To see the other types of publications on this topic, follow the link: MANET(Mobile Adhoc Network).

Journal articles on the topic 'MANET(Mobile Adhoc Network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MANET(Mobile Adhoc Network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the security issues cultivate resulting in welcoming various lethal vulnerabilities. Out of various Denial of Service (DoS) attacks in MANET, Flooding attackis considered most challenging adversarial modules that tremendously affect the communication system in MANET. In this paper, various previously used techniques are discussed for mitigating Flooding attacks in MANET. The uniqueness of this article is that it presents a comparative study of existing techniques for detecting Flooding attacks in MANET. Finally, we proposed a new technique based on threshold value for detecting Flooding attacker nodes in MANET.
APA, Harvard, Vancouver, ISO, and other styles
2

Deepa, S., Kamal Raj S, and Sridhar K.P. "Development of mobile adhoc network using leader Selection algorithm." International Journal of Engineering & Technology 7, no. 2.9 (2018): 6. http://dx.doi.org/10.14419/ijet.v7i2.9.9929.

Full text
Abstract:
Mobile ad-hoc network (MANET) is an interconnection of mobile devices without preexisting topology which form a communication network. QOS parameters like congestion control, confidentiality, output, delay, energy consumption, jitter, have to be improved based on the development of transmission technology, and real-time applications. MANETs are totally different from distributed COMPUTING systems. They are dynamic and self-organizing networks. A leader is needed to coordinate and organize tasks in MANET. The challenge is to own the proper election algorithm that chooses the correct leader based on numerous factors in MANET. The task of the leader is to keep up the quality of service (QOS) in the MANET. This paper explores QoS in MANET by using the leader of the network by correct election algorithm by improving the network lifetime, path stability, and reduce end to end delay.
APA, Harvard, Vancouver, ISO, and other styles
3

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
4

Dr., M. Pushpavalli, and Janani G. "A Survey: Trust Based Task Assignment in Service Oriented ADHOC Networks with Energy Efficient Optimization." Journal of Control System and Control Instrumentation 1, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.2575420.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an Infrastructure less network where mobile devices are connected without wires. Each device in MANET can move independently on its own. Thus MANET can change the location and configure by itself. Nowadays Energy Efficiency (EE) of the ADHOC nodes and Trust management becomes an essential aspect, as it is not possible to give sufficient power to the mobile devices of the ADHOC networks. This type of problem in ADHOC networks is a globally optimal problem where some customized branch and bound (BB) algorithm are effectively and efficiently used to solve it. In this paper a survey is done on the trust management protocol with energy efficient optimization.
APA, Harvard, Vancouver, ISO, and other styles
5

Divakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.

Full text
Abstract:
A rapid advancement in the area of mobile networks has been observed over the recent years due to the spread of reasonable, existing wireless devices. Hence it has given way to numerous opportunities to many researchers to work on Mobile Adhoc Networks. There are several key challenges in implementing the MANETS. It does not use any existing infrastructure or centralized administration. Each mobile node acts as a router. Due to its dynamic features, they are endangered. This paper provides a detailed study and throws light on the MANETS Topology in Wireless Adhoc Networks and focusses on performance parameters throughput, end to end delay and network load, its effect on the performance of the MANET network depending upon the number of users.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.

Full text
Abstract:
MANET (mobile ad hoc network) is a collection of mobile nodes that interact without the need for a fixed physical foundation. MANETs have grown in popularity as a result of characteristics like dynamic topology, quick setup, multi-hop data transfer, and so on. MANETs are well-suited to various real-time applications, including environmental monitoring, disaster management, and covert and military operations, because of their distinguishing characteristics. MANETs may also be used in conjunction with new technologies like cloud computing, IoT, and machine learning algorithms to help realize the vision of Industry 4.0. Secure and reliable data transfer is essential for any MANET-based sensitive real-time applications that must achieve the requisite QoS. It is challenging to provide safe and efficient data transfer with MANET. As a result, this article examines different Trust-based Approaches that take a step forward in providing secure transmission while simultaneously improving MANET performance. Furthermore, the study's analysis based on many aspects exposes the inadequacies of existing techniques and provides future directions for improvement.
APA, Harvard, Vancouver, ISO, and other styles
7

Mittal, Samridhi. "Optimal Node Routing Layouts in Mobile Adhoc Network." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34963.

Full text
Abstract:
Mobile Adhoc Network (MANET) is a self-organizing network of various network devices responsible for communication. In MANET, new layouts are adopted for energy optimization, security implementation, traffic minimization and overhead reduction. MANET are aggressive in nature. This requires modification in network routing protocols for performance enhancement. This paper presents the detailed survey of different layouts involved in the implementation of network routing protocols in MANET. The survey is classified into four phases involved in MANET routing applications namely- routing protocols, neighborhood discovery, distributed or centralized hash tables, and bloom filter. Firstly, the classification of routing protocols based on various traffic models presents the MANET configuration. Secondly, a neighborhood discovery mechanism conveys the enhancement in the routing configurations. Thirdly, application of hash table operation (distributed/ centralized) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the unpredictability occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of ejected malicious node in another cluster disgraced the link stability. This survey conveys the problems such as storage overhead, mobility nature, malicious nodes, and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to reduce the problems in traditional research works. Index Terms – Performance Optimization, Bloom Filter, Centralized Hash Table (CHT), Distributed Hash Table (DHT), Energy Consumption, Mobile Ad- hoc Network (MANET), Quality of Service (QoS), Routing.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.

Full text
Abstract:
Mobile Ad hoc network (MANET) is a collection of moving wireless nodes which form a temporary network topology without using any pre-existing network infrastructure. One of the challenges in MANET is to identify a path between the source and the destination nodes. MANET is highly deployable, self-organizing, autonomous and self-configuring network with the ability of rapid deployment. Nodes movement imposes high challenges to routing in MANET due to dynamically changing of topologies, low transmission power and asymmetric links. So well-organized routing is very critical task due to highly dynamic environment. Route instability occurs due to node mobility and leads to frequent change in topologies; therefore routing becomes one of the core issues. Many researchers are working on the expansion of routing protocols in MANET.
APA, Harvard, Vancouver, ISO, and other styles
9

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
10

Srividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
11

Sunaina, Sharma, N. Mahajan Aparna, and C. Poonia Ramesh. "SA-DSR: a Bandwidth Optimizing Technic for Dynamic Source Routing Protocol." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3006–10. https://doi.org/10.35940/ijeat.C5795.029320.

Full text
Abstract:
An assortment of wireless mobile nodes with no fixed infrastructure is known as Mobile Adhoc NETwork (MANET). MANETs found its application where quick sharing of data is desired without any fixed infrastructure such as online conferences, emergency search during natural disasters management operations, defense, and online meetings and many more. In MANET all the nodes are permitted to change their geographic locations arbitrarily [3]. These networks have dynamic topology which faces the challenge of limited bandwidth wireless network. This is because of the shared nature of MANET which has limited bandwidth, transmission power, limited range of wireless devices and battery limitation. This paper proposed a new protocol namely SA-Dynamic Source Routing Protocol (SA-DSR).
APA, Harvard, Vancouver, ISO, and other styles
12

Dr.S.Brilly, Sangeetha. "CHALLENGES FACING ADHOC NETWORKS Vs ROUTING." International Journal of Advances in Engineering & Scientific Research 2, no. 9 (2024): 43–65. https://doi.org/10.5281/zenodo.10746325.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <em>Adhoc networks are rapidly deployable, self configuring and known for existing infrastructure. It has Wireless links and the nodes are mobile, topology can be very dynamic. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks(Internet).</em> <em>&nbsp;Ad hoc networks are infrastructure Networks with fixed, wired backbone . Mobile communicates directly with access points . Suitable for locations where access points can be placed For eg) Cellular networks</em> Keywords&nbsp; <em>Adhoc networks, Wireless links, MANET, Cellular networks</em>
APA, Harvard, Vancouver, ISO, and other styles
13

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protocols, including Dynamic Source Routing (DSR), Ad-hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance-Vector Routing (DSDV), and Ad-hoc On-Demand Distance Vector (AODV). The performance analysis is done using the NS2.35 simulator.
APA, Harvard, Vancouver, ISO, and other styles
14

Davinder Singh and Dr. Mohit Gupta. "An Analysis of Routing Protocol in Mobile Adhoc Networks and its Applications." Journal of Advances and Scholarly Researches in Allied Education 21, no. 1 (2024): 87–91. http://dx.doi.org/10.29070/6fshs522.

Full text
Abstract:
Each hub in a mobile ad-hoc network (MANET) sends parcels bound for different hubs in the network by means of remote (radio transmission) transmission on a wilful premise, making it a self-beginning, powerful network made up of mobile hubs. Multi-bounce transferring is the essential inspiration for the advancement of ad hoc networking. Remote Ad hoc networks, otherwise called foundation less networks, can be set up rapidly and effectively using radio waves as the network's transmission channel. There is no principal server or referee in an ad hoc network. Every hub in a MANET is fit for playing out its own networking errands, for example, routing and bundle sending, in a decentralized and independent style. Uses of routing protocols like Ad hoc On-request Distance Routing Protocol (AODV), Dynamic Source Routing (DSR), Transiently Requested Routing Calculation (TORA), and Enhanced Connection State Routing (OLSR) are fascinating in light of the fact that routing is the focal issue in MANETs. These routing protocols are simulated using OPNET, and their effectiveness is investigated using various metrics. With the use of metrics, the most efficient channel for data transfer can be determined. The results demonstrate the viability of AODV and TORA for topology-changing in large-scale networks using a variety of criteria.
APA, Harvard, Vancouver, ISO, and other styles
15

Dr.M.M.Karthikeyan and Dr.G.M.A.Christy. "Proposed Hybrid Congestion Control Algorithm (HCCA) Using Mobile Adhoc Network." Partners Universal International Research Journal (PUIRJ) ISSN: 2583-5602 02, no. 01 (2023): 35–46. https://doi.org/10.5281/zenodo.7723369.

Full text
Abstract:
A mobile ad hoc network (MANET) is a group of mobile, wireless nodes which helpfully and unexpectedly structure an IP-based network. Nodes that are a piece of the MANET, yet past one another&#39;s wireless range impart utilizing a multi-hop course through different nodes in the network. The decision of scheduling process which queued packet to process next will significantly affect the general end-to-end execution when traffic load is high. There are a few scheduling strategies for different network situations. It is seen that totally lowering the delays isn&#39;t for all intents and purposes conceivable, nonetheless, delays can be controlled to go past certain threshold range. Hybrid Congestion Control is employed to minimize congestion in MANETs through optimal data handling. The proposed model in our work is an innovative method to manage congestion alongside reduction in time taken for transmission.
APA, Harvard, Vancouver, ISO, and other styles
16

Makkar, Amandeep, Mukesh Kumar, and Sunil Taneja. "Formulation and Implementation of Energy Efficient Routing Algorithm for MANET along with Performance Analysis." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 04 (2022): 133–40. http://dx.doi.org/10.18090/samriddhi.v14i04.21.

Full text
Abstract:
Mobile adhoc network (MANET) is composed of wireless mobile nodes/devices which are moving randomly in infrastructure-less adhoc environments. Topology among mobile nodes is dynamic in nature and keeps on changing regularly. The adhoc environment is open to all the genuine users as well as intruders/attackers. Moreover, the wireless connection between mobile nodes can break at any time on account of mobility of nodes. Also, the mobile notes depend on their battery power, which may go down because of exhaust of battery power. Hence, it is a very complex task to implement energy efficient routing over MANET. While handling energy efficient routing, the optimum utilization of batter power is required. In this research paper, efforts have been carried out to formulate an algorithm for energy efficient routing over MANET. Its performance has been studied through network simulator. The simulations have been carried out by writing self created network scenarios with 20, 60 and 100 mobile nodes. Moreover, analysis of the proposed energy efficient routing protocol has been done with AODV routing protocol by using various performance evaluation metrics viz. packet delivery ratio, normalized routing load, average end to end delay, packet loss, throughput, average energy consumed and average energy left. It was derived from the performance analysis that proposed protocol provides energy efficient routing over MANET and also gives better or almost same performance in comparison to AODV.
APA, Harvard, Vancouver, ISO, and other styles
17

M., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.

Full text
Abstract:
Mobile Ad hoc Network is a self-configured network, the main responsibility faced in the network is security. Malicious nodes are mostly to blame for the insecurity of MANET. The malicious attacker nodes will disrupt the overall functioning of the network, and many security solution approaches are utilized for safe and reliable communication in MANET to stop such harmful activity. This routing, known as Hybrid Trust Cluster based Multiple Routing (H-TCMR), helps to minimize the amount of messages carried inside the network, lowering the network's total energy usage. It utilizes Hybrid Time Division Multiple Access (HTDMA) for time slots and the Unified Slot Assignment Protocol (USAP) for cluster allocation. Using Hybrid Rider Optimization Algorithm (HROA) approaches, a group of riders will drive together to a specified location in order to obtain the cluster head slot. The suggested approach encrypts the data before sending it to its final destination. It also helps to extend the life of mobile networks. Some of the factors considered in simulation studies include connection, energy, average delay, throughput, as well as overall cluster quality. The simulation result demonstrates a performance study of HTCMR's dependable security, as well as increased system efficiency and improved data transfer security.
APA, Harvard, Vancouver, ISO, and other styles
18

Syed S, Syes Abdul, and T. Senthil Kumaran. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp306-310.

Full text
Abstract:
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
19

S., Syes Abdul Syed, and Senthil Kumaran T. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306–10. https://doi.org/10.11591/ijeecs.v9.i2.pp306-310.

Full text
Abstract:
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
20

Bapu, Tapas, Anitha R, Soundararajan S, Nagaraju V, Partheeban Nagappan, and Daniel A. "GAMAN – Genetic Algorithm in Mobile Adhoc Networks for Creating Systematic QoS." ECS Transactions 107, no. 1 (2022): 3599–607. http://dx.doi.org/10.1149/10701.3599ecst.

Full text
Abstract:
MANET is a mobile adhoc network that is made of several mobile nodes that can communicate in multi-way without any fixed or regular infrastructure. Due to its special features, such as its self-organization, easy deployment it has been preferred for many military and civil applications. MANET has also gained popularity in the multimedia field. MANET has certain levels of requirements, such as QoS (Quality of Service), jitter and energy, bandwidth, and end-2-end delay. MANET’s one of the basic requirements is having QoS and should have efficient routing to support other applications. In this research paper, a special Genetic Algorithm known as the GA algorithm based on routing on a mobile adhoc network is designed and termed as GAMAN. The proposed model uses a 2 QoS system for routing. The outcome of this paper showed that the GAMAN method is a significant one for QoS in MANET.
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be discover complex properties of mobile ad hoc networks and evolve intrusion detection programs suitable for this new environment. Programs evolved using Grammatical Evolution techniques which is part of Evolutionary Computation, will be able to detect specific routing attacks on mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
22

Kumari, Ranjana, and Achint Chugh. "DDoS Attacks Detection and Prevention in Mobile Adhoc Network: A Survey." International Journal of Emerging Research in Management and Technology 7, no. 1 (2018): 29. http://dx.doi.org/10.23956/ijermt.v7i1.20.

Full text
Abstract:
Ad-hoc system is a gathering of wireless movable nodes enthusiastically creating a momentary network lacking the use of any core-existing centralized administration or network infrastructure. MANET has some limitations owing to infrastructure, mobility, capabilities of mobile nodes or due to system as a whole. Limitations due to infrastructure or system, Broadcast nature of communications, frequent disconnections / partitions, Limited bandwidth, packet loss due to transmission error, variable capacity links. Cooperative procedures, Exposed medium, dynamically varying system topology, inadequacy of centralized monitoring, Nonexistence of clear line of resistance. There is no layered security in MANETs like in wired network. Data packets routed between a sender node (source) and a receiver node (destination) of a MANET often traverse along a path spanning multiple links, which is known as the multihop path. The paper provides survey to DDoS attacks prevention and detection methods.
APA, Harvard, Vancouver, ISO, and other styles
23

Patel, Deepak Kumar, and Rakesh Kumar. "A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 495–508. http://dx.doi.org/10.24297/ijct.v4i2b2.3315.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through some routing protocol. But whenever any mobile node want to communicate a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes These Gateway nodes act as a bridge between the mobile ad hoc networks and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet.
APA, Harvard, Vancouver, ISO, and other styles
24

Sd Salman Ali, Sd Salman Ali. "Mobile Adhoc Network (MANET) Routing Protocols Analytical Study." IOSR Journal of Computer Engineering 10, no. 4 (2013): 25–32. http://dx.doi.org/10.9790/0661-01042532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Thakur, Priyanka, and Sukhpreet Kaur. "Optimized Routing Protocols- Enhancement in Mobile Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 253–60. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.253.

Full text
Abstract:
The recent developments in wireless technology have piqued academics' curiosity. Mobile Adhoc Networks (MANET) is a fast-growing networking architecture used in emergency, disaster, and tactical operations applications. It covers a wide range of applications with some degradation due to its flexible and expandable nature. Because routing is the primary function of wireless networks, routing protocol design is critical in Adhoc networks. Various methods have been used to improve the performance of current routing protocols in different categories. Technical advances in routing protocols have recently been achieved, combined with optimization approaches to improve the overall performance of MANETs routing protocols. This research initially looked at several sorts of routing protocols before going through their variations for energy economy and latency reduction. The previous protocols, which were created utilizing optimization methods, will then illustrate the current requirement. Finally, the review analysis delves into many aspects such as commonly used protocols, optimization techniques, QoS parameters, performance metrics, and future paths.
APA, Harvard, Vancouver, ISO, and other styles
26

Chauhan, Naveen, Lalit K. Awasthi, and Narottam Chand. "Cache Replacement in Mobile Adhoc Networks." International Journal of Distributed Systems and Technologies 3, no. 2 (2012): 22–38. http://dx.doi.org/10.4018/jdst.2012040102.

Full text
Abstract:
Caching of frequently accessed data in Mobile Adhoc NETwork (MANET) is a technique that can improve data access performance and availability. In the situation of sufficient cache space one may think of keeping all the data items in the cache. However, this has overhead in terms of multiple copies of same data distributed all over the network and there are chances of inconsistency of data among different nodes. The main objective of cooperative caching is the optimum utilization of cache by storing different data items in the cache of each Mobile Node (MN). By doing this, different sets of items are kept in the neighboring MNs. As and when some MN requires a data item which is not available with itself it may ask the neighboring nodes for the same. In this manner cooperative caching environment is created in MANETs. Cache replacement is required when certain items are to be stored in the cache, but MN does not have the sufficient space to store the incoming item. This paper proposes a Profit Based Replacement (PBR) where profit value is calculated for every item in the cache. Simulation experiments demonstrate that the PBR improves the cooperative caching performance in comparison to other conventional techniques.
APA, Harvard, Vancouver, ISO, and other styles
27

Shashidhara, D. N., D. N. Chandrappa, and C. Puttamadappa. "An Efficient Content Prefetching Method for Cloud Based Mobile Adhoc Network." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4162–66. http://dx.doi.org/10.1166/jctn.2020.9038.

Full text
Abstract:
Recently, Mobile Ad-hoc Networks (MANETs) has emerged as a very important research area for provisioning service for remote client through internet, cloud computing, and cellular network. This work focusses on improving image access in MANET. Various method has been present recently for reducing data access and reduce query latency. Number challenges need to addressed such as caching, content prefetching, shared access environment, dynamic high speed node mobility environment etc. As mobile adhoc network is growing rapidly for the possessions of its capability in forming provisional network without the requirement of any predefined infrastructure, improving throughput (i.e., access rate), reducing bit error rate (BER) (i.e., query latency) has been a major concern and requirement in mobile adhoc network. This work aimed at building an efficient content prefetching technique of geographically distributed data for enhancing the access rate and reduce query latency. Along with, our model can minimize processing time and cost for carrying content prefetching operation. Experiment result shows the proposed content prefetching method improves bit error rate (BER) and throughput performance.
APA, Harvard, Vancouver, ISO, and other styles
28

Ahirwal, Ramratan, Nitesh Kumar Chaurasiya, and Yogendra Kumar Jain. "An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (2013): 3147–57. http://dx.doi.org/10.24297/ijct.v12i1.3368.

Full text
Abstract:
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no inner control in a MANET, a mobile node itself acts as a router. Undoubtedly, MANETs plays a critical job in situations where a wired infrastructure is neither available nor easy to install. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. The end-to-end throughput degrades rapidly with increase in number of hops. This is one of the biggest problems in MANET.In this paper we introduce an algorithm for avoiding congestion in MANETs. The algorithm demonstrates fast response and superior stability with the controlled packet dropping rate, and reduces end-to-end delay in MANETs, while still fully utilizing the network resources. Analysis and simulation show the strength and robustness of the algorithm. This method is simple and easy to use. We also illustrate the advantages of our proposed approach by comparing its results with standard AODV with recommended parameter settings.
APA, Harvard, Vancouver, ISO, and other styles
29

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-reconfiguration nature of the system which does not depend on any settled infrastructure-based foundation. There is dynamic change in its topology because of rapidly moving versatile nodes. This article features few security issues emerging because of network matter among robots and proposes a lively MANET-based automated convention called PD-ROBO with a committed Intrusion Detection System (IDS) structure that utilizations portable operator method to stay away from replay assault in mechanical based MANET.
APA, Harvard, Vancouver, ISO, and other styles
30

M, Duraipandian. "PERFORMANCE EVALUATION OF ROUTING ALGORITHM FOR MANET BASED ON THE MACHINE LEARNING TECHNIQUES." Journal of Trends in Computer Science and Smart Technology 01, no. 01 (2019): 25–38. http://dx.doi.org/10.36548/jtcsst.2019.1.003.

Full text
Abstract:
The rapid advances in wireless communication technology has led to an extraordinary progress in the adhoc type of networking. The mobile adhoc networks being a subtype of the adhoc network almost poses the same characteristics of the adhoc network, presenting multiple challenges in framing a route for the transmission of the information from the source to the destination. So the paper proposes a routing method developed based on the reinforcement learning, exploiting the node information’s to establish a route that is short and stable. The proposed method scopes to minimize the energy consumption, transmission delay, and improve the delivery ratio of the packets, enhancing the throughput. The efficiency of the proposed method is determined by validating its performance in the network simulator-II, in terms of the energy consumption, delay in the transmission and the packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
31

Nagaraju, M., K. Raghava Rao, and K. Vijayalakshmi. "Efficient way of implementing the random and GM (Gauss-Markov) mobility model in MANET." International Journal of Engineering & Technology 7, no. 2.7 (2018): 270. http://dx.doi.org/10.14419/ijet.v7i2.7.10595.

Full text
Abstract:
In Mobile Adhoc Network (MANET) nodes are communicating each other with the help of routing protocol. In Adhoc networks, a node having high mobility, with that node’s moving randomly from node to node. For observing the movement mobility, we are studying different forms of mobility. These models can deploy the mobility of the network condition, including the various parameters such as the size of the network, traffic models of data, throughput and the PDR (Packet Delivery Ratio) are used as performance Parameters. We are investigating the RWP (Random Waypoint) and GM (Gauss-Markov) mobility model to express efficiency of Adhoc routing protocol by using the OMNET++ simulator .The result of the simulator shows that the mobility has more influence upon MANET protocol with the increasing node density. Here, we evaluated RWP and GM mobility model with AODV protocol. The study of these models illustrates dissimilar outcomes related inputs with the increasing performance of the pause time rises among the speed and number of nodes.
APA, Harvard, Vancouver, ISO, and other styles
32

J, Martin Sahayaraj, Sendhil Kumar Dr.N.C., Mukunthan Dr. P., Tamilarasan N, and Jaya Pratha S. "IEEHR: Improved Energy Efficient Honeycomb based Routing in MANET for Improving Network Performance and Longevity." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 7 (2022): 85–93. http://dx.doi.org/10.17762/ijritcc.v10i7.5575.

Full text
Abstract:
In present scenario, efficient energy conservation has been the greatest focus in Mobile Adhoc Networks (MANETs). Typically, the energy consumption rate of dense networks is to be reduced by proper topological management. Honeycomb based model is an efficient parallel computing technique, which can manage the topological structures in a promising manner. Moreover, discovering optimal routes in MANET is the most significant task, to be considered with energy efficiency. With that motive, this paper presents a model called Improved Energy Efficient Honeycomb based Routing (IEEHR) in MANET. The model combines the Honeycomb based area coverage with Location-Aided Routing (LAR), thereby reducing the broadcasting range during the process of path finding. In addition to optimal routing, energy has to be effectively utilized in MANET, since the mobile nodes have energy constraints. When the energy is effectively consumed in a network, the network performance and the network longevity will be increased in respective manner. Here, more amount of energy is preserved during the sleeping state of the mobile nodes, which are further consumed during the process of optimal routing. The designed model has been implemented and analyzed with NS-2 Network Simulator based on the performance factors such as Energy Efficiency, Transmission Delay, Packet Delivery Ratio and Network Lifetime.
APA, Harvard, Vancouver, ISO, and other styles
33

Baby, Basil, and Dr R Suji Pramila. "Survey on analysis of energy optimization in MANET routing." International Journal of Engineering & Technology 7, no. 3 (2018): 1951. http://dx.doi.org/10.14419/ijet.v7i3.15066.

Full text
Abstract:
Mobile Adhoc Network (MANET) is becoming a priority in everyday life due to its flexibility and scalability in networking. All mobile applications using networks are ready to share and receive data and so they are capable of supporting infrastructure less networks. This leads to become MANET a prominent networking solution worldwide. So the research eyes are now focused on how to improve the MA-NET performance. There are so many aspects to be analyzed to improve the performance of the MANET. Load balancing is such a critical issue to be addressed seriously to attain maximum throughput from the MANET. Effective Load balancing can be attained by disseminating data traffic among the mobile nodes so that the equilibrium of the MANET is not violated. This ensures the stability of the entire network which will result in maximum throughput and fault tolerance. This paper analyses and compare the effect of energy optimization used in various existing methods and how better load balancing is achieved.
APA, Harvard, Vancouver, ISO, and other styles
34

Deepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.

Full text
Abstract:
In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases. The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm. This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.
APA, Harvard, Vancouver, ISO, and other styles
35

R, Manikandan, Muruganantham Ponnusamy, Raja K, and Ramkumar M. "IMPROVED ENERGY EFFICIENCY IN MOBILE ADHOC NETWORKS USING MOBILITY BASED ROUTING." ICTACT Journal on Communication Technology 12, no. 1 (2021): 2280–85. http://dx.doi.org/10.21917/ijct.2021.0351.

Full text
Abstract:
Energy conservation is a key element in MANET and so the architecture of the protocol demands particular consideration. Several MANET designs explored processes for the storage of renewable resources. Energy dissipation is a key coordinating factor among MANET nodes. Power utilization is ensured in monitoring applications that battery depletions are lowered to avoid regular substitution. MANET primarily aims to relay data by using energy-efficient routing protocols and an increasing lifespan of the network. The results of the simulation show that the approach suggested improves energy efficiency compared to other approaches. The findings are checked and provide decreased power usage, better packet distribution, lower packet error rate, higher network lifetime and lower end-to-end latency compared to conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
36

Jagadeesan, S., and V. Parthasarathy. "An Efficient multi stage security model based on cross layer mechanism for identifying and preventing black hole attack in wireless ad-hoc networks." International Journal of Engineering & Technology 7, no. 2.31 (2018): 212. http://dx.doi.org/10.14419/ijet.v7i2.31.13445.

Full text
Abstract:
Mobile Adhoc Network (MANET) is one of the popular and highly demanded networks functioning under wireless adhoc network. It has high demand by various emerging applications in the entire world. MANET and its necessities are increasing day by day. MANET and its various components like node, route and etc., are too dynamic regarding creating, deployment, mobility, speed, join and disconnect from the network. MANET does not require any existing infrastructure whereas it starts functions in any place at any time. Due these reasons various malicious activities are created dynamically and it degrades the performance of the network. This paper focused on detecting and identifying malicious activities one who affects the data directly. Such kind of malicious activity is blackhole attack where it destroys the data during transmission in a route. In order to detect and eliminated blackhole attack this paper focused on monitoring and investigating various functionalities of the network using a Multi Stage Security Model (MSSM). The MSSM is used for detecting and preventing blackhole attacks in MANET which involves investigating cross layer functionalities during data transmission. And it also investigates and analyzes the entire information that is available in the network. This proposed MSSM is simulated in Network Simulation-2 software and the results are verified and the performance is evaluated.
APA, Harvard, Vancouver, ISO, and other styles
37

Bindu, G., R. A. Karthika, and S. Sridevi. "A study on reliability of Manets using trust management system." International Journal of Engineering & Technology 7, no. 2.21 (2018): 402. http://dx.doi.org/10.14419/ijet.v7i2.21.12452.

Full text
Abstract:
Mobile Adhoc Networks is a network where nodes keep moving geographically and doesn’t have an infrastructure. This network is a challenging when interactions are critical to attain system goals like reliability, configurability, capability to increase the size of networks, rapid changes in topology of network, this effects the new nodes entering the network easily to attack. This makes difficult to maintain Trust management in the MANET. To overcome this, few algorithms are developed for Trust management. In this paper we discussed the different types of MANET, Applications, protocols and Trust management schemes. We tried to derive the trust management from different fields.
APA, Harvard, Vancouver, ISO, and other styles
38

Prakash, Deo, Neeraj Kumar, and M. L. Garg. "Optimized Routing for Efficient Data Dissemination in MANET to Meet the Fast-Changing Technology." Journal of Global Information Management 26, no. 3 (2018): 25–36. http://dx.doi.org/10.4018/jgim.2018070103.

Full text
Abstract:
Mobile Adhoc Network (MANET) is a dynamic network without any centralized control. Due to frequent topological change, routing has been always a challenging task in these networks. This article presents optimized routing for efficient data dissemination in MANETs to meet the fast-changing technology of today's world. A novel metric for such optimized routing in MANET is proposed. The main parameters considered to evaluate this metric are the energy consumed during the communication, link stability, Packet Delivery Ratio (PDR) and traffic. The concept is based on a scenario in which a mobile node (source) sends data packets to another mobile node (destination) through its dynamically connected neighboring nodes. The path which consumes the lowest energy and also shows highest link stability is selected for consideration. In case the paths consume the same amount of energy, the highest stable path is chosen. In this manner, the most optimized path is selected. The authors' routing approach shows more efficiency than earlier in dissemination of data and information over the Mobile Ad-Hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Felemban, Emad, Adil A. Sheikh, and Atif Naseer. "Improving Response Time for Crowd Management in Hajj." Computers 10, no. 4 (2021): 46. http://dx.doi.org/10.3390/computers10040046.

Full text
Abstract:
Flying Adhoc Network (FANET) is a particular type of Mobile Adhoc Network (MANET) that consists of flying drones or unmanned aerial vehicles (UAVs). MANETs are especially useful in rural and remote areas, where the lack of public networks necessitates data delivery through mobile nodes. Additionally, FANETs provide better coverage where there is a lack of roads. Generally, the goal of FANETs is to provide multimedia data to applications such as search and rescue operations, forest fire detection, surveillance and patrol, environmental monitoring, and traffic and urban monitoring. The above applications’ performance and efficiency depend on the quality and timely delivery of these essential data from an area of interest to control centers. This paper presents a Priority-based Routing Framework for Flying Adhoc Networks (PRoFFAN) for the expedited delivery of essential multimedia data to control centers. PRoFFAN reduces the FANET application’s response time by prioritizing the sending and forwarding of critical image data from the UAV to the control center. Our motivation application is crowd management; we believe that having important image features as early as possible will save lives and enhance the crowd’s safety and flow. We integrated PRoFFAN over the RPL routing layer of Contiki-NG’s IPv6 network stack. We used simulations in Cooja to demonstrate the benefit of PRoFFAN over conventional ZigBee.
APA, Harvard, Vancouver, ISO, and other styles
40

Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.

Full text
Abstract:
In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.
APA, Harvard, Vancouver, ISO, and other styles
41

Yaser, Khamayseh, Bani Yassein Muneer, and Abu-Jazoh Mai. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968–77. https://doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
42

Chethan, B. K., Siddappa M., and H. S. Jayanna. "Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1561–69. https://doi.org/10.11591/ijece.v10i2.pp1561-1569.

Full text
Abstract:
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
APA, Harvard, Vancouver, ISO, and other styles
43

Khamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
&lt;div class="WordSection1"&gt;&lt;p&gt;Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.&lt;/p&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
44

Thamizhmaran, K. "Efficient Dynamic Acknowledgement Scheme for Manet." Journal of Advanced Research in Embedded System 07, no. 3&4 (2021): 1–6. http://dx.doi.org/10.24321/2395.3802.202005.

Full text
Abstract:
Mobile Adhoc Networks (MANET) is the decentralized type of network and it does not rely on pre-existing infrastructure. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. The Energy Efficiency continues to be a key factor in limitingthe deploy ability of ad-hoc networks. Deployingan energy efficient system exploiting themaximum life time of the network has remained agreat challenge since years. The major concern inWireless network in recent days is Energy Consumption. There are numerous algorithms proposed to overcome this issue. In this paper proposed a new intrusion detection system is Enhanced Adaptive 3 Acknowledgement (EA3ACK) using Energy Efficiency Dynamic State (EEDS) algorithm. This algorithmis designed to increase the network lifetime and remaining energy bycontinuously monitoring the individual nodes inthe network, thereby it increases the quality ofservice of the network. Network Simulator (NS2) is used to implement &amp; test our proposed system. The proposed EEDS- EA3ACK algorithm provides secure transmission &amp; further it improves network performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Patel, Suraj. "Performance Analysis of Routing Protocols in Mobile Ad-hoc Networks (MANETs) Using NS2: A Comparative Study of AODV, DSR, and DSDV." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem37624.

Full text
Abstract:
MANET stands for Mobile Adhoc Network also called a wireless Adhoc network or Adhoc wireless network that usually has a routable networking environment on top of a Link Layer ad hoc network. A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. The characteristics of an ad-hoc network can be explored on the base of routing protocols. Simulation can be defined as “Imitating or estimating how actions might happen in a real situation”. It can engage in the complex mathematical modeling, combinations and role playing without the aid of technology. The value deceit in the pacing you under realistic conditions that modify as a result of behavior of others involved, so you cannot expect the sequence of events or the final result. For this purpose we first study and explain these protocols and then we use the Network Simulator – 2.35 (NS2) tool and analysis the performance metrics Packet Delivery ratio, End to End delay, Throughput and Residual Energy. Keywords: Ad-hoc Network, DSDV, NS2, AODV, DSR, Routing Protocols.
APA, Harvard, Vancouver, ISO, and other styles
46

B. K., Chethan, M. Siddappa, and Jayanna H. S. "Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1561. http://dx.doi.org/10.11591/ijece.v10i2.pp1561-1569.

Full text
Abstract:
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
APA, Harvard, Vancouver, ISO, and other styles
47

Khalfaoui, Hafida, Abderrazak Farchane, and Said Saf. "Decentralized Authentication Mechanism for Mobile Ad hoc Networks." Infocommunications journal 14, no. 3 (2022): 28–34. http://dx.doi.org/10.36244/icj.2022.3.4.

Full text
Abstract:
Covid 19 has dramatically changed people’s lives around the world. It has shut down schools, companies and workplaces, forcing individuals to stay at home and comply to quarantine orders. Thus, individuals have resorted to the Internet as a means for communicating and sharing information in different domains. Unfortunately, some communities are still unserved by commercial service providers. Mobile Adhoc Network (MANET) can be used to fill this gap. One of the core issues in MANET is the authentication of the participating nodes. This mechanism is a fundamental requirement for implementing access control to network resources by confirming a user’s identity. In recent years, security experts worldwide proposed distributed authentication for MANET due to the lack of a central authority to register and authenticate nodes. In this article, decentralized authentication based on the technology of fog computing and the concept of the blockchain is proposed. The evaluation of this mechanism satisfies the diverse security requirements and strongly protects the networks from attacks.
APA, Harvard, Vancouver, ISO, and other styles
48

K.Thamizhmaran. "Service Orientated Distributed for Mobile Ad hoc Networks." Journal of Research and Advancement in Electrical Engineering 8, no. 1 (2025): 30–37. https://doi.org/10.5281/zenodo.15210485.

Full text
Abstract:
<em>&nbsp;One of the most important unwired communication technologies is the Mobile Adhoc Network (MANET), in which every mobile node is mobile and can be randomly connected to other mobile nodes via a wireless link. For wireless applications, it can meet Quality of Service (QoS) standards during real-time update transmission. However, it includes vital mission applications such as emergency recovery or military use. Effective Secure Quality Oriented Distributed (S-QOD) Secure Enhanced Adaptive 3 Acknowledgments (S-EA3ACK) were proposed in this study. Install a fresh intrusion detection system for wireless networks that are used on demand. For Enhanced Adaptive 3 ACKs (S-EA3ACK), which use EAACK (DSA) with MAJE4 symmetric cryptography specifically created for MANET through Network Simulator-2.34 (NS2) to implement it, SQOD can enhance the best performance of output quality (QoS) to decrease transmission delay, transmission time, and also increase network communication throughput.</em>
APA, Harvard, Vancouver, ISO, and other styles
49

Sangeetha, T., and M. S. K. Manikandan. "PCCAMN—Path Constancy Based Channel Assignment in Mobile ADHOC Network for Healthcare Data Transmission." Journal of Medical Imaging and Health Informatics 11, no. 11 (2021): 2853–58. http://dx.doi.org/10.1166/jmihi.2021.3879.

Full text
Abstract:
A MANET is a self-governing network for mobile devices in many crucial domains, including health care, for transmitting health data of the patients. The key challenge in MANETS is maintaining the links between devices under mobility; it creates limitless network disconnections and path loss frequently. Such issues, raises network delay and minimize packet delivery ratio (PDR) and entire set-up throughput brings reduced quality of services (QOS). To get better QoS, stable path selection and link disconnection count based nearby device selection carried out in this work. It’s on this basis that the thesis is exploring the design and the analysis of the FPC. The FPC is designed in network simulator with the support of optimized fuzzy logic (FL). It has obtained three inputs which is fallout to 27 set of laws. This law sets (LS) direct in the fortitude of the precedence to select best path set to transmit a packets from sender to destination. The analyses are with previous protocols of Distributed Admission Control Protocol (DACP) and Call Admission Protocol of MANET. The outcome results monitored with delay, Packet Delivery Ratio (PDR), throughput and overheads as the QOS metrics of network.
APA, Harvard, Vancouver, ISO, and other styles
50

Hemalatha, S., Nileshkumar Patel, Ajay Kumar, et al. "MANET Hidden and Exposed Terminal - Challenges and Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (2023): 48–51. http://dx.doi.org/10.17762/ijritcc.v11i10s.7593.

Full text
Abstract:
Mobile Adhoc Network (MANET)is a self organized wireless Network which was created to communicate among the nodes without support of the any Infrastructure. While transmission of the packets between the nodes, many challenges the every nodes faces. One of the Major challenges is Hidden and Exposed nodes issues in the MANET. This causes the packet drop or packet failure while the transmitting the packets. Also which reflects in degrades the throughput of the MANET and performance of the MANET nodes when the heavy traffic ,retransmission of the dropped packets delayed the communication. This article discussed about hidden and Exposed terminal problem and challenges in MANET and also dissimilar survey in MANET.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography