols is evaluated with respect to Average End-to-End Delay, Average Jitter, Average Throughput, Normalized Routing Load...
This paper presents a comprehensive simulation study of well known On-demand routing protocols Ad hoc On demand Distance Vector (AODV), Table-driven routing protocol Destination Sequenced Distance Vector (DSDV) and Hybrid routing protocol Zone Routing Protocol (ZRP) in different mobility scenarios generated by Random Waypoint model. The performance of the three routing protocols is analyzed with respect...
Ad hoc networks have been proved to be suitable for disaster scenarios since any infrastructure need to be deployed in order to establish a wireless network. Routing protocols play an important role in the performance of mobile ad hoc networks. Routing protocols are responsible for deciding how the information is going to move through the network. Although one paramount parameter of ad hoc networks...
In this paper, we investigate the pertinence and the relevance of the modeling of proactive routing in mobile ad hoc networks (MANETs) under the OMNeT++ simulator. In such dynamic networks, the constantly changing topology affects the validity of the established routes as time elapses farther from the start of the routing period. In OMNeT++, as is indeed the case of all the other network simulators,...
Mobile ad-hoc networks (MANETs) are autonomous distributed networks, where mobile nodes communicate with each other using wireless links. Since the communication is done by wireless links, it is difficult to grasp how the packets flow between communication nodes. It becomes even more difficult when the number of nodes is increased. In our previous work, we proposed a visualization system for MANET...
Geographic routing protocols have imposed significant challenges for Mobile Ad hoc NETworks (MANETs) to achieve scalability. These routing protocols use location information of mobile nodes in forwarding decisions. However, geographic routing protocols require location management services that handle the location updates sent by nodes and resolve their queries. Most of the location services found...
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
Reactive routing protocols in Mobile Adhoc Networks (MANETs) rely on the discovery process to establish routes between the communication peers. The discovery process employs data flooding to propagate the routing control messages in the network. This process is very costly in terms of packet collisions, network contention and routing overhead, which significantly impacts the network performance. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.