The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, many routing protocols that take into account particular vehicular ad hoc network (VANET) characteristics such as higher vehicle speeds and mobility patterns have been proposed. Most of the existing VANET routing protocols largely neglect vehicles as obstacles in VANETs. Obstacle shadowing caused by large vehicles such as trucks or buses more negatively affects packet transmission...
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route...
In Ad-hoc networks, routing is complex as nodes are mobile due to which paths are destroyed and generated again and again. The difficulty in MANET is to find a feasible path between communicating nodes as routing is non-deterministic polynomial hard which is due to mobile nature of nodes. Many past works focused on finding a feasible path from a source to destination by considering only a single parameter...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Due to advancement within the telecommunication, wireless communication, wireless sensors, and different technologies a replacement field of analysis has been evolved and this space of analysis is termed as Wireless Body space Networks. In WBAN miniaturized device nodes are planted within the blood stream or on the flesh. These device nodes are battery dependent, once the battery dies, node additionally...
Vehicular communications can be achieved through the infrastructure (Vehicle-to-infrastructure network, V2I), as well as directly through vehicle-to-vehicle communication (V2V) via ad hoc networks. In V2V communications, the routing protocols are designed in order to optimize the dissemination of messages. This paper presents an evaluation of routing protocols such as the Optimized Link State Routing...
In this paper we consider the selection and deployment of MANET protocol to efficiently route the traffic and communicate in Tactical Battle Area (TBA). Tactical Wireless Communication Network (TWCN) provides connectivity between Wide Area System (WAS) of TWCN nodes, forming a backbone transmission network. TWCN is for TBA that consists of Network Centric Systems. These entities impose routing challenges...
Indeed, MANET's are an emerging technology, evolved to provide users with facility to establish Ad-hoc networks for seamless communication. Routing is a major issue in MANET's. AODV is considered as one of most efficient routing protocol in MANET's but, its performance is adversely effected by various security attacks. A routing protocol can be attacked in many ways so as to disrupt the routing process...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
In Mobile Ad hoc Network (MANET), mobile node is responsible for the route establishment using a wireless link where each node behaves like both, as a host and a router. There are number of security threats in MANET possible because of its open untrusted environment with the little security arrangement. Among all of the security threat, a worm hole is considered to be a very serious security threat...
A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data...
Mobile ad-hoc networks are infrastructure less networks. MANETs are constructed without any base station, tower, router and switches. Bandwidth, memory size, processing capacity and Battery lifetime is also limited in MANET. The remote connections in this system are profoundly mistake inclined and can go down much of the time because of portability of hubs, impedance and less framework. Along these...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
Characteristics of Mobile ad hoc networks are high mobility and frequent link failures that result in low throughput and high end-to-end delay. Multipath routing is an attractive option to reduce the number of route discoveries due to such broken paths so that alternate paths are available. Existing approaches to multipath routing employs pre-computed routes determined during phase of route discovery...
Wireless nodes in MANET present stringent resource constraints such as limited battery power and storage capacity, so energy aware cross-layer design is essential to improve the battery life. For prolonged network operational time, energy conservation is a critical issue in routing protocol design in ad-hoc wireless networks. Regardless of the energy saving issues, the conventional AODV routing protocol...
In this paper, an efficient routing protocol for patient monitoring system in rural areas was proposed using wireless sensor network (WSN) so that the patients can be treated within less time. In this system, a village with GSM network is considered and the people in that village are continuously monitored using AMON sensor, an advanced medical monitoring and alert system. All the AMON's work in ADHOC...
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
MANET is a self-sorting out, decentralized, framework less, multi hop, remote system of cell phones. routing protocols assume a crucial part in transmission of information over the network. Streaming video is content sent in packed frame over the Internet and showed by the viewer continuously. Mobile Ad hoc Networks are considered for some applications. Routing protocols are the most imperative component...
Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of many mobile nodes. The topology may get changed due to higher mobility. The security is another aspect which is very low. Routing protocols are used for transferring the data packets. Due to high vulnerability in security, many...
Developing with the node communication ability, the demand of ad-hoc networking has been turned from the terrestrial nodes to the air vehicles. In this paper, we discuss the composition of the communication system that can satisfy ad hoc network which node in this network has high speed (more than 100m/s), and long distance (10km-40km) to each other. Since the project is used in reality, the system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.