Enhancing Data Security in Mobile Ad Hoc Networks Via Multipath Routing and Directional Transmission

Enhancing Data Security in Mobile Ad Hoc Networks Via Multipath Routing and Directional Transmission PDF Author: Vladimir Berman
Publisher:
ISBN:
Category :
Languages : en
Pages : 208

Get Book Here

Book Description

Enhancing Data Security in Mobile Ad Hoc Networks Via Multipath Routing and Directional Transmission

Enhancing Data Security in Mobile Ad Hoc Networks Via Multipath Routing and Directional Transmission PDF Author: Vladimir Berman
Publisher:
ISBN:
Category :
Languages : en
Pages : 208

Get Book Here

Book Description


Enhanced On-Demand Multipath Routing for Wireless Networks

Enhanced On-Demand Multipath Routing for Wireless Networks PDF Author: Periyasamy Pitchaipillai
Publisher: Cambridge Scholars Publishing
ISBN: 1527514749
Category : Computers
Languages : en
Pages : 162

Get Book Here

Book Description
The Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol is widely used in highly dynamic ad-hoc networks because of its generic features. The transmission of reliable energy efficient data is an emerging issue in AOMDV routing as the nodes are prone to link failures and route breaks in highly dynamic ad-hoc networks. In order to eliminate such problems, a novel node disjoint multipath routing protocol called Link Reliable Energy Efficient AOMDV (LR-EE-AOMDV), the extension of a well-known AOMDV, is proposed here to find multiple link reliable energy efficient paths between any source and destination pair for data transmission using metrics such as Path Length, Path-Link Quality Estimator (P-LQE) and a novel Path-Node Energy Estimator (P-NEE).

Defence System for MANETs. Mobile Adhoc Networks

Defence System for MANETs. Mobile Adhoc Networks PDF Author: Mir Shahnawaz Ahmad
Publisher: GRIN Verlag
ISBN: 3668922195
Category : Computers
Languages : en
Pages : 59

Get Book Here

Book Description
Master's Thesis from the year 2016 in the subject Engineering - Computer Engineering, grade: A+, , language: English, abstract: The main aim of this work is to guarantee a security solution which provides defence against attacks. To achieve that, a secure routing protocol (SMAODV) is presented which makes use of the multiple paths between source-destination pairs for removing the malicious routes from the network thereby reducing the effect of the attack to a great extent. MANET is a class of ad hoc networks which spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET’s towards the attacks is huge as compared to their wired counterparts. MANET’s are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared medium, constrained resources etc. The ramification being that the security needs of MANET’s become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANET’s come from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open me reachable to both the legitimate users of the network as well as the malicious nodes. Consequently, there is a bankruptcy of clear line of defence from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. When these types of attacks occur in ad hoc networks then even the standard routing protocols like AODV, DSDV, DSR, LAR, and LAMR etc. do not provide the required security. The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attack. But, the attack on availability which is the most common and easiest of them all cannot be avoided by authentication and encryption because even the authentic user can be the attacker. Also, encryption cannot be helpful to prevent such attacks. Therefore in such a situation if a proper solution is not provided the entire MANET operation will get crippled.

Caching-based Multipath Routing in Mobile Ad Hoc Networks

Caching-based Multipath Routing in Mobile Ad Hoc Networks PDF Author: Vineet Joshi
Publisher:
ISBN:
Category :
Languages : en
Pages : 80

Get Book Here

Book Description
Mobile ad hoc networks represent a new approach towards computer networking which does not depend on an infrastructure for its operation. This flexibility gives rise to new applications of networks which were not possible with the networks that critically depend on an infrastructure for their operation. However this absence of infrastructure also gives rise to a host of problems with the network operation. Routing data from a source to destination is one such problem. Mobility of the nodes causes frequent topological changes and further complicates the problem. Many protocols have been proposed to help route data in mobile ad hoc networks. A sub class of these protocols makes use of a set of multipath routes to transmit data from the source to the destination. During the course of our research we discovered inefficiencies associated with these routing protocols. We have proposed the reuse of cached routes as a technique to reduce these inefficiencies and improve the performance of mobile ad hoc network along various performance parameters. We have proposed a new multipath routing protocol called CMR that makes use of the technique of reusing cached routes in determining new routes. Through extensive simulation experiments we have been able to analyze the performance of new protocol and demonstrate its advantages.

E-Business and Telecommunication Networks

E-Business and Telecommunication Networks PDF Author: Joaquim Filipe
Publisher: Springer Science & Business Media
ISBN: 3540707603
Category : Computers
Languages : en
Pages : 381

Get Book Here

Book Description
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the e-business field. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (Int’l Conf. on e-Business), SECRYPT (Int’l Conf. on Security and Cryptography), WINSYS (Int’l Conf. on Wireless Information Systems) and SIGMAP (Int’l Conf. on Signal Processing and Multimedia). The program of this joint conference included seven outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to heightening the ov- all quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-Business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks, showing that the technical problems in both fields are challenging, related and significant.

Investigation on Collision Control in Manet for Secure Routing

Investigation on Collision Control in Manet for Secure Routing PDF Author: Mohanraj Renuka
Publisher: LAP Lambert Academic Publishing
ISBN: 9783659796425
Category :
Languages : en
Pages : 140

Get Book Here

Book Description
A Mobile ad hoc network (MANET) is an infrastructure-less network of mobile devices linked with wireless medium. Mobile network is a type of wireless network that frequently has a routable networking environment. Each node in a MANET separately travels in different directions. Multipath routing uses various paths for a packet transmission in a network which produce a variety of advantages such as fault tolerance and improve security. Mobile Ad hoc Network is an autonomous system facing several issues such as attacks due to the wireless communication media and limitation related to routing. With the increase in popularity of the mobile devices, routing has become a challenging task due to the dynamic network topology along with critical energy efficiency and becomes further complicated with huge population of devices. As a result, the network uses the multipath secure routing techniques to improve the overall throughput.

Multipath Routing Protocol for Ad Hoc Networks

Multipath Routing Protocol for Ad Hoc Networks PDF Author: Phu Hung Le
Publisher:
ISBN:
Category :
Languages : en
Pages : 152

Get Book Here

Book Description
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes that move freely and self-configure without a preexisting communication infrastructure. In MANETs, under the arbitrary movement of nodes and highly dynamic topology conditions, the routing protocols for fixed networks do not perform well. To adapt to the rapid change of topology, many routing protocols have been proposed. However, most of them chose the minimum hop-count routes. This choice can lead to significant reduction of the network performance because communication quality via the chosen links is not good. Thus, the evaluation of link quality is indispensable and interference is a key factor to be considered. In the literature, most of the existing interference-aware protocols are single path and the consideration for interference range is limited. Several proposed interference-aware multi-path protocols for MANETs are either not highly efficient or have the computational complexity of NP-hard.To tackle the above problems, we first determine an interference region of each link including all nodes that can interfere with this link. Then, we propose a formula to evaluate the interference level of each link. Based on the formula of the link interference, we develop a series of interference-aware multi-path routing protocols for mobile ad hoc networks. These interference-aware multi-path routing protocols minimize the impact of interference on the paths from the source to the destination to increase the network performance. The computational complexity of the protocols is polynomial and each of them is most suitable for a type of network size. To demonstrate the efficiency of the interference-aware multi-path routing protocols, we compare them to prominent protocols in different network sizes and a high mobility environment when the RTS/CTS (Request-To-Send/Clear-To-Send) mechanism is alternatively turned on and turned off. The simulation results show that our protocols significantly improve packet delivery fraction, and reduce end-to-end delay, routing overhead, and normalized routing load.The RTS/CTS mechanism is to restrict the collision caused by the hidden terminals. However, we indicate that the RTS/CTS mechanism is not suitable for mobile ad hoc network based on the simulation results.

Study of Multipath Routing Schemes for Mobile Ad-hoc Networks

Study of Multipath Routing Schemes for Mobile Ad-hoc Networks PDF Author: Sandep Nanda
Publisher:
ISBN:
Category :
Languages : en
Pages : 73

Get Book Here

Book Description
Mobile Ad-hoc network (MANET) is a collection of mobile nodes, which form a wireless network without the use of an existing infrastructure. MANET's are usually characterized by random mobility of nodes, nodes arbitrarily entering and leaving the network and variable transmission range of nodes. These characteristics make MANET links to be intermittent and the topology to be highly dynamic. In such situations routing protocols are desired to be on-demand and robust enough to cope up with the dynamic topology changes. Many on demand routing protocols have been suggested for this purpose like single path Dynamic source routing (DSR) and Ad-hoc on demand distance vector routing (AODV) and their multiple path variants like Ad-hoc on demand multiple distance vector routing. These protocols suggest different ways to avoid route-looping problems and create shortest path route. Locally adaptive and multi-metric Ad-hoc on demand distance vector routing (LAM-AOMDV) tries to use multiple metrics to discover routes and proposes new schemes to provide route maintenance. The objective of a routing protocol is to efficiently find routes and transfer as many data-packets possible with minimum routing overhead. In our thesis work propose two layers of improvement one to reduce the overhead caused unnecessary transmission of hello packets and second to pre-emptively discover routes in cases of a link breakage, which renders a path useless. In our schemes we try to stop the unnecessary hello transmissions by nodes, which are not participating in an active route or in route discovery. We also try to improve the packet delivery ratio by finding routes pre-emptively before the last route becomes unavailable to the source. We compare the individual layers of improvement with LAM-AOMDV using various metrics like packet delivery ratio, overhead caused due to hello messages and packets dropped due to no route availability at the routing layer.

The Multipath Routing Approach for Maximum Data Confidentiality in Mobile Ad Hoc Network

The Multipath Routing Approach for Maximum Data Confidentiality in Mobile Ad Hoc Network PDF Author: 施佑青
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description


Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing

Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing PDF Author: Brandy Michelle Tyson
Publisher:
ISBN:
Category : Moble communication systems
Languages : en
Pages : 258

Get Book Here

Book Description