The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents simulation results for a mobile ad-hoc network running Dynamic Source Routing reactive protocol under the conditions of limited availability and heightened response times of network nodes. Authors conclude that dynamic source routing stops being efficient in large networks and propose a hybrid routing protocol that includes the proactive phase and uses availability criterion...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
Mobile devices supported by mobile ad-hoc network (MANET) make possible communication and coordination among mobile devices during emergency situation. In this paper, we develop a prototype of Android-based application that work using MANET. The prototype has purpose to provide communication and information required for search and rescue operations for emergency scenarios. There are several emergency...
Routing decisions are often susceptible to failure in Mobile Ad hoc network (MANET) because of the special characteristics like dynamic topology and lack of central coordinator. Network topology changes very frequently due to the random movements of nodes and it is not predictable. The lack of central coordinator for controlling and managing the operations, often leads to very serious problems like...
Recently demand of mu Itimedia application is growing rapidly in real time application such as video streaming. Multimedia applications demand for high quality of service for end user experience. In this field of multimedia communication Mobile-Ad-Hoc network has proven its significance to provide better Quality Of Service (QoS). MANETs consist of mobile nodes which are self-configurable and self-organizing...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANET (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
This paper presents method for acquisition and processing status data of mobile devices. In this research smartphone, tablet PC, VANET or MANET nodes are regarded as mobile devices. The proposed method utilizes gathering information about state of hardware modules and network around the mobile device. Then the acquired information is processed in order to determine the metrics of mobile device which...
Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to...
As the practical propagation environment suffers from various fading, investigation of a suitable routing protocol for this type of environment is need of the day. Many routing protocols have been evaluated for idle conditions but none of them have taken actual physical environments such as fading, etc. into consideration. In this paper, that particular Issue has been addressed. Three most popularly...
The advent of Vehicular Ad Hoc Networks (VANETs) has made communication and information exchange between vehicles possible. This has allowed us to create mobile distributed applications running on VANET and has also brought forward several new challenges in distributed algorithm design. Among these algorithms, here we are interested in the snapshot algorithms, which are used to recover an application...
Mobile ad-hoc network is networks that are collection of mobile device that can communicate and share information between each other, without any predefine infrastructure or centralized system. Another challenge in MANET is energy constraints because each of the mobile nodes is operated by limited energy battery. This paper presents a new on-demand power saving routing algorithm for mobile ad-hoc...
Security is the main issue of the mobile ad-hoc network, because of mobile nodes behavior. The topology of MANET changes frequently due to nodes mobility, by this property newly node easily enters or exit from a particular area. In this paper, we go through the study about mobile ad-hoc network and role of soft computing in this network. In our proposed work we apply Dempster Shafer theory for calculating...
In MANETs node's battery energy and stability of the links are often affecting the communication activities in network. These two factors are one of the main reasons which are responsible for the loss of data packets and occurrence of congestion issue that networks are facing toady. In order to overcome these issues we are proposing an approach known as Efficient and Stable Multipath Routing in MANETs...
Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node. The absence of centralized administration and openness make MANETs...
Mobile ad hoc networking may be used to accomplish different tasks at several applications fields with a variety of purposes as healthy care, defense, crisis management and others emergence situations. In common, they all require quick deployment, dynamic communication and security assurance. Although a lot of effort has been taken concerning the security aspect, it is hard to achieve information-theoretically...
There are lots of work done in a mobile ad-hoc network for enhancing its security still there are some issues regarding security. In this paper, we study about the mobile network and various techniques by which network prevents attacks. In our proposed work we apply the trust method which calculates by dempsters shafer theory, after trust calculation we apply support vector machine to classify nodes...
The Mobile Ad-hoc Network (MANET) is a volatile network, the nodes are in the movable state. The node can easily enter and exit from the network. The attacker node can easily enter into the network and affect the performance of the network. The malicious nodes are difficult to detect as any node can enter into the network easily. The detection of the malicious node is very important to secure and...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.