To see the other types of publications on this topic, follow the link: Mobile ad hoc network.

Journal articles on the topic 'Mobile ad hoc network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile ad hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-configuration characteristics or behavior, mobile ad hoc networks (MANET) have achieved great success and attention. Routing attacks are used to quickly alter the network topology of MANETs based on wired and wireless networks. Therefore, securing this network without infrastructure is a big problem. In recent years, experts from all over the worldhave paid particular attention to research on improving the performance of mobile ad-hoc networks (MANETs). Routing methods are especially crucial in a dynamic network environment like MANET for enhancing overall network performance. In addition to discussing the technical difficulties that protocol designers and network engineers must overcome, this paper offers insight into the possible applications of ad hoc networks. Routing, service and resource discovery, Internet access, billing, and security are some of these difficulties.
APA, Harvard, Vancouver, ISO, and other styles
3

Kasem Mohammed, Abdulghani Saif, and Khalid Hamid Bilal. "Survey of mobile ad hoc networks (manets)." International Journal of Engineering and Computer Science 8, no. 02 (2019): 24484–90. http://dx.doi.org/10.18535/ijecs.v8i02.4229.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of MANET and challenges that are imposed by Mobile ad-hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Cai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.

Full text
Abstract:
A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly analyzes the routing attacks of mobile Ad hoc networking, then elaborates and compares some ad hoc secure routing protocols, at last points the future researches.
APA, Harvard, Vancouver, ISO, and other styles
5

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

Misra, Rahul, and Prashant Sharma. "Challenges in Mobile Ad Hoc Network for Secure Data Transmission." International Journal of Electrical and Electronics Research 1, no. 1 (2013): 8–12. http://dx.doi.org/10.37391/ijeer.010103.

Full text
Abstract:
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR (Dynamic Source Routing). The Location Aided Routing protocol uses location information to reduce routing overhead of the ad-hoc network! Normally the LAR protocol uses the GPS (Global Positioning System) to get these location information’s. With the availability of GPS, the mobile hosts knows there physical location. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks - multiple routes between nodes to defend routing against denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Thamizhmaran, K. "Performance of Mobile Ad-Hoc Network." Journal of VLSI Design and Signal Processing 6, no. 2 (2020): 22–25. http://dx.doi.org/10.46610/jovdsp.2020.v06i02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kokate, Tejashree, and Ram Joshi. "Mobile Ad Hoc Network Security Issues." International Journal of Computer Applications 108, no. 16 (2014): 6–9. http://dx.doi.org/10.5120/18993-0447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Palanisamy, B., N. Karthik, K. Chandrakumar, K. Thirunavukkarasu, and R. Jayasudha. "Improving Network Security in Mobile Ad Hoc Networks." Journal of Computational and Theoretical Nanoscience 16, no. 5 (2019): 2299–301. http://dx.doi.org/10.1166/jctn.2019.7888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

VikramPhaneendra, S., Sreenivasulu T, and B. Jalaja Kumari. "Identifying Stable Network in Mobile Ad-Hoc Networks." International Journal of Computer Applications 43, no. 18 (2012): 22–25. http://dx.doi.org/10.5120/6204-8761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Hai Yan, Jun Qiang Yang, and Hui Li. "Research for Network Security Mechanism of Ad Hoc Network." Advanced Materials Research 926-930 (May 2014): 2006–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2006.

Full text
Abstract:
Ad Hoc network is a special kind of mobile multi-hop wireless networks, which has been widely used various occasions. In this paper, the main characters of Ad Hoc network are presented. Meanwhile, based on the inherent defect and security threats of Ad Hoc network, the corresponding security mechanism and strategy are proposed.
APA, Harvard, Vancouver, ISO, and other styles
12

Ragab, Ahmed Refaat Sobhy Ahmed. "A New Classification for Ad-Hoc Network." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 14 (2020): 214. http://dx.doi.org/10.3991/ijim.v14i14.14871.

Full text
Abstract:
<span>This paper focus on developing a new practical classification for ad-hoc networks, were all the past classifications revolve upon three main categories respectively, mobile ad- hoc network (MANET), Vehicle ad-hoc network (VANET) and Flying ad-hoc network (FANET). My new classification will illustrate Underwater vehicle ad-hoc network (UWVANET) as the fourth category in ad-hoc main classification, showing the powerful and the weakness of each category defined.</span>
APA, Harvard, Vancouver, ISO, and other styles
13

Kadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (2021): 1446. http://dx.doi.org/10.3390/electronics10121446.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Rong Xin, Chao Mei Zheng, and Ling Chai. "Study on Power-Aware Routing Mechanism in MANET." Applied Mechanics and Materials 263-266 (December 2012): 1100–1104. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1100.

Full text
Abstract:
A mobile ad hoc networks (MANET) is a group of mobile wireless nodes which communicate without any fixed networking infrastructure. The nodes in an ad hoc mobile network are typically powered by batteries with a limited energy supply. For MANETs, One of the most important and challenging issues is how to conserve energy, maximizing the network lifetime.Since routing is an essential function in these networks, developing power-aware routing protocols has been an intensive research area in recent years. As a result, many power-aware routing protocols have been proposed from a variety of perspectives. In this article,we propose and analyse the model of power consumption in ad hoc network, present different power-aware metrics base on power consumption and survey some power-aware routing protocols proposed for mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
16

Kumaran, U., A. Ramachandran, J. Jegan, and E. K. Subramanian. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (2020): 949. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp949-956.

Full text
Abstract:
<p>A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network). Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms to understand the strengths &amp; threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks. The methodology of honeypot detects and isolates the attacks of the black hole. The results prove better delivery of packets with decreased load of the network.</p>
APA, Harvard, Vancouver, ISO, and other styles
17

Chowdhuri, Swati, Sayan Chakraborty, Nilanjan Dey, et al. "Recent Research on Multi Input Multi Output (MIMO) based Mobile ad hoc Network." International Journal of Service Science, Management, Engineering, and Technology 5, no. 3 (2014): 54–65. http://dx.doi.org/10.4018/ijssmet.2014070104.

Full text
Abstract:
Mobile ad hoc Network (MANET) and Multi Input Multi Output (MIMO) communication are emerging techniques in modern communication system. MIMO and MANET have various applications in the wireless communication system. This paper presents a survey on recent advancement of MIMO implemented mobile ad hoc network. A review of more than 40 papers on MIMO communication based mobile ad hoc network and most of the related topics is presented in this work. This paper shows the significant contribution in the field of MIMO communication and mobile ad hoc network. Previous works in this domain can be categorized into four major areas: (a) Mathematical modeling of MIMO channel and Ad hoc networks, (b) Physical Scattering Model of MIMO channel considering fading (c) Spatial multiplexing (OFDM) technique with MIMO channel, (d) Analysis of transmission efficiency of packet radio network. The review paper establishes the advancement in these four areas as well as recent changes in advance communication and networking environments.
APA, Harvard, Vancouver, ISO, and other styles
18

Hussain, Khalid, Abdul Hanan Abdullah, Saleem Iqbal, Khalid M. Awan, and Faraz Ahsan. "Efficient Cluster Head Selection Algorithm for MANET." Journal of Computer Networks and Communications 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/723913.

Full text
Abstract:
In mobile ad hoc network (MANET) cluster head selection is considered a gigantic challenge. In wireless sensor network LEACH protocol can be used to select cluster head on the bases of energy, but it is still a dispute in mobil ad hoc networks and especially when nodes are itinerant. In this paper we proposed an efficient cluster head selection algorithm (ECHSA), for selection of the cluster head efficiently in Mobile ad hoc networks. We evaluate our proposed algorithm through simulation in OMNet++ as well as on test bed; we experience the result according to our assumption. For further evaluation we also compare our proposed protocol with several other protocols like LEACH-C and consequences show perfection.
APA, Harvard, Vancouver, ISO, and other styles
19

Mikarić, Bratislav, Petar Spalević, and Branimir Jakšić. "Mobile ad-hoc networks: MANET." Trendovi u poslovanju 6, no. 2 (2018): 47–60. http://dx.doi.org/10.5937/trendpos1802047m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

., Meenu, Dr Vivek Jaglan, and Akshat Agrawal. "Comparative analysis of power aware routing protocols in mobile ad-hoc network." International Journal of Engineering & Technology 7, no. 2.4 (2018): 170. http://dx.doi.org/10.14419/ijet.v7i2.4.13032.

Full text
Abstract:
The Mobile Ad-Hoc network is a self-governing wireless network having dynamic topology and scattered mobile nodes. Limited power supply is the major challenge in wireless Ad-Hoc networks. Thus, for overall functioning of the ad-hoc network, efficient power conser-vation mechanism becomes the critical and most important component in ad-hoc network. Various power aware routing mechanism have been evolved to preserve energy, prolonging the life span of its nodes and thus of the network itself. Various other metrics for preserving energy also considered viz. selecting shortest path from source to destination, remaining battery power , fair distribution of traffic load among the nodes and minimizing the total transmission power with a view to increase the network life span and link stability. In this paper, various proposed protocols and recent energy conservation mechanisms are studied for mobile ad-hoc network. After analyzing the existing works it has been observed that there are still several areas where we can give more focus in the future.
APA, Harvard, Vancouver, ISO, and other styles
21

An, Qi, Yong Jian Luo, Hai Yan Zhao, and Jing Zhao. "Research on Ad Hoc Network Security Protection Model Based on Mobile Agent." Applied Mechanics and Materials 644-650 (September 2014): 3008–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3008.

Full text
Abstract:
security objectives, and the commonly used Mobile Ad hoc networks security protection technology, and finally discusses the application of mobile Ad hoc network in the field, and their security policy are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
22

Cha, Hyun Jong, Jin Mook Kim, and Hwang Bin Ryou. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network." Applied Mechanics and Materials 224 (November 2012): 520–23. http://dx.doi.org/10.4028/www.scientific.net/amm.224.520.

Full text
Abstract:
A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Jian Lan, and Li Zhu. "Binary Tree Model-Based Mobile Ad Hoc Network Dynamic Address Allocation Mechanism Research." Applied Mechanics and Materials 644-650 (September 2014): 2881–85. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2881.

Full text
Abstract:
Mobile Ad Hoc network is a multihop temporary network composed of a set of mobile intelligent terminals with no center. According to the related questions of mobile Ad Hoc network address configuration, on the basis of the existing application in mobile Ad Hoc network address automatic configuration mechanism, this paper discusses Binary Tree Model-based Dynamic Address Allocation Mechanism. The mechanism dynamically configures a unique address for the nodes according to their relative positions in network topology, reduces control overhead, and with the help of node number, processes network merger and division to effectively address resource management. It has good scalability, and is suitable for mobile Ad Hoc network.
APA, Harvard, Vancouver, ISO, and other styles
24

Al-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, Mangal Sain, and Hoonjae Lee. "Moving Ad Hoc Networks—A Comparative Study." Sustainability 13, no. 11 (2021): 6187. http://dx.doi.org/10.3390/su13116187.

Full text
Abstract:
An ad hoc network is a wireless mobile communication network composed of a group of mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is established temporarily. The mobile nodes of the network use their own wireless transceivers to exchange information; when the information is not within the communication range, other intermediate nodes can be used to relay to achieve communication. They can be widely used in environments that cannot be supported by wired networks or which require communication temporarily, such as military applications, sensor networks, rescue and disaster relief, and emergency response. In MANET, each node acts as a host and as a router, and the nodes are linked through wireless channels in the network. One of the scenarios of MANET is VANET; VANET is supported by several types of fixed infrastructure. Due to its limitations, this infrastructure can support some VANET services and provide fixed network access. FANET is a subset of VANET. SANET is one of the common types of ad hoc networks. This paper could serve as a guide and reference so that readers have a comprehensive and general understanding of wireless ad hoc networks and their routing protocols at a macro level with a lot of good, related papers for reference. However, this is the first paper that discusses the popular types of ad hoc networks along with comparisons and simulation tools for Ad Hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
25

S.SivaNageswara Rao, Dr, Orchu Aruna, and Dr K.Lakshminadh. "Mobile ad hoc network integrated wireless networks: a survey." International Journal of Engineering & Technology 7, no. 1.9 (2018): 217. http://dx.doi.org/10.14419/ijet.v7i1.9.9827.

Full text
Abstract:
Now a day, every one using mobile devices for communicating with others. The development of new technologies, like Internet of Things (IoT) needs coverage, connectivity, scalability and QoS. In ubiquity networks, the major issues are coverage, connectivity, scalability and QoS. To solve these limitations, integrating wireless networks with ad hoc networks. This paper provides detail survey on how ad hoc networks are integrated with Cellular Network, Wireless Mesh Networks and Wireless Sensor Networks. This integration may resolve the problems of coverage, connectivity, scalability and QoS.
APA, Harvard, Vancouver, ISO, and other styles
26

LI, He, KyoungSoo BOK, and JaeSoo YOO. "P2P Based Social Network over Mobile Ad-Hoc Networks." IEICE Transactions on Information and Systems E97.D, no. 3 (2014): 597–600. http://dx.doi.org/10.1587/transinf.e97.d.597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Voulgaris, Spyros, Matthew Dobson, and Maarten Van Steen. "Decentralized Network-Level Synchronization in Mobile Ad Hoc Networks." ACM Transactions on Sensor Networks 12, no. 1 (2016): 1–42. http://dx.doi.org/10.1145/2880223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yadav, Khushbu, and R. K. Bathla. "MAC Issues in Mobile Ad-hoc Network." International Journal of Computer Applications 181, no. 46 (2019): 39–43. http://dx.doi.org/10.5120/ijca2019918629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jamalipour, Abbas. "WHERE IS MOBILE AD HOC NETWORK HEADING?" IEEE Wireless Communications 13, no. 5 (2006): 2–3. http://dx.doi.org/10.1109/wc-m.2006.250349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Patil, Mr S. J. "Efficient Security for Mobile Ad-Hoc Network." IOSR Journal of Electronics and Communication Engineering 3, no. 2 (2012): 20–26. http://dx.doi.org/10.9790/2834-0322026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Radha, S., and S. Shanmugavel. "Mobility Models in Mobile Ad Hoc Network." IETE Journal of Research 53, no. 1 (2007): 3–12. http://dx.doi.org/10.1080/03772063.2007.10876115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lacuesta, Raquel, Jaime Lloret, Sandra Sendra, and Lourdes Peñalver. "Spontaneous Ad Hoc Mobile Cloud Computing Network." Scientific World Journal 2014 (2014): 1–19. http://dx.doi.org/10.1155/2014/232419.

Full text
Abstract:
Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.
APA, Harvard, Vancouver, ISO, and other styles
33

Oksiiuk, Oleksandr, and Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Full text
Abstract:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Patel, Deepak Kumar, and Rakesh Kumar. "A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 495–508. http://dx.doi.org/10.24297/ijct.v4i2b2.3315.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through some routing protocol. But whenever any mobile node want to communicate a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes These Gateway nodes act as a bridge between the mobile ad hoc networks and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet.
APA, Harvard, Vancouver, ISO, and other styles
35

Tiwari, Mahesh kumar, UDAI SHANKAR, and AJAY KUMAR. "EFFICIENT MANET- INTERNET INTEGRATION FOR MOBILE DEVICES." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 1 (2014): 5343–51. http://dx.doi.org/10.24297/ijct.v14i1.2130.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure support. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through Ad-Hoc routing protocols, But whenever any mobile node want to communicate to a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection with the internet node or host. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes. These Gateway nodes act as a bridge between the mobile ad hoc networks node and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet and going to propose a algorithm that reduce the discovery time of the gateway by selective forwarding and simultaneously also optimize the gateway discovery control overheads.
APA, Harvard, Vancouver, ISO, and other styles
36

Rahman, Md Torikur. "An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network MANET." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 409–16. http://dx.doi.org/10.31142/ijtsrd23727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Muchtar, Farkhana, Abdul Hanan Abdullah, Mohd Helmy Abd Wahab, Radzi Ambar, Hafizul Fahri Hanafi, and Siti Nor Zawani Ahmmad. "Mobile Ad hoc Network Testbed Using Mobile Robot Technology." Journal of Physics: Conference Series 1019 (June 2018): 012047. http://dx.doi.org/10.1088/1742-6596/1019/1/012047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Elkabour, Ahmed, and Dr. Rahma Teirab Abaker Haroun. "Mitigating Routing Attacks in Mobile Ad Hoc Networks." International Journal for Innovation Education and Research 7, no. 7 (2019): 227–33. http://dx.doi.org/10.31686/ijier.vol7.iss7.1603.

Full text
Abstract:
Abstract - Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry. Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.
APA, Harvard, Vancouver, ISO, and other styles
39

Manaseer, Saher, and Ibrahem Alhabash. "Number of Node Estimation in Mobile Ad Hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 6 (2017): 65. http://dx.doi.org/10.3991/ijim.v11i6.6986.

Full text
Abstract:
<p class="0keywords">Mobile Ad hoc networks do not have any form of centralized control as per their definition. Therefore, many challenges face the development of efficient protocols for such networks. One of the main challenges is the difficulty of extracting the total number of nodes in the network, this paper aims to find an estimate for this number using the average hop count for messages exchanged in the network. Experiments of this paper are conducted on Ad Hoc networks under DSR and AODV routing protocols. Results show a relation between network size and average hop count that can be used to predict the number of nodes in the network.<strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
40

Bhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.

Full text
Abstract:
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.
APA, Harvard, Vancouver, ISO, and other styles
41

Chowdhuri, Swati, Payel Roy, Srijan Goswami, Ahmad Taher Azar, and Nilanjan Dey. "Rough Set Based Ad Hoc Network." International Journal of Service Science, Management, Engineering, and Technology 5, no. 4 (2014): 66–76. http://dx.doi.org/10.4018/ijssmet.2014100105.

Full text
Abstract:
The ad hoc routing protocol's design has received a huge attention due to the unpredictable and rapid mobility of a node. It is created dynamically without any infrastructure. In ad hoc each node is responsible for routing the information between them. To improve the performance of unused information and to overcome the overhead in maintaining this information the protocols were designed. MANET (Mobile Ad hoc Network) is the collection of wireless mobile nodes which can dynamically form a network. By this definition we can conclude that there is no centralized administration, permanent topology and standard support services. Rough set theory is a computing technique to deal with uncertainty and vagueness. The notion of the thresholds and the temporal extensions to Rough Sets was applied in several protocols. The successful routing in MANETs using the Random Waypoint mobility model was based on various rough sets based protocol.
APA, Harvard, Vancouver, ISO, and other styles
42

Desai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Full text
Abstract:
<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Tarique, Mohammed, and Rumana Islam. "Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks." International Journal of Ad hoc, Sensor & Ubiquitous Computing 12, no. 2 (2021): 1–14. http://dx.doi.org/10.5121/ijasuc.2021.12201.

Full text
Abstract:
This paper presents an investigation on the optimum number of neighbors for mobile ad hoc networks (MANETs). The MANETs are self-configuring and self-organizing networks. In such a network, energyconstrained mobile nodes share limited bandwidth to send their packets to the destinations. The mobile nodes have a limited transmission range and they rely on their neighbors to deliver their packets. Hence, the mobile nodes must be associated with the required (i.e., optimum) number of neighbors. As the number of neighbors is varied, a trade-off exists between the network connectivity and available bandwidth per mobile node. To investigate this issue, we consider Dynamic Source Routing (DSR) as the routing protocol and IEEE 802.11 as the MAC layer protocol in this work. We consider both static and dynamic scenarios in this work. We simulated the ad hoc networks via network simulator (NS-2) and the simulation results show that there exists an optimum number of neighbors for the static case. We also show that mobility has a grave impact on the performance of the MANETs in terms of network throughput, end-to-end delay, energy consumption, and packet loss. Hence, we need to increase the number of neighbors under mobility conditions. However, there is no global optimum number of neighbors for the mobility case.
APA, Harvard, Vancouver, ISO, and other styles
44

Sarao*, Pushpender. "AODV-F: A New on Demand Enhanced Distance Vector Routing in Wireless Network." International Journal of Recent Technology and Engineering (IJRTE) 8, no. 3 (2019): 5183–91. http://dx.doi.org/10.35940/ijrte.c5809.098319.

Full text
Abstract:
Routing process is the main role in wireless ad-hoc networks. It is a very tedious task to complete successfully in mobile ad-hoc networks. Nodes are frequently changing their positions in mobile ad-hoc networks. In such a challenging environment, there are more chances of packet loss. So many routing protocols have been proposed to recover this loss. In this work, we have proposed a new distance vector routing algorithm that is an enhancement of existing routing protocol in mobile ad-hoc networks. We consider node power, hop count, and maximum speed to decide the next hop during the routing process. Trust values have been calculated by applying the rule based system. This trust value will decide the next hop in the network. To evaluate our proposed algorithm, we have simulated this in a network simulator-2 environment. Normalized routing load, throughput, packet delivery fraction, and delay are considered as the performance metrics to evaluate the proposed work.
APA, Harvard, Vancouver, ISO, and other styles
45

Sun, Baolin, Chao Gui, Qifei Zhang, and Hua Chen. "Fuzzy Controller Based QoS Routing Algorithm with a Multiclass Scheme for MANET." International Journal of Computers Communications & Control 4, no. 4 (2009): 427. http://dx.doi.org/10.15837/ijccc.2009.4.2458.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of a set of mobile hosts that can communicate with each other without the assistance of base stations. Due to the dynamic nature of the network topology and restricted resources, quality of service (QoS) and multicast routing in MANET are challenging tasks which attract the interests of many people. In this paper, we present a fuzzy controller based QoS routing algorithm with a multiclass scheme (FQRA) in mobile ad hoc networks. The performance of this scheduler is studied using NS2 (Network Simulator version 2) and evaluated in terms of quantitative measures such as packet delivery ratio, path success ratio and average end-to-end delay. Simulations show that the approach is efficient, promising and applicable in ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
46

NARGUNAM, A. SHAJIN, and M. P. SEBASTIAN. "SECURITY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS." International Journal of Information Acquisition 03, no. 03 (2006): 233–45. http://dx.doi.org/10.1142/s0219878906000988.

Full text
Abstract:
Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure-less networks is how to manage the cryptographic keys that are needed. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These unique characteristics of mobile ad hoc networks such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology cause a number of nontrivial challenges to security design. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non-overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.
APA, Harvard, Vancouver, ISO, and other styles
47

Jahanbakhsh Gudakahriz, S., S. Jamali, M. Vajed Khiavi та A. Soleimany. "A Stable TORA Based for Routing in Mobile Ad Ηoc Networks". Engineering, Technology & Applied Science Research 8, № 1 (2018): 2532–36. http://dx.doi.org/10.48084/etasr.1720.

Full text
Abstract:
A mobile ad hoc network (MANET) is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.
APA, Harvard, Vancouver, ISO, and other styles
48

Abdullahi Mujaheed Saleh, Hasliza Binti Hashim, Omar Faruque, Tadiwa Elisha Nyamasvisva,. "PERFORMANCE ANALYSIS OF GEOGRAPHICAL ROUTING PROTOCOL IN MOBILE AD HOC NETWORK." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 191–97. http://dx.doi.org/10.17762/itii.v9i1.118.

Full text
Abstract:
Wireless technology has brought a very advanced change in the field of the internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) which makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network that consists of a collection of wireless mobile nodes, and the communication between these nodes has been carried out without any centralized authority. There are several network performance metrics, Packet Loss and End-to-End Delay which can be taken into account, for getting a general idea about the performance of the Geographical Routing Protocol in Mobile Ad-Hoc Networks. The proposed research will evaluate the parameters which affect the communication in the Geographical Routing Protocol in Mobile Ad-Hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Kiruthika, S., N. Iswarya, A. Sartiha, K. Kalaivani, and K. Ulaga Priya. "Interference-based topology control algorithm for noise removal and delay-constrained mobile ad hoc networks using clustering technology." International Journal of Engineering & Technology 7, no. 2.21 (2018): 342. http://dx.doi.org/10.14419/ijet.v7i2.21.12400.

Full text
Abstract:
MANET is ad hoc network which is in the top layer of the network. This ad hoc network are connected by mobile devices with flexible topology network to control the delay constrain in the mobile ad hoc network for noise removal in network. The transmission power is managed to minimize the interference taking into account the topology control algorithm also accounts the delay constraint and finds the duplicate data.
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Xiao Kai, Hong Wei Lv, and Rui Long Song. "Research on Gibbs Mobility Model for Ad Hoc Networks in the Contingency-Responding Battle." Advanced Materials Research 926-930 (May 2014): 2018–21. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2018.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) because of its flexible, networking fast, strong anti-destroying ability and other characteristics, is widely used in military, disaster relief, interim meetings and other scenes [1]. Simulation is the primary means of mobile Ad Hoc network research and evaluation of performance, while mobility model is an important component of the performance simulation of Ad Hoc networks. The authenticity of device nodes’ movement in the manner, directly affects the network to evaluate the effectiveness and reliability of the simulation. This paper selects Gibbs group mobility model, and simulate the characteristics of the nodes’ mobility in contingency-responding scene.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography