To see the other types of publications on this topic, follow the link: Mobile adhoc networks.

Journal articles on the topic 'Mobile adhoc networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile adhoc networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
2

Zemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems." International Journal of Smart Security Technologies 8, no. 1 (January 2021): 35–48. http://dx.doi.org/10.4018/ijsst.2021010103.

Full text
Abstract:
Nowadays, the use of wireless technology has invaded the market of telecommunications networks. There are two main families of wireless networks: networks with infrastructure and networks without infrastructure or AdHoc. In the networks with infrastructure, communications are made via a fixed base station; however, communications in an AdHoc network occur in the absence of any fixed communication infrastructure. There are three types of AdHoc networks: mobile AdHoc networks, mesh networks, and sensor networks. This research applied the mobile AdHoc network to the intelligent transportation systems that improve the traditional transport system with reducing the risk of human errors and with the effective management of traffic congestion. The authors focus in the work especially on the routing protocols inside the MANETs to come out with four routing protocols (AODV, OLSR, DSR, and TORA), and this paper compared their performances in case of using HTTP application, FTP application, email application, voice application, and the rate of the routing control traffic.
APA, Harvard, Vancouver, ISO, and other styles
3

Kumawat, Madhur. "Attacks in Mobile Adhoc-Networks." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 2768–71. http://dx.doi.org/10.22214/ijraset.2018.4463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saxena, Deepak. "SECURITY IN MOBILE ADHOC NETWORKS." Globus An International Journal of Management & IT 11, no. 1 (February 15, 2020): 53. http://dx.doi.org/10.46360/globus.120192010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, Thebiga, and Suji R. Pramila. "Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 19 (November 24, 2020): 42. http://dx.doi.org/10.3991/ijim.v14i19.16391.

Full text
Abstract:
<p>This Mobile adhoc networks is a perpetual and autogenous organization without framework, and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework assistance, reliable data distribution is a demanding process in mobile adhoc networks and this mobile adhoc network is unguarded to many categories of attacks. A black hole attack in Mobile Adhoc networks cites to an attack by the malevolent node which strongly get hold of the path from sender to the receiver, by means of perversion of subsequence word. With regard to diminish the menace from the malevolent node, the authors encompass the notion of trust in mobile adhoc networks. In this paper, we cope with a packet dropping misconduct named Black hole Attack and we propounded a new hybrid trust based secured algorithm hinged on four new parameters to scrutinize, whether the transitional nodes are transmitting the packets correctly to the adjacent nodes. This paper presents a new hybrid trust based concept to pinpoint the malevolent node hinged on the computation of trust value. Using ns2 simulator, we analyse the performance of our proposed method and proved the detection efficiency. The investigated results shows that our proposed work can precisely diagnose the malevolent nodes and assure a good packet delivery ratio and network throughput.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Chauhan, Naveen, Lalit K. Awasthi, and Narottam Chand. "Cache Replacement in Mobile Adhoc Networks." International Journal of Distributed Systems and Technologies 3, no. 2 (April 2012): 22–38. http://dx.doi.org/10.4018/jdst.2012040102.

Full text
Abstract:
Caching of frequently accessed data in Mobile Adhoc NETwork (MANET) is a technique that can improve data access performance and availability. In the situation of sufficient cache space one may think of keeping all the data items in the cache. However, this has overhead in terms of multiple copies of same data distributed all over the network and there are chances of inconsistency of data among different nodes. The main objective of cooperative caching is the optimum utilization of cache by storing different data items in the cache of each Mobile Node (MN). By doing this, different sets of items are kept in the neighboring MNs. As and when some MN requires a data item which is not available with itself it may ask the neighboring nodes for the same. In this manner cooperative caching environment is created in MANETs. Cache replacement is required when certain items are to be stored in the cache, but MN does not have the sufficient space to store the incoming item. This paper proposes a Profit Based Replacement (PBR) where profit value is calculated for every item in the cache. Simulation experiments demonstrate that the PBR improves the cooperative caching performance in comparison to other conventional techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar. "GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS." American Journal of Applied Sciences 11, no. 7 (July 1, 2014): 1059–64. http://dx.doi.org/10.3844/ajassp.2014.1059.1064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

K.C.Maheswari, P. B. Selvapriya,. "Performance Issues in Mobile Adhoc Networks." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 1033–38. http://dx.doi.org/10.15680/ijircce.2015.0302045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhatt, Dharmesh, and Bijendra Agrawal. "Major challenges of Mobile Adhoc Networks." Oriental journal of computer science and technology 10, no. 2 (June 18, 2017): 417–21. http://dx.doi.org/10.13005/ojcst/10.02.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Veena, Veena, Tanushree Aggarwal, and Nisha Charaya. "Efficient Zone based Multicast RoutingProtocol for Mobile Adhoc Networks." International Journal of Scientific Research 3, no. 7 (June 1, 2012): 161–64. http://dx.doi.org/10.15373/22778179/july2014/52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Thebiga, M., and R. Suji Pramila. "Queue Based Energy Efficient Routing with Dynamic Resource Allocation in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 343. http://dx.doi.org/10.14419/ijet.v7i3.6.15129.

Full text
Abstract:
Mobile Adhoc networks (MANETs) is defined as an assembly of mobile nodes that are connected wirelessly in which they are dynamic in nature and form a short-term and non-permanent without the dependence of any framework or central supervision and management. Restricted battery potential is considered as one of the significant snag in mobile adhoc networks, as all the nodes included in the network will operate with restricted battery potential. Because of this restricted battery potential, it is mandatory to observe energy consciousness quality in our design. In this paper, we have addressed the energy efficiency in routing by examining the buffer queue status in sequence to avoid packet loss in networks. Finally, a dynamic resource allocation scheme is depicted to minimize the time complexity. In mobile adhoc networks, stabilizing energy and minimum energy utilization are considered as the prime necessity to elongate the existence of network. For this purpose Buffer queue based energy efficient routing algorithm is proposed. This algorithm will upgrade the quality and standard of network by minimizing energy consumption. Simulation results show that the proposed scheme has an efficient performance compared to conventional schemes.
APA, Harvard, Vancouver, ISO, and other styles
12

Gautam, Divya. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 84–89. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.617.

Full text
Abstract:
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.
APA, Harvard, Vancouver, ISO, and other styles
13

Divakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.

Full text
Abstract:
A rapid advancement in the area of mobile networks has been observed over the recent years due to the spread of reasonable, existing wireless devices. Hence it has given way to numerous opportunities to many researchers to work on Mobile Adhoc Networks. There are several key challenges in implementing the MANETS. It does not use any existing infrastructure or centralized administration. Each mobile node acts as a router. Due to its dynamic features, they are endangered. This paper provides a detailed study and throws light on the MANETS Topology in Wireless Adhoc Networks and focusses on performance parameters throughput, end to end delay and network load, its effect on the performance of the MANET network depending upon the number of users.
APA, Harvard, Vancouver, ISO, and other styles
14

M., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (January 20, 2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.

Full text
Abstract:
Mobile Ad hoc Network is a self-configured network, the main responsibility faced in the network is security. Malicious nodes are mostly to blame for the insecurity of MANET. The malicious attacker nodes will disrupt the overall functioning of the network, and many security solution approaches are utilized for safe and reliable communication in MANET to stop such harmful activity. This routing, known as Hybrid Trust Cluster based Multiple Routing (H-TCMR), helps to minimize the amount of messages carried inside the network, lowering the network's total energy usage. It utilizes Hybrid Time Division Multiple Access (HTDMA) for time slots and the Unified Slot Assignment Protocol (USAP) for cluster allocation. Using Hybrid Rider Optimization Algorithm (HROA) approaches, a group of riders will drive together to a specified location in order to obtain the cluster head slot. The suggested approach encrypts the data before sending it to its final destination. It also helps to extend the life of mobile networks. Some of the factors considered in simulation studies include connection, energy, average delay, throughput, as well as overall cluster quality. The simulation result demonstrates a performance study of HTCMR's dependable security, as well as increased system efficiency and improved data transfer security.
APA, Harvard, Vancouver, ISO, and other styles
15

M, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (January 20, 2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.

Full text
Abstract:
<p>Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.<strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
16

jatha, B. Su. "Independent Robust Mesh for Mobile Adhoc Networks." International Journal of Innovative Research in Science, Engineering and Technology 4, no. 11 (November 15, 2015): 10998–1003. http://dx.doi.org/10.15680/ijirset.2015.0411145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ravi, Y., V. VenkataRamana, M. V. Rathnamma, and P. Chenna Reddy. "Position based Routing in Mobile Adhoc Networks." International Journal of Computer Applications 55, no. 5 (October 20, 2012): 12–16. http://dx.doi.org/10.5120/8750-2638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hoque, E., R. Potharaju, C. Nita-Rotaru, S. Sarkar, and S. S. Venkatesh. "Taming epidemic outbreaks in mobile adhoc networks." Ad Hoc Networks 24 (January 2015): 57–72. http://dx.doi.org/10.1016/j.adhoc.2014.07.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Murugan, S., and Dr M. Jeyakarthic. "Optimal Deep Neural Network based Classification Model for Intrusion Detection in Mobile Adhoc Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (October 31, 2019): 1374–87. http://dx.doi.org/10.5373/jardcs/v11sp10/20192983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Patel, Deepak Kumar, and Rakesh Kumar. "A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 495–508. http://dx.doi.org/10.24297/ijct.v4i2b2.3315.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through some routing protocol. But whenever any mobile node want to communicate a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes These Gateway nodes act as a bridge between the mobile ad hoc networks and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet.
APA, Harvard, Vancouver, ISO, and other styles
22

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protocols, including Dynamic Source Routing (DSR), Ad-hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance-Vector Routing (DSDV), and Ad-hoc On-Demand Distance Vector (AODV). The performance analysis is done using the NS2.35 simulator.
APA, Harvard, Vancouver, ISO, and other styles
23

P, Bharathisindhu, and Dr S.SelvaBrunda. "Probability Model for Intrusion Detection System in Mobile Adhoc Network." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 302. http://dx.doi.org/10.14419/ijet.v7i2.20.16722.

Full text
Abstract:
Wireless technologies increasingly exist everywhere in advanced networks; however, this new innovation accompanies its own set of challenges. The nodes in the wireless network are characteristically ‘open’ and viewable by all network scanners. Networks are protected using many firewalls and encryption software’s. Firewalls restrict access between networks to prevent intrusion and do not indicate an attack within the network. An Intrusion Detection System (IDS) is required which monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. In this paper, we propose a probability based IDS model that provides generalized solution to detect set of malicious nodes to improve the detection speed and accuracy.
APA, Harvard, Vancouver, ISO, and other styles
24

Thebiga, M., and R. Suji Pramila. "A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 337. http://dx.doi.org/10.14419/ijet.v7i3.6.15127.

Full text
Abstract:
Mobile adhoc networks is defined as collection of infrastructure less, self-organized, dynamic networks of mobile nodes that can be connected anywhere and at any time. In Mobile Adhoc Networks, every node in the network habitually amalgamate and deliver every other nodes packets in a sequence to permit out of reach conveyance. In this aggressive background, a part of the nodes may opposed to have it, either for preserving their self-resources or deliberately distorting usual conveyance. This class of misconduct is cited as packet dropping attack or Black hole attack. This kind of attack is supposed to be more catastrophic attack and it may provide a route to network crumble. The black hole malicious node organize its malevolent performance during the route locating procedures. In this paper we make a compendious study and survey examination on the counteract ant to be concerned with black hole attack and also we explore some of the propounded solution to diagnose and to avert the attack.
APA, Harvard, Vancouver, ISO, and other styles
25

Durachman, Yusuf. "Analysis of Learning Techniques for Performance Prediction in Mobile Adhoc Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): IS—46—IS—53. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.141.

Full text
Abstract:
Current advancements in cellular technologies and computing have provided the basis for the unparalleled exponential development of mobile networking and software availability and quality combined with multiple systems or network software. Using wireless technologies and mobile ad-hoc networks, such systems and technology interact and collect information. To achieve the Quality of Service (QoS) criteria, the growing concern in wireless network performance and the availability of mobile users would support a significant rise in wireless applications. Predicting the mobility of wireless users and systems performs an important role in the effective strategic decision making of wireless network bandwidth service providers. Furthermore, related to the defect-proneness, self-organization, and mobility aspect of such networks, new architecture problems occur. This paper proposes to predict and simulate the mobility of specific nodes on a mobile ad-hoc network, gradient boosting devices defined for the system will help. The proposed model not just to outperform previous mobility prediction models using simulated and real-world mobility instances, but provides better predictive accuracy by an enormous margin. The accuracy obtained helps the suggested mobility indicator in Mobile Adhoc Networks to increase the average level of performance.
APA, Harvard, Vancouver, ISO, and other styles
26

Venkatasubramanian, S., and N. P. Gopalan. "A QoS-Based Robust Multipath Routing Protocol for Mobile Adhoc Networks." International Journal of Engineering and Technology 1, no. 5 (2009): 391–96. http://dx.doi.org/10.7763/ijet.2009.v1.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Theerthagiri, Prasanna Venkatesan. "Imposing Packet Relaying for Mobile Adhoc Networks Using Genetic Algorithm." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 617–24. http://dx.doi.org/10.2174/2210327910666200320090234.

Full text
Abstract:
Background: Packet forwarding is an essential network operation in wireless networks to establish communication among wireless devices. In mobile wireless networks, data transmission occurs in the form of packet relaying. In dynamic environmental networks, relaying of the packet is a more complex process and much essential activity. Objective: It requires the co-operation of intermediate nodes in the network. Specifically, in Mobile Adhoc Networks (MANET) it is the most tedious job because of its dynamic topology, limited energy, and other resource constraints. In this paper, a genetic algorithm is adopted for stimulating the packet relaying, such that to assist the co-operation between various nodes in the network. Methods: The genetic algorithm is a metaheuristic process-based evolutionary algorithms. It intends to produce high-quality optimized solutions to any given complex problems. The current research work had carried out an extensive investigation and comparison of existing relevant genetic algorithm based algorithms. Results: The experimental results are evaluated based on the methodology of the genetic algorithm, the number of nodes, robustness, scalability, packet delivery ratio, average energy consumption, and other parameters.
APA, Harvard, Vancouver, ISO, and other styles
28

VELU, CM, and P. Venkateswara Rao. "Transmission of secure data in Mobile Adhoc Networks." International Journal of Smart Device and Appliance 4, no. 1 (June 30, 2016): 9–14. http://dx.doi.org/10.21742/ijsda.2016.4.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dave, Viranchee, and H. B. Bhadka. "Location Aware Routing Schemes for Mobile Adhoc Networks." International Journal of Computer Sciences and Engineering 7, no. 3 (March 31, 2019): 1012–14. http://dx.doi.org/10.26438/ijcse/v7i3.10121014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sikamani, K. Thirunadana, and N. Kirubananda Sarathy. "Study For Congestion Control in Mobile Adhoc Networks." International Journal of MC Square Scientific Research 2, no. 1 (July 15, 2010): 41–49. http://dx.doi.org/10.20894/ijmsr.117.002.001.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ruxanayasmin, B., B. Ananda Krishna, and T. Subhashini. "Minimization of Power Consumption in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 6, no. 2 (January 8, 2014): 38–44. http://dx.doi.org/10.5815/ijcnis.2014.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shobha.K.R and K. Rajanikanth. "Adaptive AODV Routing Protocol for Mobile ADHOC Networks." International Journal of Ad hoc, Sensor & Ubiquitous Computing 2, no. 1 (March 24, 2011): 125–37. http://dx.doi.org/10.5121/ijasuc.2011.2111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Haboub, Rachid. "Secure And Reliable Routing In Mobile Adhoc Networks." International Journal of Computer Science & Engineering Survey 3, no. 1 (February 29, 2012): 53–64. http://dx.doi.org/10.5121/ijcses.2012.3105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Singh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.

Full text
Abstract:
Mobile Ad hoc network (MANET) is a collection of moving wireless nodes which form a temporary network topology without using any pre-existing network infrastructure. One of the challenges in MANET is to identify a path between the source and the destination nodes. MANET is highly deployable, self-organizing, autonomous and self-configuring network with the ability of rapid deployment. Nodes movement imposes high challenges to routing in MANET due to dynamically changing of topologies, low transmission power and asymmetric links. So well-organized routing is very critical task due to highly dynamic environment. Route instability occurs due to node mobility and leads to frequent change in topologies; therefore routing becomes one of the core issues. Many researchers are working on the expansion of routing protocols in MANET.
APA, Harvard, Vancouver, ISO, and other styles
35

Khamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
<div class="WordSection1"><p>Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.</p></div>
APA, Harvard, Vancouver, ISO, and other styles
36

Chinthireddy, Ms Rasagna, and Dr S. Arvind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Computer Trends and Technology 14, no. 3 (August 25, 2014): 135–40. http://dx.doi.org/10.14445/22312803/ijctt-v14p129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Chinthireddy, Ms Rasagna, and Mr S. Aravind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 14, no. 4 (August 25, 2014): 202–7. http://dx.doi.org/10.14445/22315381/ijett-v14p240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

devi, S. jyothsna, and G. pram eswar. "A New Rebroadcast Protocol for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 28, no. 9 (October 25, 2015): 473–79. http://dx.doi.org/10.14445/22315381/ijett-v28p290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Moses, G. Jose, P. Suresh Varma, N. Supriya, and G. NagaSatish. "Security Aspects and Challenges in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 4, no. 6 (June 26, 2012): 26–32. http://dx.doi.org/10.5815/ijcnis.2012.06.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Singh, Sugandha. "Cache Strategy for Internet based Mobile Adhoc Networks." Advances in Science, Technology and Engineering Systems Journal 8, no. 3 (May 2023): 63–68. http://dx.doi.org/10.25046/aj080308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

M, Duraipandian. "PERFORMANCE EVALUATION OF ROUTING ALGORITHM FOR MANET BASED ON THE MACHINE LEARNING TECHNIQUES." Journal of Trends in Computer Science and Smart Technology 01, no. 01 (September 12, 2019): 25–38. http://dx.doi.org/10.36548/jtcsst.2019.1.003.

Full text
Abstract:
The rapid advances in wireless communication technology has led to an extraordinary progress in the adhoc type of networking. The mobile adhoc networks being a subtype of the adhoc network almost poses the same characteristics of the adhoc network, presenting multiple challenges in framing a route for the transmission of the information from the source to the destination. So the paper proposes a routing method developed based on the reinforcement learning, exploiting the node information’s to establish a route that is short and stable. The proposed method scopes to minimize the energy consumption, transmission delay, and improve the delivery ratio of the packets, enhancing the throughput. The efficiency of the proposed method is determined by validating its performance in the network simulator-II, in terms of the energy consumption, delay in the transmission and the packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
42

Suguna, A. B., and B. S. Thabasukannan. "Analytical Framework for Path Reliability and Load Balancing in Mobile Adhoc Networks." Bonfring International Journal of Research in Communication Engineering 5, no. 1 (February 28, 2015): 01–06. http://dx.doi.org/10.9756/bijrce.7005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Babu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.

Full text
Abstract:
Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Krishna Karne, Radha, Dudimetla Prasad, Uzma Naseem, Ashok Battula, and Karthik Kumar Vaigandla. "GENETIC ALGORITHM FOR WIRELESS SENSOR NETWORKS." International Journal of Engineering Applied Sciences and Technology 6, no. 8 (December 1, 2021): 97–103. http://dx.doi.org/10.33564/ijeast.2021.v06i08.018.

Full text
Abstract:
Ad hoc networks are made up of a collection of wireless mobile nodes that form a temporary network with no pre-existing infrastructure or centralized management.Routing policies are crucial in determining how traffic is forwarded across a network. Adhoc networks necessitate a routing method that is very adaptable. Finding the shortest path (SP) between source and destination in a specific period of time to meet Quality of Service standards is one of the most common issues in these networks (QoS). QoS routing is difficult in an Ad hoc network because the topology changes frequently and it takes time since many QoS criteria such as distance, cost, and energy are all variable, and the state information supplied for routing is inherently faulty. The optimum path for Adhoc networks is found using a Genetic Algorithm (GA) in this paper.GA uses natural evolution-inspired methodologies to find answers to optimization problems. Crossover and mutation operations, as well as the proper chromosome structure, are all defined.
APA, Harvard, Vancouver, ISO, and other styles
45

Felemban, Emad, Adil A. Sheikh, and Atif Naseer. "Improving Response Time for Crowd Management in Hajj." Computers 10, no. 4 (April 6, 2021): 46. http://dx.doi.org/10.3390/computers10040046.

Full text
Abstract:
Flying Adhoc Network (FANET) is a particular type of Mobile Adhoc Network (MANET) that consists of flying drones or unmanned aerial vehicles (UAVs). MANETs are especially useful in rural and remote areas, where the lack of public networks necessitates data delivery through mobile nodes. Additionally, FANETs provide better coverage where there is a lack of roads. Generally, the goal of FANETs is to provide multimedia data to applications such as search and rescue operations, forest fire detection, surveillance and patrol, environmental monitoring, and traffic and urban monitoring. The above applications’ performance and efficiency depend on the quality and timely delivery of these essential data from an area of interest to control centers. This paper presents a Priority-based Routing Framework for Flying Adhoc Networks (PRoFFAN) for the expedited delivery of essential multimedia data to control centers. PRoFFAN reduces the FANET application’s response time by prioritizing the sending and forwarding of critical image data from the UAV to the control center. Our motivation application is crowd management; we believe that having important image features as early as possible will save lives and enhance the crowd’s safety and flow. We integrated PRoFFAN over the RPL routing layer of Contiki-NG’s IPv6 network stack. We used simulations in Cooja to demonstrate the benefit of PRoFFAN over conventional ZigBee.
APA, Harvard, Vancouver, ISO, and other styles
46

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector routing. We adopt On Demand Distance Vector routing solely based on source routing and “On Demand” process, so each packet does not have to transmit any periodic routing information. We implemented intrusion detection system with five different nodes and the performance parameters like packet delivery ratio, throughput, delay are computed with attacker and without attacker and on demand distance vector routing protocols is proposed to implement in hardware using Zigbee</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Sadiq, Muhammad, Abdul Majid, Amir Naveed, Muhammad Arif, Muhammad Asif, and Amjad Ullah Khattak. "Effects of Nodes Mobility on the Energy Consumption of Routing Protocols (AODV, DSDV) in Adhoc Networks." Pakistan Journal of Scientific & Industrial Research Series A: Physical Sciences 65, no. 1 (February 22, 2022): 74–79. http://dx.doi.org/10.52763/pjsir.phys.sci.65.1.2022.74.79.

Full text
Abstract:
Provision of routing mechanism is the elemental concern in adhoc networks. Various routing protocols have been devised and are in use. Quest for the best is in progress and have highlighted certain limitations associated to every protocol. Assessments of routing protocols by their performance in the usage of bandwidth, route selection, delay, packet delivery ratio and throughput have been the main concerns for researchers. Mobility of nodes is a very charming characteristic of adhoc networks, however, it has an allied issue that its nodes are mostly limited battery powered. Routing protocols have a definite influence on the overall energy consumption of the nodes. Energy consumption is an equally important concern to be addressed in evaluating the existing or developing new routing protocols. This research will evaluate two well-known routing protocols AOVD and DSDV on basis of energy consumption. The affects of nodes mobility on the energy consumption levels of these routing protocols will remain the main focus. All the simulations will be made in NS 2.35, and will have these two different scenarios i.e. adhoc network with static nodes and adhoc network with mobile nodes.
APA, Harvard, Vancouver, ISO, and other styles
48

Deepa, S., Kamal Raj S, and Sridhar K.P. "Development of mobile adhoc network using leader Selection algorithm." International Journal of Engineering & Technology 7, no. 2.9 (April 10, 2018): 6. http://dx.doi.org/10.14419/ijet.v7i2.9.9929.

Full text
Abstract:
Mobile ad-hoc network (MANET) is an interconnection of mobile devices without preexisting topology which form a communication network. QOS parameters like congestion control, confidentiality, output, delay, energy consumption, jitter, have to be improved based on the development of transmission technology, and real-time applications. MANETs are totally different from distributed COMPUTING systems. They are dynamic and self-organizing networks. A leader is needed to coordinate and organize tasks in MANET. The challenge is to own the proper election algorithm that chooses the correct leader based on numerous factors in MANET. The task of the leader is to keep up the quality of service (QOS) in the MANET. This paper explores QoS in MANET by using the leader of the network by correct election algorithm by improving the network lifetime, path stability, and reduce end to end delay.
APA, Harvard, Vancouver, ISO, and other styles
49

Thakur, Priyanka, and Sukhpreet Kaur. "Optimized Routing Protocols- Enhancement in Mobile Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (December 30, 2021): 253–60. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.253.

Full text
Abstract:
The recent developments in wireless technology have piqued academics' curiosity. Mobile Adhoc Networks (MANET) is a fast-growing networking architecture used in emergency, disaster, and tactical operations applications. It covers a wide range of applications with some degradation due to its flexible and expandable nature. Because routing is the primary function of wireless networks, routing protocol design is critical in Adhoc networks. Various methods have been used to improve the performance of current routing protocols in different categories. Technical advances in routing protocols have recently been achieved, combined with optimization approaches to improve the overall performance of MANETs routing protocols. This research initially looked at several sorts of routing protocols before going through their variations for energy economy and latency reduction. The previous protocols, which were created utilizing optimization methods, will then illustrate the current requirement. Finally, the review analysis delves into many aspects such as commonly used protocols, optimization techniques, QoS parameters, performance metrics, and future paths.
APA, Harvard, Vancouver, ISO, and other styles
50

Muruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.

Full text
Abstract:
A MANET is an infrastructure-less type network, which consists of number of mobile nodes connected through wireless network interfaces. The Communication among nodes is made successfully when the nodes dynamically set up route among one another. The open nature and infrastructureless type of such networks causes the attacker's interest to penetrate through the network and decrease the network performance. Thus Security becomes a major concern for protected communication between mobile nodes. Packet misrouting stops the packet from reaching the destination by a malicious intermediate node. But the malicious node makes the intuition to its neighbors that it has done the genuine packet forwarding action. Moreover the malicious node makes the neighbours to suspect the normal node as malicious one. The proposed work ensures the detection of malicious nodes and avoids suspecting the trustworthy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography