The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
For the mobile ad hoc networks (MANET) security is a vital element. For providing security against malicious nodes all the researchers are striving specially and particularly on all the security challenges in the MANETs. Within these wirelessnetworks some special techniques have been propounded for secure routing protocols. Our propounded work presents a more effective outcome to mitigate black hole...
The use of recommendation in trust-based models has its advantages in enhancing the correctness and quality of the rating provided by mobile and autonomous nodes in MANETs. However, building a trust model with a recommender system in dynamic and distributed networks is a challenging problem due to the risk of dishonest recommendations. Dealing with dishonest recommendations can result in the additional...
Mobile Ad Hoc Network has been widely used in disaster areas, war zones, deep sea and other areas where the network infrastructures are difficult to be established. However, when the mobile terminals increase heavily in Ad Hoc Network, it will cause signal conflicts. In this paper, based on TDMA time-division multiple access allocation scheme, a MAC scheduling protocol algorithm is designed for multiple...
This paper studies the fault management in mobile ad hoc networks. We focus on schemes which provide the robustness in MANETs: service restoration and service protection. Firstly, we propose an analytical comparison of service restoration, in terms of restoration time, at the routing layer (reactive and proactive protocols). Service restoration with reactive protocol is the most suitable in MANETs...
Trust quantification methods depends on the deployment region, network applications, level of security required. Considering the environment of mobile ad hoc networks, in this study we propose a new trust model. This new model is divided into two parts: trust assessment and trust prediction. The process of node trust assessment is based on node's historical behaviors, in which the trust decision factors...
Multicasting in Mobile Ad hoc wireless Networks (MANETs) is a big challenge and a significant issue. Due to limited bandwidth and dynamic nature of ad hoc wireless networks, it is required that a multicast routing protocol should be efficient and effective. Existing tree-based and mesh-based multicast routing protocols are not suitable under multiple constraints. Ant Colony Optimization (ACO) is swarm...
Providing security for Dynamic Cluster based Mobile Ad-hoc networks (MANET) is a vital task to improve network security with less compromising mobility and with reduced dedicated Data occupancy. Key generation, distribution and authentication are major tasks of a key management system. A flexible and strong model is required to handle key management since dynamic ad-hoc networks are more prone to...
Data Caching on mobile clients is widely seen as an effective solution to increase data availability. A population is a “group of plant, group of people, and group of animal etc.” all is same species that live together and reproduce. Here a group of cached data items at clients in mobile ad hoc network called Group of Cached Data items (GCD). In this paper, the growth rates of cached data items at...
Connectionless multicast protocols are well suited for networks with a large number of small multicast groups. These protocols however do not scale with large groups, and are not robust for high mobility. We proposed a connectionless multicast protocol named MCOM that addresses the issues of mobility, scalability, and robustness. The MCOM protocol design allows for better scalability by group size...
Performance evaluation of mobile networks needs accurate simulation set up including realistic characteristics. The most important issue in mobile networks' simulation is the mobility of the nodes. Since mobile nodes usually are carried by humans, thus, nodes mobility should be modelized as human movement. To the best of our knowledge, none of the existing mobility models have the ability to modelize...
Mobile Ad hoc Networks (MANETs) have seen vast application and continuous development. A good number of protocols have evolved to perform efficient routing in MANETs in order to improve the communication. Two protocols Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks (CORMAN) and Proactive Source Routing (PSR) have been implemented for MANETs and their routing performance have been...
An analytical method is presented for finding the optimum transmission range in finite tactical mobile ad hoc networks(MANETs). The results are particularly useful for the operation of military networks, as the transmission range affects throughput, delay, and interference. Plus, the proposed method allows the optimum transmission range to be determined in advance when deploying combatants with mobile...
Mobile Ad hoc Networks (MANETs) are used for node to node communications for a fixed purpose under mobile conditions. Different applications have found MANETs useful for communication tasks. The challenges while such a communication is performed are plenty. Although a number of protocols have facilitated the communication between mobile nodes, there is an unavoidable interruption in the network due...
Recently, a demand for mobile live streaming system has increased with the spread of smartphones. More and more people will enjoy watching video contents with a smartphone in the future. Cellular-WiFi hybrid network is a method enables users to cooperate with each other and watch video contents comfortably if they are in the range of Wi-Fi communication. In Cellular-WiFi hybrid network, each peer...
The mobile ad hoc network (MAENT) consists of is a self-configuring network without fixed infrastructure that its topology changes dynamically over time. Due to the inherent characteristics, MANETs are more vulnerable to attacks than wired networks. There are lots of approaches to detect malicious activities in these networks that build a static profile of normal activities and use the profile to...
In MANETs (mobile ad hoc networks), mobile terminals can connect with each other directly and constitute communication networks without network infrastructure such as base stations and access points of wireless LANs that are connected to wired backbone networks. Therefore, MANETs are expected to be tolerant networks in an emergency situation (e.g., large earthquake) in which most infrastructure is...
In the disaster-hit area, communication supporting systems using the existing mobile ad hoc network technique could not function as expected and communication would be interrupted from time to time, since they have not taken into consideration the issue of sleep, which is a very frequently used means for users to save their battery consumption. Especially, a phenomenon called sleep thrashing may occur,...
One major obstacle stunting the development and application of mobile ad hoc networks (MANETs) is the lack of a thorough understanding on the throughput capacity of these networks. Preliminary works regarding the exact capacity study of MANETs mainly focus on cell-partitioned networks, an oversimplified network model for practical MANETs. This paper studies the exact throughput capacity under a more...
In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks. Nevertheless, they are generally composed of limited resources and may behave in a selfish way. In this paper, we propose a trust model for reactive routing in MANETs. The proposed solution is founded on a mechanism inspired by the CONFIDANT protocol to install and update trust in the network. It fits...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.