To see the other types of publications on this topic, follow the link: Mobile Adhoc Network's.

Journal articles on the topic 'Mobile Adhoc Network's'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile Adhoc Network's.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protocols, including Dynamic Source Routing (DSR), Ad-hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance-Vector Routing (DSDV), and Ad-hoc On-Demand Distance Vector (AODV). The performance analysis is done using the NS2.35 simulator.
APA, Harvard, Vancouver, ISO, and other styles
2

Srikanth G. K. "Analysis of Mobile ADHOC Network's Unipath and Multipath Routing Protocols." Journal of Electrical Systems 20, no. 4s (2024): 2388–96. http://dx.doi.org/10.52783/jes.2444.

Full text
Abstract:
A mobile area network, also known as a MANET, is a structure that is constructed by wireless connections that connect mobile devices in order to establish a dynamic architecture. The use of routing protocols is an essential component in the process of data transmission across a network. Multipath and unipath are the two kind of routing protocols that are considered to be the most fundamental. Within the scope of this study, we investigated the effectiveness of two prevalent on-demand routing strategies, namely AOMDV and MDART, as well as AODV, which is a unipath routing protocol. These protocols were chosen because of their superior performance in comparison to their counterparts in a variety of domains, particularly in terms of reducing routing load and delay.
APA, Harvard, Vancouver, ISO, and other styles
3

M., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.

Full text
Abstract:
Mobile Ad hoc Network is a self-configured network, the main responsibility faced in the network is security. Malicious nodes are mostly to blame for the insecurity of MANET. The malicious attacker nodes will disrupt the overall functioning of the network, and many security solution approaches are utilized for safe and reliable communication in MANET to stop such harmful activity. This routing, known as Hybrid Trust Cluster based Multiple Routing (H-TCMR), helps to minimize the amount of messages carried inside the network, lowering the network's total energy usage. It utilizes Hybrid Time Division Multiple Access (HTDMA) for time slots and the Unified Slot Assignment Protocol (USAP) for cluster allocation. Using Hybrid Rider Optimization Algorithm (HROA) approaches, a group of riders will drive together to a specified location in order to obtain the cluster head slot. The suggested approach encrypts the data before sending it to its final destination. It also helps to extend the life of mobile networks. Some of the factors considered in simulation studies include connection, energy, average delay, throughput, as well as overall cluster quality. The simulation result demonstrates a performance study of HTCMR's dependable security, as well as increased system efficiency and improved data transfer security.
APA, Harvard, Vancouver, ISO, and other styles
4

Anandakrishnan, N., and Neena Roshini. "A STUDY ON GEOGRAPHICAL ROUTING WITH ADAPTIVE POSITION UPDATE." International Journal of Engineering Technologies and Management Research 5, no. 3 (2020): 108–15. http://dx.doi.org/10.29121/ijetmr.v5.i3.2018.181.

Full text
Abstract:
Geographical Routing is a routing methodology mainly used for wireless mobile networks (Mobile Adhoc Networks, MANETs). MANETs are comprised of mobile nodes or mobile computing devices which are free to move randomly and thus the network's wireless topology may also change randomly. In Geographical Routing, nodes need to maintain the current positions of their neighbors for making forwarding decisions and hence the Adaptive Position Update (APU) method is proposed. Based on the flexibility of the nodes and the forwarding decisions made in the network, APU dynamically keeps in track of the rate of position updates. It is based on nodes with movements which are complex to predict their updated positions frequently and also the nodes which are closer to forwarding paths and update their positions more frequently. The APU is validated by network simulations showing that APU can potentially reduce the traffic load and acknowledge the mobility of nodes. It also improves the routing performance in terms of packet delivery ratio and packet delays.
APA, Harvard, Vancouver, ISO, and other styles
5

Davinder Singh and Dr. Mohit Gupta. "An Analysis of Routing Protocol in Mobile Adhoc Networks and its Applications." Journal of Advances and Scholarly Researches in Allied Education 21, no. 1 (2024): 87–91. http://dx.doi.org/10.29070/6fshs522.

Full text
Abstract:
Each hub in a mobile ad-hoc network (MANET) sends parcels bound for different hubs in the network by means of remote (radio transmission) transmission on a wilful premise, making it a self-beginning, powerful network made up of mobile hubs. Multi-bounce transferring is the essential inspiration for the advancement of ad hoc networking. Remote Ad hoc networks, otherwise called foundation less networks, can be set up rapidly and effectively using radio waves as the network's transmission channel. There is no principal server or referee in an ad hoc network. Every hub in a MANET is fit for playing out its own networking errands, for example, routing and bundle sending, in a decentralized and independent style. Uses of routing protocols like Ad hoc On-request Distance Routing Protocol (AODV), Dynamic Source Routing (DSR), Transiently Requested Routing Calculation (TORA), and Enhanced Connection State Routing (OLSR) are fascinating in light of the fact that routing is the focal issue in MANETs. These routing protocols are simulated using OPNET, and their effectiveness is investigated using various metrics. With the use of metrics, the most efficient channel for data transfer can be determined. The results demonstrate the viability of AODV and TORA for topology-changing in large-scale networks using a variety of criteria.
APA, Harvard, Vancouver, ISO, and other styles
6

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
7

Murugan, S., and Dr M. Jeyakarthic. "Optimal Deep Neural Network based Classification Model for Intrusion Detection in Mobile Adhoc Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (2019): 1374–87. http://dx.doi.org/10.5373/jardcs/v11sp10/20192983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Veena, Veena, Tanushree Aggarwal, and Nisha Charaya. "Efficient Zone based Multicast RoutingProtocol for Mobile Adhoc Networks." International Journal of Scientific Research 3, no. 7 (2012): 161–64. http://dx.doi.org/10.15373/22778179/july2014/52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 35–48. http://dx.doi.org/10.4018/ijsst.2021010103.

Full text
Abstract:
Nowadays, the use of wireless technology has invaded the market of telecommunications networks. There are two main families of wireless networks: networks with infrastructure and networks without infrastructure or AdHoc. In the networks with infrastructure, communications are made via a fixed base station; however, communications in an AdHoc network occur in the absence of any fixed communication infrastructure. There are three types of AdHoc networks: mobile AdHoc networks, mesh networks, and sensor networks. This research applied the mobile AdHoc network to the intelligent transportation systems that improve the traditional transport system with reducing the risk of human errors and with the effective management of traffic congestion. The authors focus in the work especially on the routing protocols inside the MANETs to come out with four routing protocols (AODV, OLSR, DSR, and TORA), and this paper compared their performances in case of using HTTP application, FTP application, email application, voice application, and the rate of the routing control traffic.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumawat, Madhur. "Attacks in Mobile Adhoc-Networks." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 2768–71. http://dx.doi.org/10.22214/ijraset.2018.4463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Saxena, Deepak. "SECURITY IN MOBILE ADHOC NETWORKS." Globus An International Journal of Management & IT 11, no. 1 (2020): 53. http://dx.doi.org/10.46360/globus.120192010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Manpreet, Kaur, Rajni, and Singh Parminder. "An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet." International Journal on Cryptography and Information Security (IJCIS) 3, no. 2 (2020): 15–22. https://doi.org/10.5281/zenodo.4005540.

Full text
Abstract:
Wireless Communications are gaining more importance because they have opened new research fields by extending data networks connectivity to environments where wired solutions are difficult to install. The networks which are deployed in the areas where the needed infrastructure is not feasible to install are adhoc networks. Mobile Adhoc Networks (MANETs), in which each node acts as both data terminal and router uses wireless medium without the need of any centralized control. Vehicular Adhoc Networks (VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Vehicleto-Vehicle (V2V) & Vehicle–to-Infrastructure (V2I) communication with security to improve road safety and optimize road traffic. The technique used for secure communication in the presence of adversaries is known as cryptography. Cryptography refers to encryption in which a plaintext message is converted into a ciphertext and this can be done with private-key or public-key. In this paper, an algorithm based on private key encryption is used to make communication possible between two people with QualNet simulator.
APA, Harvard, Vancouver, ISO, and other styles
13

M, Thebiga, and Suji R. Pramila. "Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 19 (2020): 42. http://dx.doi.org/10.3991/ijim.v14i19.16391.

Full text
Abstract:
<p>This Mobile adhoc networks is a perpetual and autogenous organization without framework, and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework assistance, reliable data distribution is a demanding process in mobile adhoc networks and this mobile adhoc network is unguarded to many categories of attacks. A black hole attack in Mobile Adhoc networks cites to an attack by the malevolent node which strongly get hold of the path from sender to the receiver, by means of perversion of subsequence word. With regard to diminish the menace from the malevolent node, the authors encompass the notion of trust in mobile adhoc networks. In this paper, we cope with a packet dropping misconduct named Black hole Attack and we propounded a new hybrid trust based secured algorithm hinged on four new parameters to scrutinize, whether the transitional nodes are transmitting the packets correctly to the adjacent nodes. This paper presents a new hybrid trust based concept to pinpoint the malevolent node hinged on the computation of trust value. Using ns2 simulator, we analyse the performance of our proposed method and proved the detection efficiency. The investigated results shows that our proposed work can precisely diagnose the malevolent nodes and assure a good packet delivery ratio and network throughput.</p>
APA, Harvard, Vancouver, ISO, and other styles
14

Venkatasubramanian, S., and N. P. Gopalan. "A QoS-Based Robust Multipath Routing Protocol for Mobile Adhoc Networks." International Journal of Engineering and Technology 1, no. 5 (2009): 391–96. http://dx.doi.org/10.7763/ijet.2009.v1.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chauhan, Naveen, Lalit K. Awasthi, and Narottam Chand. "Cache Replacement in Mobile Adhoc Networks." International Journal of Distributed Systems and Technologies 3, no. 2 (2012): 22–38. http://dx.doi.org/10.4018/jdst.2012040102.

Full text
Abstract:
Caching of frequently accessed data in Mobile Adhoc NETwork (MANET) is a technique that can improve data access performance and availability. In the situation of sufficient cache space one may think of keeping all the data items in the cache. However, this has overhead in terms of multiple copies of same data distributed all over the network and there are chances of inconsistency of data among different nodes. The main objective of cooperative caching is the optimum utilization of cache by storing different data items in the cache of each Mobile Node (MN). By doing this, different sets of items are kept in the neighboring MNs. As and when some MN requires a data item which is not available with itself it may ask the neighboring nodes for the same. In this manner cooperative caching environment is created in MANETs. Cache replacement is required when certain items are to be stored in the cache, but MN does not have the sufficient space to store the incoming item. This paper proposes a Profit Based Replacement (PBR) where profit value is calculated for every item in the cache. Simulation experiments demonstrate that the PBR improves the cooperative caching performance in comparison to other conventional techniques.
APA, Harvard, Vancouver, ISO, and other styles
16

Kumar. "GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS." American Journal of Applied Sciences 11, no. 7 (2014): 1059–64. http://dx.doi.org/10.3844/ajassp.2014.1059.1064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

K.C.Maheswari, P. B. Selvapriya,. "Performance Issues in Mobile Adhoc Networks." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (2015): 1033–38. http://dx.doi.org/10.15680/ijircce.2015.0302045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bhatt, Dharmesh, and Bijendra Agrawal. "Major challenges of Mobile Adhoc Networks." Oriental journal of computer science and technology 10, no. 2 (2017): 417–21. http://dx.doi.org/10.13005/ojcst/10.02.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dr., M. Pushpavalli, and Janani G. "A Survey: Trust Based Task Assignment in Service Oriented ADHOC Networks with Energy Efficient Optimization." Journal of Control System and Control Instrumentation 1, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.2575420.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an Infrastructure less network where mobile devices are connected without wires. Each device in MANET can move independently on its own. Thus MANET can change the location and configure by itself. Nowadays Energy Efficiency (EE) of the ADHOC nodes and Trust management becomes an essential aspect, as it is not possible to give sufficient power to the mobile devices of the ADHOC networks. This type of problem in ADHOC networks is a globally optimal problem where some customized branch and bound (BB) algorithm are effectively and efficiently used to solve it. In this paper a survey is done on the trust management protocol with energy efficient optimization.
APA, Harvard, Vancouver, ISO, and other styles
20

Divya, gautam. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 84–89. https://doi.org/10.5281/zenodo.1197527.

Full text
Abstract:
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. this paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.
APA, Harvard, Vancouver, ISO, and other styles
21

Dr.S.Brilly, Sangeetha. "CHALLENGES FACING ADHOC NETWORKS Vs ROUTING." International Journal of Advances in Engineering & Scientific Research 2, no. 9 (2024): 43–65. https://doi.org/10.5281/zenodo.10746325.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <em>Adhoc networks are rapidly deployable, self configuring and known for existing infrastructure. It has Wireless links and the nodes are mobile, topology can be very dynamic. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks(Internet).</em> <em>&nbsp;Ad hoc networks are infrastructure Networks with fixed, wired backbone . Mobile communicates directly with access points . Suitable for locations where access points can be placed For eg) Cellular networks</em> Keywords&nbsp; <em>Adhoc networks, Wireless links, MANET, Cellular networks</em>
APA, Harvard, Vancouver, ISO, and other styles
22

Suguna, A. B., and B. S. Thabasukannan. "Analytical Framework for Path Reliability and Load Balancing in Mobile Adhoc Networks." Bonfring International Journal of Research in Communication Engineering 5, no. 1 (2015): 01–06. http://dx.doi.org/10.9756/bijrce.7005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Thebiga, M., and R. Suji Pramila. "Queue Based Energy Efficient Routing with Dynamic Resource Allocation in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (2018): 343. http://dx.doi.org/10.14419/ijet.v7i3.6.15129.

Full text
Abstract:
Mobile Adhoc networks (MANETs) is defined as an assembly of mobile nodes that are connected wirelessly in which they are dynamic in nature and form a short-term and non-permanent without the dependence of any framework or central supervision and management. Restricted battery potential is considered as one of the significant snag in mobile adhoc networks, as all the nodes included in the network will operate with restricted battery potential. Because of this restricted battery potential, it is mandatory to observe energy consciousness quality in our design. In this paper, we have addressed the energy efficiency in routing by examining the buffer queue status in sequence to avoid packet loss in networks. Finally, a dynamic resource allocation scheme is depicted to minimize the time complexity. In mobile adhoc networks, stabilizing energy and minimum energy utilization are considered as the prime necessity to elongate the existence of network. For this purpose Buffer queue based energy efficient routing algorithm is proposed. This algorithm will upgrade the quality and standard of network by minimizing energy consumption. Simulation results show that the proposed scheme has an efficient performance compared to conventional schemes.
APA, Harvard, Vancouver, ISO, and other styles
24

Gautam, Divya. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." International Journal of Engineering Technologies and Management Research 5, no. 2 (2020): 84–89. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.617.

Full text
Abstract:
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
25

jatha, B. Su. "Independent Robust Mesh for Mobile Adhoc Networks." International Journal of Innovative Research in Science, Engineering and Technology 4, no. 11 (2015): 10998–1003. http://dx.doi.org/10.15680/ijirset.2015.0411145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ravi, Y., V. VenkataRamana, M. V. Rathnamma, and P. Chenna Reddy. "Position based Routing in Mobile Adhoc Networks." International Journal of Computer Applications 55, no. 5 (2012): 12–16. http://dx.doi.org/10.5120/8750-2638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Sundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hoque, E., R. Potharaju, C. Nita-Rotaru, S. Sarkar, and S. S. Venkatesh. "Taming epidemic outbreaks in mobile adhoc networks." Ad Hoc Networks 24 (January 2015): 57–72. http://dx.doi.org/10.1016/j.adhoc.2014.07.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Divakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.

Full text
Abstract:
A rapid advancement in the area of mobile networks has been observed over the recent years due to the spread of reasonable, existing wireless devices. Hence it has given way to numerous opportunities to many researchers to work on Mobile Adhoc Networks. There are several key challenges in implementing the MANETS. It does not use any existing infrastructure or centralized administration. Each mobile node acts as a router. Due to its dynamic features, they are endangered. This paper provides a detailed study and throws light on the MANETS Topology in Wireless Adhoc Networks and focusses on performance parameters throughput, end to end delay and network load, its effect on the performance of the MANET network depending upon the number of users.
APA, Harvard, Vancouver, ISO, and other styles
30

M.S, Brindha. "A Survey on Cross Layer Distributed Topology Control in Mobile Adhoc Network." Bonfring International Journal of Networking Technologies and Applications 04, no. 01 (2017): 01–03. http://dx.doi.org/10.9756/bijnta.8346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

M, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.

Full text
Abstract:
&lt;p&gt;Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
32

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the security issues cultivate resulting in welcoming various lethal vulnerabilities. Out of various Denial of Service (DoS) attacks in MANET, Flooding attackis considered most challenging adversarial modules that tremendously affect the communication system in MANET. In this paper, various previously used techniques are discussed for mitigating Flooding attacks in MANET. The uniqueness of this article is that it presents a comparative study of existing techniques for detecting Flooding attacks in MANET. Finally, we proposed a new technique based on threshold value for detecting Flooding attacker nodes in MANET.
APA, Harvard, Vancouver, ISO, and other styles
33

VELU, CM, and P. Venkateswara Rao. "Transmission of secure data in Mobile Adhoc Networks." International Journal of Smart Device and Appliance 4, no. 1 (2016): 9–14. http://dx.doi.org/10.21742/ijsda.2016.4.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Dave, Viranchee, and H. B. Bhadka. "Location Aware Routing Schemes for Mobile Adhoc Networks." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 1012–14. http://dx.doi.org/10.26438/ijcse/v7i3.10121014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sikamani, K. Thirunadana, and N. Kirubananda Sarathy. "Study For Congestion Control in Mobile Adhoc Networks." International Journal of MC Square Scientific Research 2, no. 1 (2010): 41–49. http://dx.doi.org/10.20894/ijmsr.117.002.001.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ruxanayasmin, B., B. Ananda Krishna, and T. Subhashini. "Minimization of Power Consumption in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 6, no. 2 (2014): 38–44. http://dx.doi.org/10.5815/ijcnis.2014.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shobha.K.R and K. Rajanikanth. "Adaptive AODV Routing Protocol for Mobile ADHOC Networks." International Journal of Ad hoc, Sensor & Ubiquitous Computing 2, no. 1 (2011): 125–37. http://dx.doi.org/10.5121/ijasuc.2011.2111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Haboub, Rachid. "Secure And Reliable Routing In Mobile Adhoc Networks." International Journal of Computer Science & Engineering Survey 3, no. 1 (2012): 53–64. http://dx.doi.org/10.5121/ijcses.2012.3105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.

Full text
Abstract:
Mobile Ad hoc network (MANET) is a collection of moving wireless nodes which form a temporary network topology without using any pre-existing network infrastructure. One of the challenges in MANET is to identify a path between the source and the destination nodes. MANET is highly deployable, self-organizing, autonomous and self-configuring network with the ability of rapid deployment. Nodes movement imposes high challenges to routing in MANET due to dynamically changing of topologies, low transmission power and asymmetric links. So well-organized routing is very critical task due to highly dynamic environment. Route instability occurs due to node mobility and leads to frequent change in topologies; therefore routing becomes one of the core issues. Many researchers are working on the expansion of routing protocols in MANET.
APA, Harvard, Vancouver, ISO, and other styles
40

Khamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
&lt;div class="WordSection1"&gt;&lt;p&gt;Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.&lt;/p&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
41

Chinthireddy, Ms Rasagna, and Dr S. Arvind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Computer Trends and Technology 14, no. 3 (2014): 135–40. http://dx.doi.org/10.14445/22312803/ijctt-v14p129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chinthireddy, Ms Rasagna, and Mr S. Aravind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 14, no. 4 (2014): 202–7. http://dx.doi.org/10.14445/22315381/ijett-v14p240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

devi, S. jyothsna, and G. pram eswar. "A New Rebroadcast Protocol for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 28, no. 9 (2015): 473–79. http://dx.doi.org/10.14445/22315381/ijett-v28p290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Moses, G. Jose, P. Suresh Varma, N. Supriya, and G. NagaSatish. "Security Aspects and Challenges in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 4, no. 6 (2012): 26–32. http://dx.doi.org/10.5815/ijcnis.2012.06.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Singh, Sugandha. "Cache Strategy for Internet based Mobile Adhoc Networks." Advances in Science, Technology and Engineering Systems Journal 8, no. 3 (2023): 63–68. http://dx.doi.org/10.25046/aj080308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yaser, Khamayseh, Bani Yassein Muneer, and Abu-Jazoh Mai. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968–77. https://doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
47

Thakur, Priyanka, and Sukhpreet Kaur. "Optimized Routing Protocols- Enhancement in Mobile Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 253–60. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.253.

Full text
Abstract:
The recent developments in wireless technology have piqued academics' curiosity. Mobile Adhoc Networks (MANET) is a fast-growing networking architecture used in emergency, disaster, and tactical operations applications. It covers a wide range of applications with some degradation due to its flexible and expandable nature. Because routing is the primary function of wireless networks, routing protocol design is critical in Adhoc networks. Various methods have been used to improve the performance of current routing protocols in different categories. Technical advances in routing protocols have recently been achieved, combined with optimization approaches to improve the overall performance of MANETs routing protocols. This research initially looked at several sorts of routing protocols before going through their variations for energy economy and latency reduction. The previous protocols, which were created utilizing optimization methods, will then illustrate the current requirement. Finally, the review analysis delves into many aspects such as commonly used protocols, optimization techniques, QoS parameters, performance metrics, and future paths.
APA, Harvard, Vancouver, ISO, and other styles
48

K., Mani, and Prasath Sivasubramanian S. "Trust Based Secure Routing Mechanism in Mobile Adhoc Networks for Enhancing the Routing Performances." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1921–27. https://doi.org/10.35940/ijeat.C5492.029320.

Full text
Abstract:
Mobile Adhoc Networks enforces certain level of challenges for the researchers since they operate without a fixed infrastructure. Moreover the constant movement of nodes gives additional challenges while implementing any type of solutions. Similarly enforcing secure mode of routing in mobile adhoc networks creates lot of hurdles for the implementers. This paper addresses these issues, by computing the trust of each node and updating the trust tables of the respective nodes and the cluster head. This paper focus in designing a trusted secure mechanism for routing. The objective of this work is to calculate the trust of nodes using various trust methods. Later the calculated trust is updated with the trust table of the cluster head by forming a web of trust. This will enable a secure channel of communication among the adhoc nodes. After incorporating the newly computed trust, the routing performance of well known routing protocol say AODV, is evaluated for various routing parameters and it is compared with the performance of Trusted AODV(TODV).
APA, Harvard, Vancouver, ISO, and other styles
49

Thebiga, M., and R. Suji Pramila. "A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (2018): 337. http://dx.doi.org/10.14419/ijet.v7i3.6.15127.

Full text
Abstract:
Mobile adhoc networks is defined as collection of infrastructure less, self-organized, dynamic networks of mobile nodes that can be connected anywhere and at any time. In Mobile Adhoc Networks, every node in the network habitually amalgamate and deliver every other nodes packets in a sequence to permit out of reach conveyance. In this aggressive background, a part of the nodes may opposed to have it, either for preserving their self-resources or deliberately distorting usual conveyance. This class of misconduct is cited as packet dropping attack or Black hole attack. This kind of attack is supposed to be more catastrophic attack and it may provide a route to network crumble. The black hole malicious node organize its malevolent performance during the route locating procedures. In this paper we make a compendious study and survey examination on the counteract ant to be concerned with black hole attack and also we explore some of the propounded solution to diagnose and to avert the attack.
APA, Harvard, Vancouver, ISO, and other styles
50

Bapu, Tapas, Anitha R, Soundararajan S, Nagaraju V, Partheeban Nagappan, and Daniel A. "GAMAN – Genetic Algorithm in Mobile Adhoc Networks for Creating Systematic QoS." ECS Transactions 107, no. 1 (2022): 3599–607. http://dx.doi.org/10.1149/10701.3599ecst.

Full text
Abstract:
MANET is a mobile adhoc network that is made of several mobile nodes that can communicate in multi-way without any fixed or regular infrastructure. Due to its special features, such as its self-organization, easy deployment it has been preferred for many military and civil applications. MANET has also gained popularity in the multimedia field. MANET has certain levels of requirements, such as QoS (Quality of Service), jitter and energy, bandwidth, and end-2-end delay. MANET’s one of the basic requirements is having QoS and should have efficient routing to support other applications. In this research paper, a special Genetic Algorithm known as the GA algorithm based on routing on a mobile adhoc network is designed and termed as GAMAN. The proposed model uses a 2 QoS system for routing. The outcome of this paper showed that the GAMAN method is a significant one for QoS in MANET.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!