To see the other types of publications on this topic, follow the link: Mobile router.

Journal articles on the topic 'Mobile router'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile router.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ho, Yao, Ai Ho, Kien Hua, and Fei Xie. "Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network." JUCS - Journal of Universal Computer Science 15, no. (5) (2009): 1090–118. https://doi.org/10.3217/jucs-015-05-1090.

Full text
Abstract:
Operations of mobile ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on virtual routers has been proposed to address this problem. In this new environment, virtual routers are used for forwarding data. The functionality of each virtual router is provided by the mobile devices currently within its spatial proximity. Since these routers do not move, the communication links are much more robust compared to those of the conventional techniques. In this paper, we investigate techniques to enforce collaboration among mobile devices by identify and punish misbehaving users in supporting the virtual router functionality. Simulation results based on various system configurations are given. They indicate that the proposed technique is effective.
APA, Harvard, Vancouver, ISO, and other styles
2

Khin, Aye Thu, Soe Mon Soe, and Soe Thida. "Configuration of Residential Network using Enhanced Interior Gateway Routing Protocol." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1076–80. https://doi.org/10.5281/zenodo.3590528.

Full text
Abstract:
A residential area is used in housing predominates, as opposed to industrial and commercial areas. These include single family housing, multi family residential, or mobile homes. Enhanced Interior Gateway Routing Protocol EIGRP is a network protocol that is routers exchange information more efficiently than other protocols. EIGRP is an advanced distance vector routing protocol used on a computer network for automating routing decisions and configuration. EIGRP is used to share routes on a router with other routers within the same autonomous system. Unlike other routing protocols, such as RIP, EIGRP only sends incremental updates, reducing the workload on the router and the amount of data that needs to be transmitted. EIGRP evolved from Interior Gateway Routing Protocol IGRP and routers using EIGRP and IGRP can interoperate for selecting a route with one protocol. Using EIGRP, a router keeps a copy of its neighbors routing tables. If it cant find a route to a destination in one of these tables, it queries its neighbors for a route and query their neighbors until a route is found. When a routing table entry changes in one of the routers, it notifies its neighbors of the change only. Khin Aye Thu | Soe Soe Mon | Thida Soe "Configuration of Residential Network using Enhanced Interior Gateway Routing Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26581.pdf
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Muhammed Zaharadeen, Aisha Hassan Abdalla Hashim, Othman O. Khalifa, Abdulkadir H. Alkali, Nur Shahida Bt Midi, and Faridah Bt Abd. Rahman. "Evaluating Mobility Management Models for Content Forwarding in Named Data Networking Environments." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 47. http://dx.doi.org/10.3991/ijim.v13i04.10519.

Full text
Abstract:
<span>Named Data Networking (NDN) performs its routing and forwarding decisions using name prefixes. This removes some of the issues affecting addresses in our traditional IP architecture such as limitation in address allocation and management, and even NAT translations etcetera. Another positivity of NDN is its ability to use the conventional routing like the link state and distance vector algorithm. In route announcement, NDN node broadcasts its name prefix which consists of the knowledge of the next communicating node. In this paper, we evaluate the performance of mobility management models used in forwarding NDN contents to a next hop. This makes it crucial to select an approach of mobility model that translates the nature of movement of the NDN mobile routers. A detailed analysis of the famous mobility model such as the Random Waypoint mobility and Constant Velocity were computed to determine the mobility rate of the NDN mobile router. Simulation analysis was carried out using ndnSIM 2.1 on Linux Version 16.1. we build and compile with modules and libraries in NS-3.29. The sample of movement of the mobile router is illustrated and our result present the viability of the Constant Velocity model as compared with the Random Way point.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Bessos, Mai Ben Adar, and Amir Herzberg. "Intercepting a Stealthy Network." ACM Transactions on Sensor Networks 17, no. 2 (2021): 1–39. http://dx.doi.org/10.1145/3431223.

Full text
Abstract:
We investigate an understudied threat: networks of stealthy routers (S-Routers) , relaying messages to a hidden destination . The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by triangulation. Mobile devices called Interceptors can detect communication by an S-Router, but only when the Interceptor is next to the transmitting S-Router. We examine algorithms for a set of mobile Interceptors to find the destination of the communication relayed by the S-Routers. The algorithms are compared according to the number of communicating rounds before the destination is found, i.e., rounds in which data is transmitted from the source to the destination . We evaluate the algorithms analytically and using simulations, including against a parametric, optimized strategy for the S-Routers. Our main result is an Interceptors algorithm that bounds the expected number of communicating rounds by a term quasilinear in the number of S-Routers. For the case where S-Routers transmit at every round (“continuously”), we present an algorithm that improves this bound.
APA, Harvard, Vancouver, ISO, and other styles
5

Fan, Hongwen. "Smart Router Development for WIFI Sharing Systems." Scientific Journal of Technology 4, no. 7 (2022): 92–97. http://dx.doi.org/10.54691/sjt.v4i7.1282.

Full text
Abstract:
With the increasing popularity of smart devices, the need for people to use mobile devices to surf the internet is growing. In order to meet the needs of users, major operators have launched 5G network, but only relying on mobile network can not meet the needs of users to surf the internet anytime and anywhere. In this case, the wireless router can provide users with a convenient and stable network environment. However, traditional home and private routers simply allow and provide wireless networking to certain groups of people. In order to break through the limitations of scope and usage scenarios, and maximize the benefits people get from the network, the project plans to develop an intelligent router to realize WIFI sharing. The project is designed based on OpenWRT open-source embedded system. Through the transformation of the router, the compiled OpenWRT system is transplanted to the router. At the same time, the entire project needs to cooperate with the relevant interfaces of the client module and the server module to realize the function of WIFI sharing. The system is an intelligent extension of the router function to meet the sharing requirements of the project. Through the use case testing, the reliability and practicability of the project function and process are verified. This project aims to provide a feasible reference design scheme, which has certain market application value and research significance.
APA, Harvard, Vancouver, ISO, and other styles
6

KAFLE, V. P. "MoRaRo: Mobile Router-Assisted Route Optimization for Network Mobility (NEMO) Support." IEICE Transactions on Information and Systems E89-D, no. 1 (2006): 158–70. http://dx.doi.org/10.1093/ietisy/e89-d.1.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prakash, Arun, Rajesh Verma, Rajeev Tripathi, and Kshirasagar Naik. "Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain." International Journal of Mobile Computing and Multimedia Communications 2, no. 2 (2010): 1–17. http://dx.doi.org/10.4018/jmcmc.2010040101.

Full text
Abstract:
Network mobility (NEMO) route optimization support is strongly demanded in next generation networks; without route optimization the mobile network (e.g., a vehicle) tunnels all traffic to its Home Agent (HA). The mobility may cause the HA to be geographically distant from the mobile network, and the tunneling causes increased delay and overhead in the network. It becomes peculiar in the event of nesting of mobile networks due to pinball routing, for example, a Personal Area Network (PAN) inside a vehicle. The authors propose an Extended Mobile IPv6 route optimization (EMIP) scheme to enhance the performance of nested mobile networks in local and global mobility domain. The EMIP scheme is based on MIPv6 route optimization and the root Mobile Router (MR) performs all the route optimization tasks on behalf of all active Mobile Network Nodes (MNNs). Thus, the network movement remains transparent to sub MRs and MNNs and modifies only MRs and MNNs leaving other entities untouched and is more efficient than the Network Mobility Basic Support protocol (NEMO BS). The authors carried out an extensive simulation study to evaluate the performance of EMIP.
APA, Harvard, Vancouver, ISO, and other styles
8

Mousa, Ahmed Ayoob, Aisha Hassan Abdalla, and Huda Adibah Mohd Ramli. "MROM Scheme to Improve Handoff Performance in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 17 (2020): 167. http://dx.doi.org/10.3991/ijim.v14i17.16639.

Full text
Abstract:
Mobile Router (MR) mobility supported by Network Mobility Basic Support Protocol (NEMO BS) is a Mobile IPv6 (MIPv6) extension that supports Host Mobility. Proposed Multihoming and Route Optimization for MANEMO (MROM) scheme is designed to provide Route Optimization (RO) and Multihomed in NEMO architectures. This paper proposes two novel schemes; MANEMO routing scheme and Multihoming-based scheme. These are to provide support for next generation networks. The proposed MROM scheme differs from other schemes for NEMO environment because it considers the requirements of more application flows parameters as packet lost delivery, handoff delay as well as throughput). Another difference is that not only the network infrastructure can begin the functionality of flow routing, but also an Edge Mobile Router (EMR) can do this flow for routing. Moreover, it utilizes the state of the art and presently active access network to perform the separation of each flow in mobile network. Thus, proposed MROM exhibits multihoming features and improves handoff performance by initiating flow-based fast registration process in NEMO environment. A handoff method is proposed with enhanced functionalities of the Local Mobility Anchors (LMA), Mobile Routers (MRs) and signaling messages with a view to achieve continuous connectivity through handoff in NEMO. Both analytical and simulation approaches are used. Analytical evaluation is carried out to analyze packet delivery lost and handoff delay of our proposed scheme. It was also shown that cost of signaling messages and packet delivery are contributing to total handoff cost. At the simulation part, network simulator 3 (NS 3) has been used as the tool to get performance metrics that have been considered like packet delivery ratio, handoff delay, and packet loss. Our proposed scheme (MROM) has been benchmarking to the standard NEMO BS Protocol and P-NEMO. In this paper, we discuss proposed MROM for next generation networks, providing detailed analysis with a numerical model, proposed MROM, by maximizing the handoff performance, has been justified to have better mobility support than the ordinary NEMO BS Protocol and PNEMO.
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, He Wei, and Xiao Yang Xu. "Research of Fast Handover Technique of Mobile IPv6." Applied Mechanics and Materials 58-60 (June 2011): 2189–93. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.2189.

Full text
Abstract:
This paper proposes an improved scheme of FHMIPv6 (Fast Handover for Hierarchical Mobile IPv6). Using buffer tables to store the information of CoA (Care of Address) and tunnel between MN (Mobile Node) and MAP (Mobile Anchor Point), when MN returns to PAR (Previous Access Router) in a certain period of time, the system would directly use the information in the related buffer records to complete the handover and skip the steps of configuring CoA and establishing tunnel, so MN can rapidly connect to the access router, thus reducing the handover latency.
APA, Harvard, Vancouver, ISO, and other styles
10

Song, Jiyoung. "Mobile Router Decision Using Multi-layered Perceptron in Nested Mobile Networks." Journal of the Korea Institute of Information and Communication Engineering 17, no. 12 (2013): 2843–52. http://dx.doi.org/10.6109/jkiice.2013.17.12.2843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar, Rajeev, and Prabhudev Jagadeesh M.P. "QoS Routing Based on Available Bandwidth for Mobile Ad hoc Network." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 14–18. http://dx.doi.org/10.35940/ijeat.e1003.0585s19.

Full text
Abstract:
Mobile Ad-hoc network is a self configuring wireless network. It does not have any fixed infrastructure. Mobile node can leave and join the network. Therefore network topology changes any time. In Manet hosts can work as a router and forwards data from initiator to receiver. Since wireless channel is shared and topology is dynamic, providing quality of service (QoS) is a challenging task. QoS routing can find optimal routes that supports QoS requirement based on the received information during route discovery process. If QoS requirement cannot be supported, the admission control mechanism reject incoming request. Bandwidth estimation is a technique to determine available data rate on a route in the network. The term bandwidth means data rate not the physical bandwidth in hertz. QoS routing is required because most of the real time applications depend on the network’s condition. QoS in terms of bandwidth ensures transmission of real time data. In this paper a new bandwidth estimation method EAB (enhanced available bandwidth) is proposed. The performance of EAB-AODV is compared with AODV. The performance of EAB-AODV is better than AODV in terms of bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
12

Bezzo, Nicola, Yuan Yan, Rafael Fierro, and Yasamin Mostofi. "A Decentralized Connectivity Strategy for Mobile Router Swarms*." IFAC Proceedings Volumes 44, no. 1 (2011): 4501–6. http://dx.doi.org/10.3182/20110828-6-it-1002.02555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Anurag, Misra. "Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 960–68. https://doi.org/10.31142/ijtsrd158.

Full text
Abstract:
Mobile Ad hoc Networks MANETs are collection of wireless mobile nodes. MANETs are infrastructure less temporary networks. They do not have fixed static infrastructure. As no fixed infrastructure is available all nodes itself, work as receiver, transmitter as well as router. These nodes are also mobile so providing stable route is a big challenge. We have different approaches to find route in MANETs and all approaches use some protocols. This paper concentrates upon the analysis of two Mobile Ad Hoc Networking protocols. Ad hoc On demand Distance Vector AODV and Destination Sequenced Distance Vector DSDV . DSDV uses proactive or table driven approach to route the data whereas AODV is a reactive protocol and uses on demand routing. Main target of this paper is to highlight different aspect of both protocols and compare them. So, one can decide which protocol is better suited to their needs. Anurag Misra "Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: https://www.ijtsrd.com/papers/ijtsrd158.pdf
APA, Harvard, Vancouver, ISO, and other styles
14

Surendro, Krisnha Prasetyo. "Menentukan Optimasi Routing dengan Pengaturan Route Advertisement pada Jaringan Mobile IPV6." Jurnal Telekomunikasi dan Komputer 1, no. 2 (2017): 58. http://dx.doi.org/10.22441/incomtech.v1i2.1096.

Full text
Abstract:
Tuntutan jaman yang serba modern terkait dengan teknologi adalah usermampu mendapatkan akses dimanapun dan kapanpun secara real timeatau terus menerus. Pada penelitian ini ingin memodelkan jaringanWLAN pada akses point yang berbeda-beda menggunakan Mobile IPv6,agar didapatkan proses handover dengan throughput yang tinggi dandelay yang serendah-rendahnya. Diharapkan ketika user berpindah darisatu AP ke AP yang lain, komunikasi data tidak akan terputus, user tetapdapat membuka website, membuka email, bahkan tetap dapatmelanjutkan download atau upload walaupun terjadi perpindahan antarAP. Hal tersebut dimungkinkan dengan menggunakan mobile IP. Untukpenelitian kali ini penulis memilih menggunakan mobile Ipv6 yangmempunyai banyak kelebihan dibandingkan dengan mobile Ipv4,beberapa diantaranya adalah proses route optimation dan auto addressconfiguration. Metode penelitian yang digunakan terdiri dari metodeanalisa dan perancangan. Metode analisa dilakukan dengan caramenganalisa hasil simulasi router advertisement, juga menganalisathroughput, route optimasi, active access point, dan handover. Metodeperancangan dilakukan dengan membuat jaringan Mobile IPv6 denganmenggunakan software OPNET Modeler. Dengan menggunakanparameter dari mobile IP maka didapatkan hasil bahwa simulasi dapatberjalan sesuai rencana, dimana user dapat handover dari AP satu ke APlain, user dapat juga melakukan route optimation, bahkan denganmemodifikasi network modeling mampu didapatkan delay yang lebihkecil. Untuk mendapatkan hasil simulasi yang lebih baik, maka kitahendaknya mempelajari OPNET dengan lebih detil terkait denganparameter-parameter didalamnya.
APA, Harvard, Vancouver, ISO, and other styles
15

Senan, Shayma, and Aisha Hassan A. Hashim. "Performance Analysis of HRO-B+ Scheme for the Nested Mobile Networks using OPNet." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 2 (2017): 522. http://dx.doi.org/10.11591/ijeecs.v8.i2.pp522-532.

Full text
Abstract:
<p>As a demand of accessing Internet is increasing dramatically, host mobility becomes insufficient to fulfill these requirements. However, to overcome this limitation, network mobility has been introduced. One of its implementation is NEMO Basic Support protocol which is proposed by Internet Engineering Task Force (IETF). In NEMO, one or more Mobile Router(s) manages the mobility of the network in a way that its nodes would be unaware of their movement. Although, it provides several advantages, it lacks many drawbacks in term of route optimization especially when multiple nested mobile networks are formed. This paper presents a new hierarchical route optimization scheme for nested mobile networks using Advanced Binding Update List (BUL+), which is called HRO-B+. From performance evaluation, it shows that this scheme performs better in terms of throughp<em>ut, delay, response time, and traffic, and achieves optimal routing.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
16

Banu, S. Munawara. "EVALUATING THE PERFORMANCE OF MULTIPATH ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS: A COMPARATIVE STUDY." international journal of advanced research in computer science 16, no. 1 (2025): 36–41. https://doi.org/10.26483/ijarcs.v16i1.7187.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a dynamic wireless network that links mobile devices without fixed infrastructure. All device in MANET acts as a node and a router, dynamically establishing and maintaining network connections as they move. Mobile Ad Hoc Networks find widespread application in scenarios where conventional network infrastructure is absent or unfeasible, including military deployments, emergency response efforts, and vehicle-to-vehicle communication systems. Routing in MANETs can be ambitious due to dynamic topologies, limited bandwidth, and power restraints. The protocols governing these networks fall into three basic categories, proactive, reactive, and hybrid routing protocols. Multipath routing in MANET involves establishing several paths between source and destination. This technique enhances network performance by providing numerous benefits. This research examines multipath routing protocols like MP-OLSR, SMR, AOMDV, ZRP, TORA and analyses key metrics including route discovery efficiency, route maintenance, end-to-end delay, packet delivery ratio, and energy usage.
APA, Harvard, Vancouver, ISO, and other styles
17

Deng, Xiaoping, Lujuan Ma, and Xiaoping Liu. "CCAIB: Congestion Control Based on Adaptive Integral Backstepping for Wireless Multi-Router Network." Sensors 22, no. 5 (2022): 1818. http://dx.doi.org/10.3390/s22051818.

Full text
Abstract:
Wireless information collecting and processing terminals, such as cell phones, sensors and smart wearable devices, are expected to be deployed on a large scale in the future to promote the continuous advancement of the global information revolution. Since most of these terminals connect to each other using long-distance and high-speed networks by multiple routers and eventual access the internet, the application of mobile internet is gradually increasing and data traffic on the mobile internet is growing exponentially, from which arises congestion in wireless networks on multiple routers. This research solves the congestion problem for wireless networks with multiple bottleneck routers. First, the wireless network model is expanded to multi-router networks, which considers the interrelationships between connecting routers. Afterwards, a new Active Queue Management (AQM) method called Congestion Control Based on Adaptive Integral Backstepping (CCAIB) is designed to handle congestion in wireless networks. In CCAIB, an adaptive control method is used to estimate the packet loss ratios of wireless links and a controller is designed based on the estimation results through a backstepping procedure. It can be shown from the simulation results that the performance of CCAIB is better than the H∞ algorithm in queue length stability. Besides, the window size of CCAIB is 100 times that of the H∞ algorithm, and the proportion of packets marked as discarded when using CCAIB is about 0.1% of the H∞ algorithm. Moreover, CCAIB has satisfactory adaptability to network parameters such as wireless link capacity, propagation delay, wireless packet loss ratios, desired queue length and router location.
APA, Harvard, Vancouver, ISO, and other styles
18

Nizovtsev, Yuriy, Oleg Parfylo, and Oleh Plakhotnik. "Identification of Person Suspected of Committing a Cybercrime Using Wi-Fi Technologies." Theory and Practice of Forensic Science and Criminalistics 33, no. 4 (2023): 23–38. http://dx.doi.org/10.32353/khrife.4.2023.12.

Full text
Abstract:
This article purpose is to investigate the issue of using Wi-Fi routers and information they contain during the investigation of cybercrimes committed using Wi-Fi technology as a method effective for identifying suspect person or group of persons and subsequently determining their location. For achieving this goal, general scientific and special scientific research methods were applied. Various methodical recommendations on the use of Wi-Fi routers for mobile device installation by means of forensic research have been developed. It is emphasized that in case of committing cybercrime using a Wi-Fi router, a professional and forensic expert can use technical information from the Wi-Fi router to identify the suspect’s mobile device by MAC address. Problematic issues of identifying signs of hiding digital traces during cybercrime commission a are considered. The procedure for obtaining access to Wi-Fi routers for the purpose of identifying suspect during inspection, search, seizure and investigation of cybercrimes is outlined. Data from Wi-Fi routers has been proven to not only help identify criminal suspects in cybercrime investigations: this method can be universal for identifying criminal suspects with incomplete data. The “electronic data” term was analyzed, special role of a specialist in the review of electronic data was noted, and it was proposed to change the current Criminal Procedural Code of Ukraine in terms of specialist participation in electronic data review on behalf of investigator, prosecutor, and investigator during a pre-trial investigation of criminal cases. misdemeanors The provisions and conclusions of the author’s research will be useful in investigative, investigative and forensic activities.
APA, Harvard, Vancouver, ISO, and other styles
19

Djassi, Papa. "Effects of fixed and roaming CN on MIPv6 networks." Global Journal of Computer Sciences: Theory and Research 7, no. 3 (2017): 145–52. http://dx.doi.org/10.18844/gjcs.v7i3.2800.

Full text
Abstract:
Mobile Internet protocol version 6 (MIPv6) is a protocol that allows mobile nodes (MNs) to remain accessible while moving in the IPv6 network, providing users with a form of transparency in spite of the mobility. Mobile networks consist of different nodes such as the MN, correspondent node (CN), home agent (HA), foreign agent or router (FA or FR) and mobile router (MR). One of the vital nodes in a mobile network is CN, a node that communicates with the MN. In the future, in times of need, for instance, during wars, disasters or natural hazards, an MN may require the services of a CN in order to roam. In this paper, we analyse the effect of fixed and roaming CN on MIPv6 networks. The results show that, with a fixed CN, the delay variation performance, end-to-end delay and packet received are better than having a roaming CN in the mobile networks. This requires the attention of researchers, especially when all the communicating nodes (i.e., MN and CN) are roaming in the mobile networks to reduce the delay and packet drop, especially during the handover process.
 Keywords: MIPv6, fixed CN, roaming CN, MN, HA and FA.
 
 
APA, Harvard, Vancouver, ISO, and other styles
20

T., Priyanka. "Zone based Hierarchical Link State for Detecting Malicious Node and Black Hole Attack Detection for Mobile Ad hoc Networks." Journal of Advancement in Communication System 5, no. 2 (2022): 1–5. https://doi.org/10.5281/zenodo.7127732.

Full text
Abstract:
<em>Upcoming years of emerging end efficient research work is focused on wireless network like cellular network and ad hoc network is two classifications, cellular network is fixed and centralized router and ad hoc is dynamic and distributed router. In this paper is based on ad hoc network called mobile ad hoc networks (MANET) is collection of separate mobile nodes, the following network is affect different challenging issues such as security, energy, packet loss/drop, traffic. Security to affect many parameters because drop and retransmitting, so I focused security accepts to detected and eliminate misbehaviour node and block hole attacks using hybrid routing protocol namely, Modified - </em><em>Zone based Hierarchical Link State routing protocol Network Simulator (NS2). </em>
APA, Harvard, Vancouver, ISO, and other styles
21

Deepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.

Full text
Abstract:
In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases. The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm. This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.
APA, Harvard, Vancouver, ISO, and other styles
22

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Shaibani, Badiea Abdulkarem Mohammed, and TAT-CHEE WAN. "RAPID-INTEGRATED NEMOV6 HANDOFF IN IEEE802.16E BWA NETWORKS." Journal of Applied Artificial Intelligence 2, no. 1 (2021): 9–21. http://dx.doi.org/10.48185/jaai.v2i1.327.

Full text
Abstract:
NEMO basic support protocol was created by IETF NEMO working group to extend basic end-host mobility support in, Mobile IP (MIP) protocol to provide network mobility support. However, the handover latency in this scheme is high, and not suitable for multimedia and real time applications. Many techniques have been proposed to solve this problem by parallelizing the dual layers handover and assigning the network layer handover part to the serving Mobile Router (PAR) or to the Home Agent (HA). These techniques either not fully parallelized or its advantages will be lost if the distance between the Mobile Router and its HA is so long. In this paper, we propose a new technique called Rapid-Integrated NEMO Handover (RINEMO) that keep its advantage whatever the distance between the MR and its HA and present a better parallelizing between the link layer and the network layer handover steps. Analytical results comparing the techniques are provided, showing that our technique have the lowest handover latency and lowest disruption time.
APA, Harvard, Vancouver, ISO, and other styles
24

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
25

Mahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.

Full text
Abstract:
&lt;p&gt;The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
26

Mahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193–200. https://doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.

Full text
Abstract:
The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
27

José, Diógenes Antonio Marques, Renato F. Bulcão-Neto, Vinícius Sebba Patto, and Iwens Gervásio Sene Júnior. "OLSR Fuzzy Cost (OLSR-FC): an extension to OLSR protocol based on fuzzy logic and applied to avoid selfish nodes." Revista de Informática Teórica e Aplicada 26, no. 1 (2019): 60. http://dx.doi.org/10.22456/2175-2745.86380.

Full text
Abstract:
The mobile ad-hoc networks (MANET) are those whose nodes have mobility, energy restriction and operate simultaneously as end systems and router. One of the main problems found in MANETs is the occurrence of selfish nodes, which are those that refuse to route packets for other nodes. To address the issue of selfish nodes in MANETs and improve the flow of traffic in these networks, this paper proposes an extension to the OLSR protocol, based on Fuzzy logic, called OLSR Fuzzy Cost (OLSR -FC). Using the NS-2 simulator, the OLSR-FC proposal was compared to other extensions of OLSR protocol (e.g., OLSR-ETX, OLSR-ML e OLSR-MD) concerning the performance metrics: packet loss, end-to-end delay, Jitter, power consumption, routing overhead and throughput. The results showed that OLSR-FC obtains better performance than the evaluated extensions, avoiding selfish nodes and selecting routes whose links have little packet losses.
APA, Harvard, Vancouver, ISO, and other styles
28

Yan, Zhiwei, Huachun Zhou, Hongke Zhang, and Chi Hsiang Lo. "Advanced handover management framework for Mobile Router based on MCoA." International Journal of Ad Hoc and Ubiquitous Computing 10, no. 1 (2012): 49. http://dx.doi.org/10.1504/ijahuc.2012.047259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Xiaohua, Hongke Zhang, Yao-Chung Chang, and Han-Chieh Chao. "Experimentation and performance analysis of multi-interfaced mobile router scheme." Simulation Modelling Practice and Theory 18, no. 4 (2010): 407–15. http://dx.doi.org/10.1016/j.simpat.2009.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tasanah Assakur, Yoga Hilmi, Mohamad Seh Fahrudin, and Ferdiansyah Ferdiansyah. "Implementasi API Mikrotik untuk Management Router Berbasis Android (Studi Kasus: PT Sigma Adi Perkasa)." Jurnal Sains dan Informatika 6, no. 1 (2020): 92–101. http://dx.doi.org/10.34128/jsi.v6i1.217.

Full text
Abstract:
Mikrotik merupakan salah satu perangkat jaringan yang digunakan untuk mengatur semua kebutuhan jaringan pada suatu perusahaan atau organisasi. Penelitian dilakukan pada PT Sigma Adi Perkasa, kualitas dari jaringan sangat penting untuk menunjang pekerjaan. Seorang administrator jaringan membutuhkan sebuah perangkat komputer atau Laptop untuk melakukan konfigurasi jaringan, jika seorang administrator sedang tidak ditempat maka akan sulit untuk melakukan konfigurasi. Oleh karena itu dibutuhkan sebuah aplikasi berbasis mobile yang bisa digunakan untuk management router mikrotik kapanpun dan dimanapun. Adapun metode yang akan digunakan dalam penelitian ini adalah metode eksperimental dan metode demonstrasi. Metode eksperimental digunakan untuk membuat pengujian, menganalisa, menulis, memproses data dan membuat kesimpulan. Metode demonstrasi digunakan untuk mempresentasikan langkah-langkah dari router mikrotik yang merupakah alat dari penelitian ini. Aplikasi ini akan dikembangkan menggunakan perangkat lunak Android Studio dengan bahasa pemrograman Java, serta sebuah library API dari mikrotik. Aplikasi ini memiliki fungsi update data, sehingga administrator jaringan dapat melakukan penambahan konfigurasi, edit, simpan dan hapus secara berkala. Aplikasi yang dibuat telah berhasil dilakukan pengujian black box dengan fitur-fitur yang telah dibuat dapat digunakan dengan baik. Dengan aplikasi mobile, konfigurasi dan troubleshooting router mikrotik telah memberi pengaruh yang positif dan mempermudah pekerjaan seorang administrator jaringan.
APA, Harvard, Vancouver, ISO, and other styles
31

Djuni H, I. G. A. K. Diafari, I. G. A. P. Raka Agung, N. Pramaita, and Made Sugiri. "PEMBUATAN PROTOTYPE SISTEM PENGENDALI LAMPU RUMAH DENGAN PERANGKAT MOBILE ANDROID." Majalah Ilmiah Teknologi Elektro 14, no. 2 (2015): 22. http://dx.doi.org/10.24843/mite.2015.v14i02p05.

Full text
Abstract:
AndroidisaLinux-basedoperatingsystemandis open source that can be developed independently so that more applications can be made. This application can also be integrated with other devices to control or control system is desirable. Media remote control or wireless (LAN) is a growing need for human behavior that want to move faster and farther range of location of residence. This research will be designed and built a prototype system controlling lights at home using Arduino microcontroller connected to mobile devices based on Android. Light control is done on a mobile device that is connected to the control system via WiFi Router lights. Wifi Router has sufficient coverage so that the owners of these devices can move more comfortably without having to control the lights via a switch on the wall of the house. The house lights controller circuit can adjust the lights ON and OFF as well as the Bright and Dim the lamp 1 and lamp 2. Lighting Control Application on mobile android devices already can set the lights on the control circuit.
APA, Harvard, Vancouver, ISO, and other styles
32

Shahamabadi, Mohammadreza, Borhanuddin Ali, Nor Noordin, Mohd Rasid, Pooria Varahram, and Antonio Jara. "A NEMO-HWSN solution to support 6LoWPAN network mobility in hospital wireless sensor network." Computer Science and Information Systems 11, no. 3 (2014): 943–60. http://dx.doi.org/10.2298/csis130917058s.

Full text
Abstract:
IPv6 Low-power Personal Area Networks (6LoWPANs) have recently found renewed interest because of the emergence of Internet of Things (IoT). Mobility support in 6LoWPANs for large-scale IP-based sensor technology in future IoT is still in its infancy. The hospital wireless network is one important 6LoWPAN application of the IoT, it keeps continuous monitoring of vital signs of moveing patients. Proper mobility management is needed to maintain connectivity between patient nodes and the hospital network. In this paper, first we survey IPv6 mobility protocols and propose a solution for a hospital architecture based on 6LoWPAN technology. Moreover, we discuss an important metric like signaling overload to optimize the power consumption and how it can be optimized through the mobility management. This metric is more effective on the mobile router as a coordinator in network mobility since a mobile router normally constitutes a bottleneck in such a system. Finally, we present our initial results on a reduction of the mobility signaling cost and the tunneling traffic on the mobile PAN.
APA, Harvard, Vancouver, ISO, and other styles
33

Anandha Lakshmi, R., and T. Suresh. "A Relative Study of Various Routing Protocols in Mobile Ad Hoc Network." Asian Journal of Computer Science and Technology 7, S1 (2018): 78–81. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1800.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an infrastructure fewer networks built on a multihop conveying idea. It transmits data from base node to end node. Because MANETS don’t have any fixed infrastructure and it works in a distributed manner. For efficient communication, many routing protocols are used in MANET. Routing protocols are to find a new route to transmit data from base to accurate end through the midway nodes. Every in-between node is act as a router. So, this paper is covers the routing protocols AODV, DSR, DSDV and OLSR to keep current routing information from every node to each other nodes. The purpose of this paper to offers a relative study of routing protocols in MANET and energy aware performance metrics are analyzed on two routing protocols of AODV and DSDV.
APA, Harvard, Vancouver, ISO, and other styles
34

Huang, Zhiwu, Yingze Yang, osheng Hu, and Kuo Chi Lin. "A fast handover scheme based on multiple mobile router cooperation for a train-based mobile network." International Journal of Modelling, Identification and Control 10, no. 3/4 (2010): 202. http://dx.doi.org/10.1504/ijmic.2010.034572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

KIM, M., T. J. LEE, and H. CHOO. "On Multicasting Based on Nested Mobile Router Information in Network Mobility." IEICE Transactions on Communications E89-B, no. 10 (2006): 2794–801. http://dx.doi.org/10.1093/ietcom/e89-b.10.2794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

KIM, MIHUI, YUKYONG JUNG, and KIJOON CHAE. "ADAPTIVE DATA MINING APPROACH FOR FLOW REDIRECTION IN MULTIHOMED MOBILE ROUTER." International Journal of Information Technology & Decision Making 09, no. 05 (2010): 737–58. http://dx.doi.org/10.1142/s0219622010004081.

Full text
Abstract:
On multihomed mobile router with several interfaces toward Internet, it is important to provide an efficient flow redirection (FR) method that changes the served interface according to each network status or user movement. However, currently as the mobile devices roams, the interface is selected as only the physical signal strength, thus efficient resource use or quality of service (QoS) support is not guaranteed. In this paper, we propose an adaptive data mining approach that provides the selection of influential attributes for FR and the proper FR decision model as the interface type. We analyze assuming network protocols in order to heuristically extract the FR candidate attributes for estimating the required QoS. We abstract theoretically the FR influential attributes through decision-tree algorithm, and finally obtain the proper FR decision models per each interface. Our simulation results show that our FR approach provides improved performances in comparison with current handover.
APA, Harvard, Vancouver, ISO, and other styles
37

Choi, Ju-Ho, Jung-Hwan Cha, Youn-Hee Han, and Sung-Gi Min. "A Dual-Connectivity Mobility Link Service for Producer Mobility in the Named Data Networking." Sensors 20, no. 17 (2020): 4859. http://dx.doi.org/10.3390/s20174859.

Full text
Abstract:
With the exponential growth of Cyber-Physical Systems (CPSs) technologies, the Internet of Things (IoT) infrastructure has evolved from built-in static infrastructure to a flexible structure applicable to various mobile environments. In this Internet of Mobile Things (IoMT) environment, each IoT device could operate simultaneously as a provider and consumer of information, and could provide new services through the exchange of such information. Named Data Networking (NDN), which could request data by content name rather than location (IP address), is suitable for such mobile IoT environments. However, in the current Named Data Networking (NDN) specification, producer mobility is one of the major problems in need of remedy. Previously proposed schemes for producer mobility use an anchor to hide the producer’s movement from consumers. As a result, they require a special anchor node and a signaling procedure to track the current locations of contents. A few anchorless schemes have also been proposed, but they still require mobility signaling and all NDN routers on the signaling path must understand the meaning of the signaling. We therefore propose an anchorless producer mobility scheme for the NDN. This scheme uses a dual-connectivity strategy that can be expressed as a soft handover. Whenever a producer changes its NDN Access Router (NAR), the new mobility link service located on the mobile producer’s old NDN face repairs the old link so that the connectivity with the pNAR can be maintained for a while. The old NDN face is removed after the new location information on the contents of the producer is disseminated over the NDN network by the Named-data Link State Routing Protocol (NLSR) routing protocol at the nNAR. The new mobility link service decouples connection and transaction to hide the collapse of the link. Therefore, the NDN’s mobility procedure could be simplified as the handover is defined as transaction completion as opposed to a breakdown of links. The proposed scheme prevents the routing information from being abruptly outdated due to producer mobility. Our simulation results show seamless handover when the producer changes its default access router.
APA, Harvard, Vancouver, ISO, and other styles
38

Cha, Woo-Suk, Eun-Mi Kim, Ho-Young Bae, Bae-Ho Lee, and Gi-Hwan Cho. "An Efficient Resource Reservation Scheme using a Dynamic Branch Router for Mobile IPv6 Networks." KIPS Transactions:PartC 14C, no. 3 (2007): 255–66. http://dx.doi.org/10.3745/kipstc.2007.14-c.3.255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

R. Das, Satya, Sayan Sen Sarma, Mitrabinda Khuntia, Indranil Roy, Koushik Sinha, and Bhabani P. Sinha. "A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G Networks." International journal of Computer Networks & Communications 14, no. 1 (2022): 1–24. http://dx.doi.org/10.5121/ijcnc.2022.14101.

Full text
Abstract:
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
APA, Harvard, Vancouver, ISO, and other styles
40

Panitzek, Kamill, Immanuel Schweizer, Axel Schulz, Tobias Bönning, Gero Seipel, and Max Mühlhäuser. "Can We Use Your Router, Please?" International Journal of Information Systems for Crisis Response and Management 4, no. 4 (2012): 59–70. http://dx.doi.org/10.4018/jiscrm.2012100104.

Full text
Abstract:
During rescue missions first responders rely on voice communication making crisis management nearly impossible without good means of communication. Unfortunately the communication technology used by first responders today does not scale well. Also most of the given infrastructure, such as cell towers, might be destroyed after a disaster. Therefore, ad-hoc and peer-to-peer-based communication schemes have been proposed in recent research to provide scalable and resilient communication. Most mobile phones today are equipped with wireless transceivers that make them suitable to participate in ad-hoc networks. But in this case, device density might be too small for a connected topology. In this paper, the authors propose an emergency switch for privately owned wireless routers. The switch allows wireless routers to transition to an emergency mode creating a supportive wireless mesh network. To analyze if such a network would result in a resilient topology real data from wireless routers in a city is gathered. They calculate the locations of private and public routers from GPS traces and compare the resulting networks with each other. Finally, the authors discuss open and critical questions and implications the proposed emergency switch would introduce.
APA, Harvard, Vancouver, ISO, and other styles
41

Kaur, Gurvinder, Rajeev Bedi, and Mohit Marwaha. "A Novel Approach towards Link Stability in MANET’s Using Coordinate Position." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 12 (2019): 06–08. http://dx.doi.org/10.17762/ijritcc.v7i12.5389.

Full text
Abstract:
Advances in remote innovation and hand-held processing systems have acquired transformation in mobile communication’s area. The expanding mobility of people over the globe created interest for infrastructureless and rapidly deployable portable systems. Such systems are alluded to as Mobile Adhoc Networks (MANET). Generally, nodes in MANETs additionally work as a router while they are allowed to roam while transmitting with each other. This paper gives a proposal approach towards the coordinate based link stability and the same is shown with the help of proposed flowchart.
APA, Harvard, Vancouver, ISO, and other styles
42

K.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.

Full text
Abstract:
<em>Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different wireless communication technologies, MANETs are important because they have mobile nodes that can be randomly coupled via wireless links. </em><em>Every node in the network functions as a router and keeps track of routes to other nodes. To stop attackers from faking acknowledgement packets, Enhanced Adaptive 3 Acknowledgment (EA3ACK) was introduced. This study presents a novel intrusion detection system, EA3ACK, that reduces end-to-end delay in MANETs by combining Secure Hybrid Shortest Path Routing (SHSP) with EAACK (DSA). With the help of the secure hybrid shortest path routing algorithm, the ACK technique is used to prevent all forms of network attacks. In addition to preventing packet loss and delay, it also speeds up nodes. The suggested approach is implemented in the test system and simulated using Network Simulator (NS2). </em><em>The proposed SHSP provides secure transmission and further reduces routing overhead, delay and packet loss since EA3ACK with SHSP algorithm increases efficiency of network topology.</em>
APA, Harvard, Vancouver, ISO, and other styles
43

NIZOVTSEV, Y., та O. PARFYLO. "Using the wi-fi capabilities of routers for determining a mobile terminal and its network activity during сyber crimes investigation". INFORMATION AND LAW, № 4(47) (29 листопада 2023): 124–35. http://dx.doi.org/10.37750/2616-6798.2023.4(47).291614.

Full text
Abstract:
The possibilities of Wi-Fi routers for establishing a mobile terminal and its network activity during the investigation of cybercrimes were investigated. In particular, the following problematic issues are revealed: what evidentiary information can be found in a Wi-Fi router, how to record and remove it, as well as circumstances that can hinder the search for an intruder and proving his guilt. The role and importance of electronic communications expertise or forensic comprehensive electronic communications expertise and computer-technical expertise to analyze log files for signs of a cyber attack are highlighted. The peculiarities of searching, fixing and extracting information about the MAC address of the network interface of the Wi-Fi transmitter are detailed.
APA, Harvard, Vancouver, ISO, and other styles
44

Agrawal, Vikram. "Security with respect to MANET (Mobile Ad-hoc Network) and IoT (Internet of Things)." Oriental journal of computer science and technology 10, no. 1 (2017): 82–85. http://dx.doi.org/10.13005/ojcst/10.01.11.

Full text
Abstract:
MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.
APA, Harvard, Vancouver, ISO, and other styles
45

J, Isac Gnanaraj, and Sriram . "A Framework to Enhance Security in Nemo Environment Using AAA Mechanisms." International Journal of Emerging Research in Management and Technology 6, no. 8 (2018): 400. http://dx.doi.org/10.23956/ijermt.v6i8.172.

Full text
Abstract:
One of emerging trends in the mobile network era is Network Mobility (NEMO). It was standardized by the Internet Engineering Task Force (IETF) and gained attention of the researchers because of research opportunities that it provides. Though it was developed based on MIPv6, there are few spots that must be analyzed and rectified, especially in the security aspects. According to the literatures, NEMO lacks in providing a robust Authentication, Authorization and Accounting (AAA) services to its users. AAA operations must be performed for all the players of the mobile network, because a hacker may reside at any place and try to access the mobile network by hiding behind valid or genuine nodes’ addresses. This research work aims to provide an AAA framework for NEMO by comprising three different mechanisms which are developed for Local Mobile Node (LMN), Visiting Mobile Node (VMN) and Mobile Router (MR). Simulation and performance analysis are done.
APA, Harvard, Vancouver, ISO, and other styles
46

Singh, Vivek Kumar, Mukesh Kumar, A. K. Jaiswal, and Rohini Saxena. "Performance Comparison of AODV, OLSR and ZRP Protocol in MANET using Grid Topology through QualNet Simulator." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 3 (2013): 862–67. http://dx.doi.org/10.24297/ijct.v8i3.3394.

Full text
Abstract:
In MANET mobile nodes are communicating through wireless medium and do not require any pre-existent infrastructure. In MANET all mobile nodes behaves as router and when required they takes part in discovery and maintenance of the route to the other node. Without the fixed base station the mobile nodes dynamically exchange data among themselves. Popularity of MANET has been increased because of the availability of license-free wireless communication devices. MANET can be used for disaster-management, business meetings, military operations, rescue operations, or in a situation, where temporary communication network among some nodes is demanded. ZRP is a well known hybrid routing protocol. To understand its suitability we must understand its behavior under various real time conditions. This paper presents performance analysis of AODV routing protocol over OLSR and ZRP routing protocols using QualNet version 6.1. This experiment uses different network conditions, close to real time condition, for the performance analysis of AODV using OLSR and ZRP as a reference protocol. Simulations are carried out to analyze the different network parameters such as throughput, average jitter, average end-to-end delay and packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
47

K., Thamizhmaran. "Secure Hybrid Shortest Path Algorithm in Mobile Ad hoc Networks for Optimize Link State Routing." Journal of VLSI Design and its Advancement 6, no. 3 (2023): 14–18. https://doi.org/10.5281/zenodo.10082579.

Full text
Abstract:
<i>MANETs are the significant technologies among various air communication technologies where all the nodes are mobile and can be connected dynamically using wireless link in a random manner. All nodes work router and maintain routes to other nodes in the network.&nbsp;In this recent research work, a new system called, Secure Hybrid Shortest Path (SHSP) Routing compare with optimized link state routing (OLSR) proactive routing protocol&nbsp;is designed for MANETs to reduce end-to-end delay, secure hybrid shortest path routing algorithm besides avoiding delay and packet loss, it increases the node speed also.&nbsp;Network Simulator (NS2) is used to simulate the proposed method and implemented in the test system.&nbsp;The new routing protocol named OLSR-SHSP using OLSR is proposed to address the problem. Shortest path system based transmission is highly secure with the lowest delay and packet dropping. All the three scenarios OLSR-SHSP provides better performance compared to the existing system routing protocol by decreasing end-to-end delay, lowering routing overhead and reducing packet drop compared to the OLSR routing protocol. To enhance the merits of this research work, there is a plan to investigate the following issues in the future. However, the same concept can be applied in satellite to reduce end-to-end delay in the route and reduce packet loss, Possibilities of adopting secure quality oriented techniques to further improve the network performance of quality</i>.
APA, Harvard, Vancouver, ISO, and other styles
48

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
49

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2020): 4412–22. https://doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
50

Permatasari, Ulfa Septilia, and Indrastanti Ratna Widiasari. "Analisis Routing Protokol Optimized Link State Routing (OLSR) Pada Raspberry Pi." AITI 16, no. 2 (2020): 151–64. http://dx.doi.org/10.24246/aiti.v16i2.151-164.

Full text
Abstract:
Optimized Link State Routing (OLSR)is one of the two standard for mesh networks. OLSR is a link state routing protocol, which use hallo message and topology control (TC) to determine the link state information across the mobile ad-hoc network. OLSR is widely used in the wireless mesh network. Raspberry Pi is a mini computer which can be used as a node router to replace the function of a router in a wireless mesh network. In this research, Raspberry Pi is used as a router nodes to determine the performance of routing protocol OLSR. The parameters used to measure its performance is self-configure time, self-healing and bandwidth usage. The test results showed that the use of routing protocols OLSR on the Raspberry Pi in a wireless mesh network proved able to repair itself if there is a problem on the network since it has ability to self-configure and self-healing.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!