The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the main issues in MANET is security. Since MANET characteristics are dynamic, it make vulnerable to various severe attacks. Cryptography can provide a strong solution for most vulnerability. Various approaches are discussed in the literature review. From them, ID-based cryptography and key management approaches are utilized for reducing the cost and time. This paper presents a UDRPG — [Unique-Dynamic-Random-Password-Generation]...
As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network,...
Datagram Congestion Control Protocol (DCCP) is a transport protocol fits for real-time multimedia applications by processing congestion control and unreliable transmission. DCCP takes on a good performance in wired network while causes a substantial decline in wireless networks. This paper analyzes DCCP CCID-3 in wireless ad hoc networks and mainly focuses on two factors that impact the protocol performance...
As the wireless mobile devices are coming to wide use, MANETs are getting more attention. Each device has to not only maintain some information relating to forwarding the traffic including the traffic unrelated to its own use, but also establish the path using the broadcast packets. The more traffic, the more channel contentions, redundant retransmissions and collisions, which will cause to increase...
The aggregate throughput of a wireless ad hoc network depends on the hidden nodes problem and the usage of same polarized omnidirectional antenna on every node. Hidden node problem can be avoided by using optimal physical carrier sensing range in the wireless ad hoc network to achieve the good aggregate throughput. Moreover, using different polarization might further increase aggregate throughput...
Mobile Adhoc Network (MANET) is vulnerable to many security issues and network attacks. We presented the comparison of three different routing protocols (AODV, DSR and DSDV) on the basis of different parameters. In this paper, black hole attack is implemented on AODV protocol which reduce the performance parameters of network by exploiting the packet sequence number included in any packet header....
The Mobile Ad Hoc Network is a self controlling infrastructure-less wireless network with no unify administration with numerous characteristics like dynamic topology, multi hop routing, distributed routing and many more. MANETS are vulnerable to both active and passive attacks in the network. Jelly Fish attack downgrade the network performance and affects the network parameters like end to end delay,...
This paper discusses an enhanced AODV routing protocol as a method for defence against JellyFish (JF) Delay Variance attack in Mobile Ad-hoc networks. The JF delay variance attack introduces delay in forwarding the packets at network layer. It uses MAC addresses to calculate the route for forwarding the packets to destination. The attacker node creates delay in forwarding the packets, which increases...
In Mobile Ad hoc Networks, routes are drastically discovered by broadcasting the control packets. Broadcasting of these packets is useful, but results in high routing packet overhead. In this paper, a route discovery mechanism using an optimum angle selection based approach is proposed in order to improve the network performance by minimizing the flooding of control packets, result in less routing...
This paper proposes an adaptive packet aggregation scheme with QoS awareness in CR (Cognitive Radio) enabled Mobile Ad Hoc Networks (CRMANET). Instead of directly introducing the aggregation scheme from the 802.11n standard into CRMANET, the proposed adaptive scheme inherits the design advantages from the work given in [1] in regard to packet scheduling to further utilize each sub-channel before every...
Since the seminal work of Grossglauser and Tse [1], the two-hop relay algorithm and its variants have been attractive for mobile ad hoc networks (MANETs) due to their simplicity and efficiency. However, most literature assumed an infinite buffer size for each node, which is obviously not applicable to a realistic MANET. In this paper, we focus on the exact throughput capacity study of two-hop relay...
Bandwidth-delay product (BDP) is an important indicator of the network capacity and usually used to measure the quality of a connection. In wireless ad hoc networks over IEEE 802.11, packets may be blocked due to link layer contention, and delay triggered by the contention called contention delay has been revealed has nothing to do with BDP. BDP in wireless ad hoc networks has been studied a lot to...
The real achievable performance of mobile ad hoc networks (MANETs), in particular the performance of such networks under practical constraints, is still largely unknown by now. As a step forward in this direction, this paper focuses on a MANET where a maximum allowed delivery delay is imposed to each packet and examines the impact of such delivery delay constraint on its real achievable performance...
The Multiple Inputs Multiple Output (MIMO) antenna technique provides two transmission modes, MUX and DIV. The MUX mode increases data rate and, on the other hand, the DIV mode reliability or transmission range. In this paper, we propose an opportunistic transmission mechanism that adaptively changes the MIMO transmission mode to provide reliability for the seamless video streaming service. Also,...
Mobile Ad hoc Networks (MANETs) are used for node to node communications for a fixed purpose under mobile conditions. Different applications have found MANETs useful for communication tasks. The challenges while such a communication is performed are plenty. Although a number of protocols have facilitated the communication between mobile nodes, there is an unavoidable interruption in the network due...
The traditional Request-To-Send/Clear-To-Send (RTS/CTS) handshaking has been widely adopted in wireless ad hoc networks to reduce the hidden terminal problem. Nevertheless, the RTS/CTS handshaking potentially incur the false blocking problem where nodes blindly defer when they overhear the RTS packets. To mitigate the false blocking problem, the Ready-To-Send and Blocking Notification (RSBN) scheme...
The key factors for a routing protocol in Ad Hoc networks include route discovery, route maintenance and route destroy. Our laboratory has done a lot of researches based on our Ad Hoc hardware platform applying the classical AODV protocol. We found out that an essential cause for unsuccessful route discovery, instable route or even the limitation of hop numbers can be summarized as the bad channel...
MANET or mobile adhoc network is that network which is infrastructure less and does not need any centralized support. In this network, mobile nodes are equipped with CSMA/CA (carrier sense multiple access with collision avoidance) transceivers and communicate with each other via radio. This network is a kind of temporary network and is best suited for emergency purposes. Since, nodes are always on...
MANET provides a good platform for any time anywhere networking. Nodes in MANET communicate via wireless multi-hop links. Due to frequent node movement routing algorithm in wired network is not suitable for MANET. AODV is the most popular routing algorithm. Route maintenance is the major issue in AODV when there is only one path is established between source and destination. Wireless link breakage...
The traditional RTS/CTS handshaking has been widely adopted in wireless ad hoc networks to reduce the hidden terminal problem. However, the handshaking induces the false blocking problem where adjacent nodes are deferred unnecessarily by overhearing the unsuccessful RTS packets. To mitigate these, the Blocking Notification (BN) scheme was proposed previously. In the BN scheme, the hidden and exposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.