Mobile ad-hoc network (MANET)

Top PDF Mobile ad-hoc network (MANET):

Mobile ad hoc network overview

Mobile ad hoc network overview

Universiti Teknologi Malaysia, Skudai, Johor, Malaysia 1 prof_ishak@yahoo.co.uk 2 apai2040@yahoo.com ABSTRACT A mobile ad hoc network (MANET) is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines routing protocols for ad-hoc networks and evaluates these protocols based on a given set of parameters. The paper provides an overview of eight different protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.
Show more

8 Read more

Research on Survivability of Mobile Ad hoc Network

Research on Survivability of Mobile Ad hoc Network

Email: zhouyuan84825@163.com Received November 26 th , 2008; revised January 7 th , 2009; accepted February 16 th , 2009. ABSTRACT In this paper, we analyze the survivability of Mobile Ad Hoc Network systemically and give a detailed description of the survivability issues related to the MANET. We begin our work with analyzing the requirements of survivability of ad hoc network, and then we classify the impacts that affect survivability into three categories: dynamic topology, faults and attacks. The impacts of these factors are analyzed individually. A simulation environment for the MANET towards survivability is designed and implemented as well. Experiments that under the requirements and the impacts we de- clared are done based on this environment.
Show more

5 Read more

Mobile Ad-Hoc Network Security: An Overview

Mobile Ad-Hoc Network Security: An Overview

But Mobile Ad Hoc Networks have far more vulnerabilities because of security threat, which is very much hard to maintained comparing to wired networks. Endeavour of so many researchers is yet to be finished for the innovation of a secured framework for Mobile Ad Hoc Network (MANET). In this paper, different security aspects of wireless networks are addressed and diversified methodologies of various researchers are discussed from the very beginning of this research to this modern age. The effort has been given here to observe the trends of numerous security standards. Also some promising approaches are indicated and particular concentration is devoted for the scrutinizing a range of procedure from raw level to high professional, so that in future one can get precious guideline for further betterment. Furthermore, the related work on this arena will give a paradigm of challenges and explore the scopes for research work in depth of wireless security.
Show more

8 Read more

Link Prediction in Mobile Ad hoc Network

Link Prediction in Mobile Ad hoc Network

Keywords – QoS, Link Prediction, Laplace Distribution, 1. Introduction Mobile Ad hoc Network (MANET) [1] is co-operative collection of mobile nodes communicating with each other through wireless links, without requiring any supporting infrastructure. In MANET [2] all the nodes can connect dynamically in an arbitrary manner due to their mobility. The nodes in the network behave both as autonomous nodes and as routers. In MANET, node mobility affects the quality of service requirement of applications by causing frequent link failures. Quality of Service can be assured by achieving a more deterministic network behavior [3, 4]. In MANET, because of the random mobility of the nodes network behavior is not deterministic mostly. Therefore, probabilistic approach can help in predicting the network behavior and thus providing QoS.
Show more

8 Read more

Security Issues in Mobile Ad Hoc Network

Security Issues in Mobile Ad Hoc Network

Department of Electronics and Communication Engineering, Jai Shriram Engineering College, Tirupur, Tamil Nadu, India 2 3 4 5,6, ABSTRACT: Mobile Ad-hoc network is infrastructure less, spontaneous and multi-hop network, which consist of decentralized wireless mobile nodes. MANET uses temporary ad-hoc network topologies, that allowing people and devices to seamlessly connect to network in areas with no pre-existing communication infrastructure e.g. disaster recovery environments. And mobile ad-hoc network is a collection of nodes that are connected through each other with a wireless medium forming rapidly changing topologies. Routing in mobile ad-hoc network is a challenging term due to its dynamic changes in topologies. There are lots of trust models and routing protocol which are used in MANETs to get a security. Various trust schemes are used to provide integrity, confidentiality and availability in mobile ad-hoc network to gain the secure environment. In this paper, we will discuss characteristics, attacks and security in mobile ad- hoc network.
Show more

5 Read more

The Technological Challenges of Mobile Ad-Hoc Network

The Technological Challenges of Mobile Ad-Hoc Network

Assistant Professor, Department of CS & IT, Dhanalakshmi Srinivasan College of Arts & Science for Women, Perambalur, Tamil Nadu, India 2 ABSTRACT: Mobile ad-hoc network (MANET) is one of the most promising fields for research and development of wireless network. As the popularity of mobile device and wireless networks significantly increased over the past years, wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. A mobile ad hoc network is an autonomous collection of mobile devices (laptops, smart phones, sensors, etc.) that communicate with each other over wireless links and cooperate in a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. This type of network, operating as a stand- alone network or with one or multiple points of attachment to cellular networks or the Internet, paves the way for numerous new and exciting applications. This paper provides insight into the potential applications of ad hoc networks, various attacks and discusses the technological challenges that protocol designers and network developers are faced with.
Show more

6 Read more

ABSTRACT: A vehicular ad hoc network (VANET) is subclass of Mobile ad hoc network (MANET) in which vehicles

ABSTRACT: A vehicular ad hoc network (VANET) is subclass of Mobile ad hoc network (MANET) in which vehicles

G. Kavitha Assistant Professor, Department of CSE, Bharath University, Chennai, Tamil Nadu, India ABSTRACT: A vehicular ad hoc network (VANET) is subclass of Mobile ad hoc network (MANET) in which vehicles act as mobile nodes. Many MANET routing protocol such as AODV and DSR are not suitable VANET .This is because VANET differs from MANET in aspects like topology and mobility model. This paper analyzes the advantages and disadvantages of different Inter Vehicular Routing protocols and mainly deals with Transmission Strategies of Routing Protocol.
Show more

6 Read more

A Survey of Checkpointing Algorithms in Mobile Ad Hoc Network

A Survey of Checkpointing Algorithms in Mobile Ad Hoc Network

IV. C onclusion We has reviewed some fundamental concepts of clustering in MANET. It is also observed that cluster structure facilitates the spatial reuse of resources to increase the system capacity. A cluster can better coordinate its transmission events with the help of Cluster Head. Clustering methods allow fast connection and also better routing and topology management of Mobile Ad Hoc Networks. It is also observed that MANET has many important issues to handle like structure stability, message overheads, energy consumption of mobile nodes and traffic load with the cluster, so the algorithms are developed for less overhead, reducing no. of checkpoints by using different approaches We also compared different approaches to rollback recovery and checkpointing with respect to a set of properties in Mobile Ad Hoc Network. Table 1 gives some salient features of various checkpointing algorithms.
Show more

9 Read more

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK

IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK

Abstract —A Mobile Ad Hoc Network (MANET) consists of a set of iden- tical mobile nodes communicating with each other via wireless links. The network’s topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger In- ternet. In traditional networks, hosts rely on centralized servers like DHCP for configuration, but this cannot be extended to MANETs because of their distributed and dynamic nature. Many schemes have been proposed to solve this problem. Some of these approaches try to extend the IPv6 state- less autoconfiguration mechanism to MANETs, some use flooding the en- tire network to come up with a unique IP address, and others distribute IP addresses among nodes (using binary split) so that each node can inde- pendently configure new nodes. None of these existing solutions consider network partitioning and merging. In this paper, we propose a proactive scheme for dynamic allocation of IP addresses in MANETs. Our solution also uses the concept of binary split and takes into consideration the previ- ously unsolved issues like partitioning and merging and abrupt departure of nodes from the system. We show that our solution is scalable and does not have the limitations of earlier approaches.
Show more

6 Read more

A Method of Opportunity Prediction in Mobile Ad Hoc Network

A Method of Opportunity Prediction in Mobile Ad Hoc Network

Keywords—mobile ad hoc network, opportunity prediction, similarity metric; kernel regression; prediction accuracy I. I NTRODUCTION In recent years, with the development of wireless communication technology and the emergence of a large number of intelligent mobile terminals, the mobile ad hoc network (MANET) [1] research has received extensive attention in academia. This paper conducts research on the opportunity prediction technology in mobile ad hoc network. The difficulty of routing in MANET lies in the uncertainty of future encounter opportunity knowledge, leading to blind and unpredictable message forwarding behavior.
Show more

11 Read more

A Study on Security Problems in Mobile Ad-hoc Network

A Study on Security Problems in Mobile Ad-hoc Network

KEYWORDS:MANET , Ad-hoc, DoS, Attacks, Hijacking. I. INTRODUCTION MANET-Mobile Ad-hoc network. “Ad-hoc" signifies "for that specific reason". [1]. There is no requirement of any base like infrastructure and devices are associated without wires. All devices in MANET are self-configured. Every node in this network contain mobile and it can also change to other device frequently. As ad hoc need flat infrastructure, ad-hoc are totally different from alternative network, work on shared medium (example: - radio), have dynamic topology. Still as finish hosts this network on each pc device act as a router. Paper is organized as follows. Section II describes automatic text detection using morphological operations, connected component analysis and set of selection or rejection criteria. The flow diagram represents the step of the algorithm. After detection of text, how text region is filled using an Inpainting technique that is given in Section III. Section IV presents experimental results showing results of images tested. Finally, Section V presents conclusion.
Show more

7 Read more

DDoS Services Attacks In Mobile Ad hoc Network

DDoS Services Attacks In Mobile Ad hoc Network

This allows users to share documents, secret information and other useful information. This kind of unstructured, temporary network referred to as mobile ad hoc networks sometimes just called ad hoc networks or multi-hop wireless networks, and are expected to play an important role in our daily lives in near future. As the use of ad-hoc network increased the security concerned also needed to prevent the network from malicious users. In wired network , it is easy to provided security during transmission than the Mobile ad-hoc network. DDoS attack is a big problem in MANET. In these, paper we discussed about DDoS attacks and there detection mechanisms.
Show more

8 Read more

Detection of Misbehaving Nodes in Mobile Ad hoc Network

Detection of Misbehaving Nodes in Mobile Ad hoc Network

Anna University of Technology, Coimbatore, India. gct143@gmail.com Abstract— Mobile Ad-hoc Network (MANET) is an indivisible part for communication of mobile devices. It is a dynamic wireless network that can be formed without any pre existing infrastructure in which each node can act as a router. It is easy to deploy node failure and network traffic to impersonate another node in MANET. Mobile ad hoc network has no clear line of defense, so, it is accessible to both legitimate network users and misbehaviors. In the presence of misbehaviors, one of the main challenges is to design the trust reputation system that can protect MANET from various misbehaviors. The main objective of the work is to detect the misbehavior using trust based mobility system. Mobility is exploited in order to detect the misbehavior. This model is carried out in two cases which exploit mobile nodes to collect and broadcast trust information to achieve trust convergence and provides the authentication to the mobile nodes in order to detect the misbehavior. Each node would evaluate its own trust vector parameters about neighbors through monitoring neighbor’s pattern of traffic in network. Simulation results shows that the mobility oriented trust system provides better detection efficiency, packet delivery ratio, low delay and good misbehaving node detection based on delay constraint.
Show more

5 Read more

A Review on Congestion Control for Mobile Ad hoc Network

A Review on Congestion Control for Mobile Ad hoc Network

ABSTRACT A mobile ad-hoc network (MANET) is a type of network in which all nodes are connected to each other without using the external infrastructure. In this network nodes can communicate with one another by using wireless transmission range. In MANET congestion control is the basic problem. The congestion is the problem in the mobile ad-hoc network which decreases the performance of the transmission of information in the network. Various parameters of the network affected due to the congestion. In this paper we have study about the different routing protocol, security issues, attacks in MANET and different challenges faced by MANET.
Show more

6 Read more

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing

Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile Ad-hoc Network (“MANET”) comprises radio nodes that dynamically self-organise into random network topologies. The network configuration does not rely on any fixed infrastructure and is therefore well-suited to defence and public-safety applications. Given the nature of these applications, reliable system performance is critical, which means extensive and rigorous testing requirements.

10 Read more

Design of Mobile Ad hoc network for different Mobilities

Design of Mobile Ad hoc network for different Mobilities

Key Words:- MANET, Throughput, Delay, MIMO, Packet Size, AODV, NS2(Network Simulator), TCL. 1. INTRODUCTION As we know that significant progress has been made in securing MANETs via the development of secure routing protocols. The network topology in an ad hoc network is highly dynamic due to the movement of the nodes, hence mobility is a major limitations in designing routing protocols for them. Apart from mobility, the other major restriction s are bandwidth and resource availability. Basically Mobile Ad-hoc network (MANET) is a collection of independent mobile nodes that can liaise with each other via radio waves.
Show more

5 Read more

The Study of Wormhole Attack in Mobile Ad Hoc Network

The Study of Wormhole Attack in Mobile Ad Hoc Network

hop. Thus, highly collaboration between mobile nodes leads to a successful communication between mobile nodes. Fig. 1 Mobile Ad Hoc Network[1] The network unlike traditional wired network is less reliable and has limited physical security, higher loss rates and many other design constraints. Despite these constraints the network is highly suitable and widely employed in case of rescue operations, where fixed network cannot be established or is setting up a network is too expensive, emergency operations, military operations, personal networking, commercial environment etc. To accommodate the changing topology special routing algorithms are needed. If the exact specifications of the routing protocols are not followed, an attacker can mount routing attacks which can disrupt the overall network communication during the routing phase. The security attack in MANET can be classified into two types, Active attack and Passive attack. In active attack, the attacker disrupts the normal functionality of the network while in passive attack, the attacker does not disrupt the network operation, but it attempts to analyze the network traffic.
Show more

6 Read more

Design and Implementation of a Protocol in Mobile AD HOC Network

Design and Implementation of a Protocol in Mobile AD HOC Network

Keywords— MANET Mobile Ad-Hoc Network, AODV Ad-Hoc On Demand Vector, M-AODV Modified Ad-Hoc On Demand Vector, RREP Route Reply, RREQ Route Request, PDR Packet Delivery Ratio etc. I. INTRODUCTION Wireless networks can be divided into two, infrastructure networks and Ad-Hoc networks as shown in figure 1. Infrastructure networks are centralized type of network. Where the base station acts as a coordinator in communication between two nodes.

7 Read more

A HEURISTIC APPROACH TO SECURE MOBILE AD HOC NETWORK

A HEURISTIC APPROACH TO SECURE MOBILE AD HOC NETWORK

Another dynamic routing plan in view of stigmergy is presented by the researchers in the paper.[15] 6. ROUTING PROTOCOLS When the routing in wired set-up with stationary framework is contrasted with routing in mobile Ad Hoc network then some further issues and difficulties are confronted. There are a few surely understood conventions in the writing that have been particularly created to adapt to the confinements forced by ad hoc networking conditions. Routing is for the most part grouped into static routing and dynamic routing. Static routing is what keeps up a routing table. Dynamic routing alludes to the routing technique that being is learnt by an inside and outside routing convention. The cases for routing algorithm are:
Show more

6 Read more

A Survey on Selfishness Handling In Mobile Ad Hoc Network

A Survey on Selfishness Handling In Mobile Ad Hoc Network

Jim Solomon Raja.D 1 , Immanuel John Raja.J 2 Abstract— In MANETs some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth and power. The nodes which act selfishly to conserve their resources are called selfish nodes. The selfish nodes are engaged to reduce data availability and produce high communication cost in terms of query processing. Many selfish node detection methods are found to detect the nodes which do not participate in packet forwarding but they fail to detect the selfish nodes which does not allocate replica for the purpose of other nodes. This survey paper provides methods to detect selfish nodes in terms of allocating replica to other nodes. The methods are categorised according to detect the selfish nodes and reduce the impact of that nodes in mobile ad hoc network. It also discusses the key features of selfish nodes and numerous replica allocation techniques. The introduction of new replica allocation techniques will considerably reduce the delay in query processing and produce high data availability.
Show more

5 Read more

Show all 10000 documents...