To see the other types of publications on this topic, follow the link: ADHOC ON-DEMAND DISTANCE VECTOR.

Journal articles on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (2014): 40–45. http://dx.doi.org/10.5120/17839-8725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

G Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approac
APA, Harvard, Vancouver, ISO, and other styles
4

dhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protoc
APA, Harvard, Vancouver, ISO, and other styles
6

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector r
APA, Harvard, Vancouver, ISO, and other styles
7

Soundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete loga
APA, Harvard, Vancouver, ISO, and other styles
9

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2020): 4412–22. https://doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete loga
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.

Full text
Abstract:
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabi
APA, Harvard, Vancouver, ISO, and other styles
11

Gupta, Ekta, and Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol." International Journal of Future Generation Communication and Networking 7, no. 6 (2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Umaparvathi, M., and Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs." International Journal of Business Data Communications and Networking 7, no. 4 (2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.

Full text
Abstract:
Mobile Adhoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messages, thus attacking the normal operation of MANET. One such attack is Black hole attack, in which, a malicious node called Black hole node attracts all the traffic of the network towards itself, and disc
APA, Harvard, Vancouver, ISO, and other styles
13

C, Mohanadevi, and Sweatha Selvakumar. "An Effective Encryption Mechanism for Security Issues in Adhoc Networks." ECS Transactions 107, no. 1 (2022): 17465–74. http://dx.doi.org/10.1149/10701.17465ecst.

Full text
Abstract:
In a wireless adhoc network, overtly on the market transmission signals impose a major security risk. Dos attacks on the network layer are a big threat to adhoc networks. The widespread attacks on adhoc networks are blackhole and grayhole attacks. By broadcasting bogus routing data, malicious nodes will prevent information from being sent throughout the network. As a result of this understanding, the United States of America were able to address the problem of information security in wireless adhoc networks with a unique viewpoint, allowing them to have a communication route free of all of the
APA, Harvard, Vancouver, ISO, and other styles
14

Ahmed. "PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN." Journal of Computer Science 10, no. 8 (2014): 1466–72. http://dx.doi.org/10.3844/jcssp.2014.1466.1472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ahmed, Shadab. "Ad_Hoc on Demand Distance Vector Routing using MANET." IJARCCE 6, no. 3 (2017): 944–48. http://dx.doi.org/10.17148/ijarcce.2017.63220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Srikanth, Pala, Maddula Prasad, Sree Pokkuluri Kiran, Pattem Sunil, Rao Kurada Ramachandra, and Yadavalli Ramu. "Detection and avoidance of black-hole attack in mobile adhoc network using bee-ad-hoc on-demand distance vector." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 822–32. https://doi.org/10.11591/ijai.v14.i1.pp822-832.

Full text
Abstract:
Mobile adhoc networks (MANETs) are self-configuring networks with a dynamic infrastructure suit for real world applications. Due to the exponential increase in the network devices an efficient routing algorithm for dynamic network adhering the security issues is a critical challenge needs to be addressed. This article attempts to address this issue with the implemention of ad-hoc on-demand distance vector (AODV) routing approach, which is the best of its kind in the dynamic network design of MANETs. The primary goal is to address security attack weaknesses through the implementation of dynamic
APA, Harvard, Vancouver, ISO, and other styles
17

Pamungkas, Dimas W. L., and Radityo Anggoro. "An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment." Journal of Development Research 5, no. 1 (2021): 1–6. http://dx.doi.org/10.28926/jdr.v5i1.133.

Full text
Abstract:
MANET (Mobile Ad hoc Network) is a technology used for data communication on mobile media. MANET moves and speeds also randomly with different distances between nodes. In the AODV reactive protocol, the development of a routing protocol with an ant colony model can significantly improve performance. The measurement results will impact the decision on the development of the ant colony protocol implemented in AODV to obtain the best route for data transmission. Several studies have developed the K-Means clustering method to obtain the shortest and best route from the AODV protocol. It does not m
APA, Harvard, Vancouver, ISO, and other styles
18

Rahman, Md Abdur, Md Mizanur Rahman, and Md Abdul Alim. "Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks." Telecom 4, no. 1 (2023): 100–117. http://dx.doi.org/10.3390/telecom4010007.

Full text
Abstract:
This paper proposes a MAC protocol for ad hoc networks using In-band Full-duplex (IBFD) wireless communications, which are named as AdHoc-FDMAC. To utilize IBFD communications in ad hoc networks, this protocol modifies a number of control frames in the IEEE 802.11 Distributed Coordination Function (DCF) MAC standard. Here, the detailed time sequences for all types of IBFD communications are shown for the data transmission and routing. In this paper, the probability and throughput equations for IBFD communications in different situations have been derived. The performance of the proposed AdHoc-
APA, Harvard, Vancouver, ISO, and other styles
19

Sumathi. "EVALUATING AN AUTHENTICATED TRUST BASED ADHOC ON DEMAND DISTANCE VECTOR FOR MALICIOUS NODES ISOLATION IN MANET." Journal of Computer Science 10, no. 9 (2014): 1859–64. http://dx.doi.org/10.3844/jcssp.2014.1859.1864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kaushal, Payal, Meenu Khurana, and Ketti Ramchandran Ramkumar. "Comparative analysis of reactive routing protocols for vehicular adhoc network communications." Bulletin of Electrical Engineering and Informatics 13, no. 3 (2024): 1621–30. http://dx.doi.org/10.11591/eei.v13i3.5322.

Full text
Abstract:
In the recent past, vehicular adhoc networks (VANETs) have gained a lot of importance. The routing protocols play a vital role to deliver payloads from one vehicle to another one while they are moving at relative speeds. It is a challenging task to select a routing protocol for VANETs because of the uneven distribution and high mobility of vehicles. In this paper, we have analysed the two standard reactive protocols, adhoc on-demand distance vector (AODV) and ant colony optimization (ACO). The performance comparison of AODV and ACO routing protocols has been presented in this paper. The result
APA, Harvard, Vancouver, ISO, and other styles
21

Patel, Surabhi, and Heman Pathak. "Improvising QoS through Cross-Layer Optimization in MANETs." International Journal of Computer Network and Information Security 15, no. 6 (2023): 52–63. http://dx.doi.org/10.5815/ijcnis.2023.06.05.

Full text
Abstract:
In Mobile Adhoc Networks (MANETs), nodes are mobile and interact through wireless links. Mobility is a significant advantage of MANETs. However, due to the unpredictable nature of mobility, the link may fail frequently, degrading the Quality of Service (QoS) of MANETs applications. This paper outlines a novel Ad hoc On-Demand Distance Vector with Proactive Alternate Route Discovery (AODV-PARD) routing protocol that uses signal strength-based link failure time estimation. The node predicts the link failure time and warns the upstream node through a warning message about the failure. On the basi
APA, Harvard, Vancouver, ISO, and other styles
22

V. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.

Full text
Abstract:
The self-configuring ability of nodes in Mobile Adhoc Network (MANETs) made it popular among critical applications like military use or natural emergency recovery. Most of the proposed protocols assume that all nodes in the network are cooperative, and do not address any security issue. To adjust such trend, it is vital to address its potential security issues. The main objective of this paper is to define the path for security and to further improve delay, energy, throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. In
APA, Harvard, Vancouver, ISO, and other styles
23

Deepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.

Full text
Abstract:
In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Se
APA, Harvard, Vancouver, ISO, and other styles
24

Mohammed, Tarique, and Islam Rumana. "Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols." International Journal of Computer Networks & Communications (IJCNC) 10, no. 4 (2018): 1–21. https://doi.org/10.5281/zenodo.1327358.

Full text
Abstract:
ABSTRACT Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the literature. In this investigation, we consider both deterministic and r
APA, Harvard, Vancouver, ISO, and other styles
25

Mohammed, Tarique, and Islam Rumana. "Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols." International Journal of Computer Networks & Communications (IJCNC) 10, no. 4 (2018): 1–21. https://doi.org/10.5121/ijcnc.2018.10401.

Full text
Abstract:
Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the literature. In this investigation, we consider both deterministic and random cha
APA, Harvard, Vancouver, ISO, and other styles
26

Pala, Srikanth, Prasad Maddula, Kiran Sree Pokkuluri, Sunil Pattem, Ramachandra Rao Kurada, and Ramu Yadavalli. "Detection and avoidance of black-hole attack in mobile adhoc network using bee-ad-hoc on-demand distance vector." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 822. http://dx.doi.org/10.11591/ijai.v14.i1.pp822-832.

Full text
Abstract:
Mobile adhoc networks (MANETs) are self-configuring networks with a dynamic infrastructure suit for real world applications. Due to the exponential increase in the network devices an efficient routing algorithm for dynamic network adhering the security issues is a critical challenge needs to be addressed. This article attempts to address this issue with the implemention of ad-hoc on-demand distance vector (AODV) routing approach, which is the best of its kind in the dynamic network design of MANETs. The primary goal is to address security attack weaknesses through the implementation of dynamic
APA, Harvard, Vancouver, ISO, and other styles
27

Shruti, Singhroy, and Zade PL. "Performance Evaluation of Routing Protocols in Cognitive Radio Network." European Journal of Advances in Engineering and Technology 5, no. 4 (2018): 288–95. https://doi.org/10.5281/zenodo.10708467.

Full text
Abstract:
<strong>ABSTRACT </strong> Cognitive Radio (CR) is an adjusting of quick, ready intelligence radio and network technology that can automatically discover ready narrow ways in a radio band and change sending&nbsp; parameters making able to more making connections to run taking place together and also get well radio operating behaviour. CR uses a number of technologies including adjusting radio and software formed radio (SDR) where old and wise hardware parts including mixers, modulators and makes greater have been put in place of quick, ready intelligence software. Wi-Fi based wireless terminal
APA, Harvard, Vancouver, ISO, and other styles
28

RATNASIH, RATNASIH, RISKI MUKTIARTO NUGROHO AJINEGORO, and DOAN PERDANA. "Analisis Kinerja Protokol Routing AOMDV pada VANET dengan Serangan Rushing." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (2018): 232. http://dx.doi.org/10.26760/elkomika.v6i2.232.

Full text
Abstract:
ABSTRAKVehicular Ad-hoc Network (VANET) adalah salah satu jaringan mobile Ad Hocyang memiliki mobilitas tinggi serta topologi yang berubah – ubah secara konstan dalam waktu yang singkat. Sistem broadcast yang diterapkan padaVANET ketika pembentukan arsitektur infrastruktur bisa dijadikan peluang bagi penyerang node untuk melakukan serangan terhadap routing protocol. Rushing Attack adalah sebuah serangan jaringan dimana serangan ini melakukan duplikasi secara cepat dengan transmisi yang lebih tinggi untuk mengacaukan jaringan dan mendapatkan forward akses yang lebih dibandingkan dengan node yan
APA, Harvard, Vancouver, ISO, and other styles
29

Abul, Hassan Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 465–71. https://doi.org/10.11591/ijeecs.v21.i1.pp465-471.

Full text
Abstract:
Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its resources in path selection process and data routing from source to destination. Selecting of efficient routing protocol to utilize all available resources played vital role in extending network life time. In this article fisheye state routing (FSR) proto
APA, Harvard, Vancouver, ISO, and other styles
30

Murty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering 11, no. 4 (2023): 1–9. http://dx.doi.org/10.35940/ijese.d2547.0311423.

Full text
Abstract:
This paper aimed at the detection of wormhole attack and proposed a new method called as Neighbour Node Ratio Adhoc On demand Distance Vector Routing (NNR-AODV). NNR-AODV is an extended version of the traditional AODV routing protocol. The proposed NNR-AODV calculates the neighbour node count for every node and based on that it will decide whether the wormhole is present or not. Furthermore, NNR-AODV is able to detect both external and internal wormhole attacked nodes. Also, NNR-AODV derived a Neighbor node Threshold value which is based on the cumulative distances between nodes present in the
APA, Harvard, Vancouver, ISO, and other styles
31

Abul Hassan, Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 465. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp465-471.

Full text
Abstract:
&lt;span&gt;Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its resources in path selection process and data routing from source to destination. Selecting of efficient routing protocol to utilize all available resources played vital role in extending network life time. In this article fisheye state routing
APA, Harvard, Vancouver, ISO, and other styles
32

M, V. D. S. Krishna Murty. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering (IJESE) 11, no. 4 (2023): 1–9. https://doi.org/10.35940/ijese.D2547.0311423.

Full text
Abstract:
<strong>Abstract:</strong> This paper aimed at the detection of wormhole attack and proposed a new method called as Neighbour Node Ratio Adhoc On demand Distance Vector Routing (NNR-AODV). NNR-AODV is an extended version of the traditional AODV routing protocol. The proposed NNR-AODV calculates the neighbour node count for every node and based on that it will decide whether the wormhole is present or not. Furthermore, NNR-AODV is able to detect both external and internal wormhole attacked nodes. Also, NNR-AODV derived a Neighbor node Threshold value which is based on the cumulative distances b
APA, Harvard, Vancouver, ISO, and other styles
33

Vasundra, S., and D. Venkatesh. "Performance Evaluation of Routing Protocols for Voice and Video Traffics." Asian Journal of Computer Science and Technology 7, no. 3 (2018): 86–90. http://dx.doi.org/10.51983/ajcst-2018.7.3.1890.

Full text
Abstract:
Wireless networks are comprised of nodes which are high in mobility and are adhoc natured where centralized access point is not required. Each node will have particular transmission range in which the data transmits from source to destination in that transmission range. Route construction for transmission of data from source to destination is tough due to high node mobility and dynamic nature of network. Many routing protocols are proposed and implemented in networks to reduce such mobility and dynamic difficulties for route construction. These routing protocols construct a route from source t
APA, Harvard, Vancouver, ISO, and other styles
34

Bharadwaj, Priyanka, and Surjeet Balhara. "A Bandwidth and Energy Aware QoS Routing Protocol for Enhanced Performance in Ad-hoc Networks." International Journal of Sensors, Wireless Communications and Control 9, no. 2 (2019): 203–13. http://dx.doi.org/10.2174/2210327908666180801125735.

Full text
Abstract:
Background &amp; Objective: There are some challenging issues such as providing Quality of Service (QoS), restricted usage of channels and shared bandwidth pertaining to ad-hoc networks in a dynamic topology. Hence, there is a requirement to support QoS for the application environment and multimedia services in ad-hoc networks with the fast growing and emerging development of information technology. Eventually, bandwidth is one of the key elements to be considered. Methods: Energy aware QoS routing protocol in an ad-hoc network is presented in this article. Results and Conclusion: The simulati
APA, Harvard, Vancouver, ISO, and other styles
35

Makani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.

Full text
Abstract:
Background &amp; Objective:: In past few years, Cognitive Radio (CR) paradigm has emerged as a promising and revolutionary solution to avoid problems of spectrum paucity and inefficiency in spectrum usage. Efficiently utilization of the spectrum offers high network performance. CRs are proficient to identify and adopt the unused spectrum in order to allow secondary users to occupy it without interfering the primary user’s activity. Cognitive Internet on Things (CIoT) is an integration of several technologies and communication solutions which can be effectively realized as Cognitive Radio Adhoc
APA, Harvard, Vancouver, ISO, and other styles
36

Prajapati, Meenakshi. "An Implementation and Modification of Routing Protocol Against Vehicular Adhoc Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (2021): 1777–80. http://dx.doi.org/10.22214/ijraset.2021.38680.

Full text
Abstract:
Abstract: Today the sector is transferring toward wi-fi system. Wireless networks are gaining reputation to its height today, because the customers need wi-fi connectivity regardless of their geographic position. Vehicular advert-hoc networks (VANETs) are taken into consideration to be the unique software of infrastructure-much less wi-fi Mobile advert-hoc community (MANET). In those networks, motors are used as nodes. The thesis works is primarily based totally on assessment among Ad hoc on call for Distance Vector routing protocol (AODV) and Modified ADHOC call for distance vector routing (M
APA, Harvard, Vancouver, ISO, and other styles
37

S., Dr Smys, and Dr Jennifer S. Raj. "Performance Improvement in Conventional AODV Using Energy Efficient, Manifold Route Discovery Scheme." Journal of ISMAC 2, no. 2 (2020): 129–39. http://dx.doi.org/10.36548/jismac.2020.2.006.

Full text
Abstract:
The decentralized network formed without any assistance of the fixed infrastructure and just by the employing the volunteering mobile or the portable devices that work in a cooperative manner along with the other devices that are clubbed in the network are inbuilt with the capacity of providing a best data conveyance facility utilizing the unicast, multicast and the broadcast methods of the routing strategies. Despite the capabilities of these type of networks, it faces difficulties in devising a strategy of routing according to the dynamic nature of the distributed network. The reactive type
APA, Harvard, Vancouver, ISO, and other styles
38

Murty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering 13, no. 1 (2023): 1–9. http://dx.doi.org/10.35940/ijsce.a3592.0313123.

Full text
Abstract:
This paper aimed at the detection of blackhole attacks and proposed a new method called as Secure and Light Weight Adhoc On demand Distance Vector Routing (SLW-AODV). SLW-AODV is an extended version of the traditional AODV routing protocol. The proposed SLW-AODV ensures resilience for both blackhole and cooperative blackhole attacks. It employs a simple Challenge, Response and Confirm (CRC) strategy with chaotic maps for the identification of both blackhole and cooperative blackhole attacks. SLW-AODV identifies the attacked nodes at both route discovery and data forwarding process. For experim
APA, Harvard, Vancouver, ISO, and other styles
39

M, V. D. S. Krishna Murty, and Lakshmi Rajamani Dr. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering (IJSCE) 13, no. 1 (2023): 1–9. https://doi.org/10.35940/ijsce.A3592.0313123.

Full text
Abstract:
<strong>Abstract:</strong> This paper aimed at the detection of blackhole attacks and proposed a new method called as Secure and Light Weight Adhoc On demand Distance Vector Routing (SLW-AODV). SLW-AODV is an extended version of the traditional AODV routing protocol. The proposed SLW-AODV ensures resilience for both blackhole and cooperative blackhole attacks. It employs a simple Challenge, Response and Confirm (CRC) strategy with chaotic maps for the identification of both blackhole and cooperative blackhole attacks. SLW-AODV identifies the attacked nodes at both route discovery and data forw
APA, Harvard, Vancouver, ISO, and other styles
40

Kumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.

Full text
Abstract:
In recent years, Mobile ad hoc networks ((MANETs) have generated great interest among researchers in their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. The ad hoc on demand distance vector (AODV) is most suitable routing protocol for mobile adhoc networks in which resource consumption attacks are frequent if it is not detected timely. In this paper, we have proposed a scheme to detect as well as overcome black hole attacks using an Intrusion Detection System (IDS). The proposed sch
APA, Harvard, Vancouver, ISO, and other styles
41

Geetha, M. "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 413–18. http://dx.doi.org/10.26438/ijcse/v6i7.413418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

J, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To counteract grey hole and black hole attacks, the proposed method deploys a hybrid framework along with the Ad hoc on-demand distance vector (AODV) routing protocol. A modified protocol is called as SRDAODV (Secure Route Discovery-Adhoc On-Demand Distance Vector).&nbsp;<strong>Methods:</strong>&nbsp;The proposed work establishes secure route from secure node discovery, which protects from sequential attacks. The proposed framework has three significant components Node Authentication, Secure Neighbor discovery and route establishment, and Node Isolat
APA, Harvard, Vancouver, ISO, and other styles
43

Aldabbagh, Ghadah, Peer Azmat Shah, Halabi B. Hasbullah, Farhan Aadil, Khalid Mahmood Awan, and Farman Marwat. "Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 620–30. http://dx.doi.org/10.1166/jctn.2017.6252.

Full text
Abstract:
Nodes in a multi-hop wireless network rely on each other to maintain network connectivity. A primary design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, the movement of nodes creates service disruption and delay as path failure detection and re-establishment consume considerable amount of time. Existing solutions for link classification and prediction operate on discrete values resulting in performance degradation. This problem can best be modelled using fuzzy logic. This work presents a new fuzzy logic based link status classifi
APA, Harvard, Vancouver, ISO, and other styles
44

Vivek Sharma. "Secure and Energy Efficient Routing Approach for Wireless Sensor Networks to Counter Flooding Attack." Journal of Information Systems Engineering and Management 10, no. 4s (2025): 558–66. https://doi.org/10.52783/jisem.v10i4s.566.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are used in many applications owing to their scalability and economic efficiency, but their adhoc characteristics makes them vulnerable to security attacks such as RREQ flooding attacks. RREQ flooding attack overload the network with excessive RREQ messages resulting in network congestion and power exhaustion and interruption of standard operations. This paper presents a secure and energy-efficient routing approach that focuses on effectively mitigating the effects of flooding attacks. The proposed approach combines sophisticated algorithms into the Ad hoc On-De
APA, Harvard, Vancouver, ISO, and other styles
45

M, V. Narayana, Narsimha Dr.G, and SSVN Sarma Prof. "IMPLEMENTATION OF MANET CONTROL PACKET DROP USING BAIT DETECTION APPROACH." International Journal of Engineering Sciences & Research Technology 5, no. 3 (2016): 147–55. https://doi.org/10.5281/zenodo.47008.

Full text
Abstract:
The conception following this development is the communication between nodes with the purpose of nodes cooperating with a piece of other. The expansion of mean nodes can direct to severe security concern; such nodes may interrupt the routing process. In this environment to prevent or detect malicious nodes, an instigation of greenhole or collaborative blackhole attack must be a dispute. This issue attempt to declaration by designing a Dynamic Routing (DR)-based routing technique, which is referred to as the helpful Bait Detection System (BDS) which integrate the compensation of both proactive
APA, Harvard, Vancouver, ISO, and other styles
46

Asha Latha, S., and A. Sivabalan. "Efficient Security Authentication Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 418–23. http://dx.doi.org/10.4028/www.scientific.net/amm.573.418.

Full text
Abstract:
Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking
APA, Harvard, Vancouver, ISO, and other styles
47

Raghavendar Raju, L., and C. R. K. Reddy. "Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 09 (2019): 40. http://dx.doi.org/10.3991/ijim.v13i09.9329.

Full text
Abstract:
&lt;p align="justify"&gt; Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA). NTPA aims to prevent the interference of an anomalous node in a MANET. There by improving the &lt;strong&gt;&lt;em&gt;security and data delivery output&lt;/em&gt;&lt;/strong&gt;. The NTPA calculates the node trust prediction
APA, Harvard, Vancouver, ISO, and other styles
48

Fatima, Lubna Naaz, Syeda Hajra Mahin, and Fahmina Taranum. "Efficient strategies to reduce power consumption in MANETs." PeerJ Computer Science 5 (November 18, 2019): e228. http://dx.doi.org/10.7717/peerj-cs.228.

Full text
Abstract:
In current circumstances, where amelioration in technology is elevating, power optimization is of grave concern, whilst perceiving portable conditions. The focus is to design an efficient system with an aim to reduce power consumption and improve performance of other metrics. Heterogeneous wireless systems will command in the next-generation wireless networks with the aggregation of different remote access mechanisms. A node in MANET (Mobile Adhoc NETworks) while consuming significant amount of energy practices data transmission and data retrieval process whilst bonding with other neighboring
APA, Harvard, Vancouver, ISO, and other styles
49

Rath, Mamata, Binod Kumar Pattanayak, and Bibudhendu Pati. "Energy Competent Routing Protocol Design in MANET with Real Time Application Provision." International Journal of Business Data Communications and Networking 11, no. 1 (2015): 50–60. http://dx.doi.org/10.4018/ijbdcn.2015010105.

Full text
Abstract:
With the increase of mobile activities in technological environment, it is a challenge to develop and maintain robust networking system with provision of high connectivity. In this context, Mobile Adhoc Network (MANET) is a feasible solution because it is dynamic in nature and the self-configured nodes of MANET can communicate intelligently in adverse and dynamic mobile situations. Though Adhoc on Demand Distance Vector (AODV) Routing protocol handles the networking issues efficiently, still power and delay efficiency has always been a challenging task in MANET due to the resource constrained
APA, Harvard, Vancouver, ISO, and other styles
50

Yoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, et al. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.

Full text
Abstract:
&lt;p&gt;In this paper, an alternative improvement is proposed which is the adaptive wireless access networks-based optical backhaul convergence that will greatly promote to use the existing resource of MANET (mobile ad hoc network). However, these characteristics itself acts as a drawback to the MANET applications such as the random distribution of nodes and continuously changing topology. MiNiTab statistical software was used to model the effect of the parameter variation to predict the field quality through the design of experiments while OMNeT++ network simulation was created to visualize
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!