The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
AODV is reactive routing protocol, used in MANET that establishes route between source and destination, whenever the source has data to send to the destination and there is not any route between them. Since nodes are moving route breaks because nodes are out of coverage of the neighboring nodes. After route break RERR messages are circulated to all the nodes, due to RERR messages traffic increases...
Mobile Ad hoc Networks (MANETs) augment the conventional wireless networking paradigm by facilitating multi-hop routes among participating nodes, without help from any pre-constructed infrastructure. This potency is endowed by many state of the art routing protocols proposed in recent years. Some of these protocols focus on proactive formulation and maintenance of routes to every destination, some...
A mobile ad hoc network (MANET) is an infrastructure less and self-configuring network of mobile devices which dynamically form a network without the help of any centralized administration. Frequently changing network topology needs efficient dynamic routing protocols. The performance of any routing protocol depends on the duration of interconnection among the nodes in the network for transferring...
In this paper, a route control method for ad-hoc networks in a multipath fading environment is studied which is based on received power of repeater nodes and the history of established links. When repeater nodes received HELLO Message, these nodes obtain the received power information from Physical Layer in order to decide whether a link is stable or not. If the received power is lower than a threshold,...
Now a days, mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Consumer electronic devices have evolved depending on user needs. Users want to use compact and portable devices such as cellular phones, laptop computers, Personal Digital Assistants (PDAs), etc. anywhere and at anytime to download multimedia data or to access realtime traffic...
Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. Ad hoc on-demand distance vector routing (AODV) is demand driven one of the best and popular routing algorithm. AODV is severely affected by well-known black hole attack in which a malicious node injects...
Wireless networks can be self sustaining by harvesting energy from ambient sources such as kinetic activities or electromagnetic radiation. In this paper, the spatial throughput of a mobile ad hoc network powered by energy harvesting is analyzed using a stochastic-geometry model where transmitters are Poisson distributed and powered by randomly arriving energy and each transmitter transmits with fixed...
Providing QoS in the context of Ad Hoc networks includes a very wide field of application from the perspective of every level of the architecture in the network.In order for simulation studies to be useful, it is very important that the simulation results match as closely as possible with the test bed results. In this Paper, we study the throughput performance(parameter QoS) in Mobile Ad Hoc Networks...
Wireless Ad Hoc network is vulnerable to attacks due to its open and decentralized properties. This paper proposes a trusted connection based scheme for Ad Hoc network to prevent attacks. A trusted architecture is introduced into the node platform, which consists of two phases, platform identity verification and platform integrity measurement. For a communication requirement of two nodes, the terminal...
As the demand for mobile ad hoc wireless network applications grows, so does their use for many important services where reliability and stability of the communication paths are of great importance. Therefore, a mobile ad hoc network (MANET) must be able to establish reliable communication channels which are protected by failure recovery protocols. One approach for existing failure recovery protocols...
This paper proposes an improved QoS scheduling scheme, called the Modified Proportional Fairness with Multi-Hop (MPF-MH) algorithm for Cognitive Radio Mobile Ad Hoc Networks (CR MANET). Within the context of multi-channel MAC enabled networks, mobile nodes can experience simultaneous transmission across multiple channels. Benefiting from the proposed cross layer design, the real-time channel conditions...
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind...
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack...
Mobile ad hoc network is coordinated without fixed infrastructure. In the conservative AODV routing protocol, source node always forwards RREQ (Route Request) packet to neighbour for finding path to the destination node. The intermediary (neighbour) node having less lifetime or energy, as well forwards RREQ and lifetime expires after some certain time, i.e. node goes down; it cannot forward RREP (Route...
In recent years, Mobile Ad-hoc Networks (MANETs) have an increased attention on covering rural areas due to the possibility of usage of low-cost and high performance mobile terminals, without having to depend on the network infrastructure. Because the terminals are mobile, the routes change dynamically, so routing algorithms are very important for operation of MANETs. In this paper, we investigate...
In this paper, we propose a priority based scheduling algorithm for Mobile Ad-hoc Network (MANET) using fuzzy logic. The fuzzy system has three inputs: data rate, Signal-to-Noise Ratio (SNR) and queue size. The fuzzy system was verified using MATLAB fuzzy toolbox and the performance of the algorithm was evaluated using OPNET simulator. The results were compared to an existing fuzzy scheduler. The...
TCP is a reliable transport layer protocol basically designed for wired networks. In TCP, segment loss in transmission is due to congestion in the network rather than due to unreliable medium, the same is not true for Ad-Hoc networks, mainly MANET. MANET, a well known Ad-Hoc network is prone to link failures majorly due to mobility. In MANET, TCP is unable to distinguish between losses because of...
A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. Jellyfish is a new denial of service attack. There are three kinds of JellyFish attacks i.e. JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. In JF delay variance attack, intruder node needs to intrude into...
In a mobile ad hoc network (MANET), each node communicated with other nodes has relied on the intermediate nodes. But selfish nodes which aimed to get the greatest benefits from the MANET, like battery life and bandwidth. In this paper, we defined a half selfish node which is not selfish always but sometimes. Then we used the repeated game in MANET to avoid the half selfish nodes. Lastly, we have...
In mobile Ad-hoc networks, during the transmission of data, there is a chance of route failure, so that the route rediscovery should be done. Reactive routing protocol determines a route to a specific destination when a particular packet is going to send. Here we propose a reverse reactive routing protocol, based on new route discovery approach, which is used to find an optimal route to the destination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.