Journal articles on the topic 'Ad-hoc network'

To see the other types of publications on this topic, follow the link: Ad-hoc network.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ad-hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

P R, Shinde, and Sutar A J. "Bluetooth Ad hoc Network." IARJSET 4, no. 4 (January 27, 2017): 125–27. http://dx.doi.org/10.17148/iarjset/nciarcse.2017.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumari, Seema, and Dr M. U. Kharat. "Delay analysis of multihop wireless ad hoc network using queuing network model." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (August 15, 2013): 1503–9. http://dx.doi.org/10.24297/ijct.v10i4.3250.

Full text
Abstract:
Ad hoc wireless network is a self configurable infrastructure less network. The lack of infrastructure support in ad hoc networks makes them useful in various applications such as at the disaster site, highway, vast forest, battle field, oceans, etc. Since there is no centralized control in ad hoc network, each node can act as a source, a destination or a router. Ad hoc wireless networks therefore, experience congestion more than the wired networks, leading to jitter and high end to end delays even for moderate traffic which may lead to performance degradation. So it is crucial to analyze the factors which affect the capacity and end-to-end delay in wireless ad-hoc networks. In this paper a G/G/1queuing network model is proposed togain insights into the end-to-end delay in a multi hop wireless ad hoc networks. Queuing network model is unique as it providesclosed form expressions for average end-to-end delay in multihop wireless ad hoc networks. NS2 simulation is conducted in order to verify and compare the theoretical results.
APA, Harvard, Vancouver, ISO, and other styles
3

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Ragab, Ahmed Refaat Sobhy Ahmed. "A New Classification for Ad-Hoc Network." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 14 (August 28, 2020): 214. http://dx.doi.org/10.3991/ijim.v14i14.14871.

Full text
Abstract:
<span>This paper focus on developing a new practical classification for ad-hoc networks, were all the past classifications revolve upon three main categories respectively, mobile ad- hoc network (MANET), Vehicle ad-hoc network (VANET) and Flying ad-hoc network (FANET). My new classification will illustrate Underwater vehicle ad-hoc network (UWVANET) as the fourth category in ad-hoc main classification, showing the powerful and the weakness of each category defined.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Hai Yan, Jun Qiang Yang, and Hui Li. "Research for Network Security Mechanism of Ad Hoc Network." Advanced Materials Research 926-930 (May 2014): 2006–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2006.

Full text
Abstract:
Ad Hoc network is a special kind of mobile multi-hop wireless networks, which has been widely used various occasions. In this paper, the main characters of Ad Hoc network are presented. Meanwhile, based on the inherent defect and security threats of Ad Hoc network, the corresponding security mechanism and strategy are proposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Manjit, Sahil Verma, and Kavita. "Flying Ad-Hoc Network (FANET): Challenges and Routing Protocols." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2575–81. http://dx.doi.org/10.1166/jctn.2020.8932.

Full text
Abstract:
Flying Ad-hoc Networks (FANET) play a vital part in military (defence), environment and civilian areas, for examples surveillance, traffic monitoring, search, rescue, weather monitoring, fire fighting, agriculture, videography, photography and delivery goods or product from one place to another place etc. Flying Ad-hoc Network is mainly ad-hoc network between unmanned air vehicles. There are several difficulties in flying ad-hoc network. The primary problem is in the communication between unmanned air vehicles. UAV are also known as Unmanned Aircraft Systems (UAS). The problem of Flying Ad-hoc Network is routing of multiple unmanned air vehicles. The reason behind is high speed which required highly dynamic routing protocols. The designing of routing protocol is a complicated for various parameters such as traffic monitoring, load balancing etc. Here, flying ad-hoc networks are described along with mobility models, features and routing protocols. This paper presented various routing protocols used to resolve these types of problems in Flying Ad-hoc Networks. Finally, some open research challenges in developing efficient routing protocols in the Flying Ad-hoc Networks are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
7

Ragab, Ahmed Refaat, and Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems." International Journal of Data Science 2, no. 1 (April 8, 2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.

Full text
Abstract:
The field of the ad-hoc network and its routing protocols had attracted a lot of researchers for many years, due to the various usage of the ad-hoc networks in many fields and especially the field of Unmanned Aerial Vehicles (UAVs). Routing protocols in the ad-hoc network are the main focused problem, for their characteristics and role during the communication process of the ad-hoc networks, with its different types. In this paper, we are going to analyze and sheds the light on the performance of ad-hoc routing protocols, for both Flying ad-hoc network (FANET) and vehicle ad-hoc network (VANET) when applying three different ad-hoc routing protocols, respectively Reactive routing protocol, Proactive routing protocol, and Hybrid routing protocol, in order to shed light on the ambiguous misunderstanding of ad-hoc routing protocols functionality and to choose the best routing protocol to be used and adapted for UAVs.
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Zhiqing, Ziyu Wang, Xin Yuan, Huici Wu, and Zhiyong Feng. "Information density–based energy-limited capacity of ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877324. http://dx.doi.org/10.1177/1550147718773242.

Full text
Abstract:
In this article, the inhomogeneous energy consumption is characterized by the concept of information density, which is defined as the number of bits per unit time passing through a specific region. With information density, it is possible to derive the energy consumption of each region and determine the energy configuration scheme to maximize the network lifetime. The information density of pure ad hoc network and hybrid ad hoc network is derived. It is discovered that the information density of pure ad hoc network is inhomogeneous and the information density of hybrid ad hoc network is homogeneous, except for the regions near the edge of the entire area. With information density, the energy-limited capacity of pure and hybrid ad hoc networks is derived. The information density introduced in this article provides more insights into the information transfer of ad hoc networks, which may be applied in the energy configuration of ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Nayana K, Nayana K., and Dr Sangeethaa Sukumaran. "Spontaneous Ad HoC Network Creation Using Distributed Dns." International Journal of Scientific Research 3, no. 5 (June 1, 2012): 207–9. http://dx.doi.org/10.15373/22778179/may2014/62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shin, Kwang-Sig, Joon-Dal Kwon, Young-Dong Lee, and Wan-Young Chung. "Ad-hoc home network system using wireless sensor network technology." Journal of Sensor Science and Technology 16, no. 2 (March 31, 2007): 142–49. http://dx.doi.org/10.5369/jsst.2007.16.2.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Demin, Jie Zhou, Jingjuan Zhu, and Jiacun Wang. "Opinion Impact Models and Opinion Consensus Methods in Ad Hoc Tactical Social Networks." Discrete Dynamics in Nature and Society 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/758079.

Full text
Abstract:
Ad hoc social networks are special social networks, such as ad hoc tactical social networks, ad hoc firefighter social networks, and ad hoc vehicular social networks. The social networks possess both the properties of ad hoc network and social network. One of the challenge problems in ad hoc social networks is opinion impact and consensus, and the opinion impact plays a key role for information fusion and decision support in ad hoc social networks. In this paper, consider the impact of physical and logical distance on the opinions of individuals or nodes in heterogeneous social networks; we present a general opinion impact model, discuss the local and global opinion impact models in detail, and point out the relationship between the local opinion impact model and the global opinion impact model. For understanding the opinion impact models easily, we use the general opinion impact model to ad hoc tactical social networks and discuss the opinion impact and opinion consensus for ad hoc tactical social networks in the end.
APA, Harvard, Vancouver, ISO, and other styles
12

Hussen, Hassen Redwan, Sung-Chan Choi, Jong-Hong Park, and Jaeho Kim. "Predictive geographic multicast routing protocol in flying ad hoc networks." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771984387. http://dx.doi.org/10.1177/1550147719843879.

Full text
Abstract:
In the past decades, the unmanned aerial systems have been utilized only for military operations. However, recently, the potential uses and applicability of unmanned aerial vehicles (commonly known as drones) in civilian application domains are becoming a fast-growing phenomenon. A flying ad hoc network is a wireless ad hoc network specifically designed for the communication of unmanned aerial vehicles. Multicast routing is one of the vital aspects in wireless ad hoc networks. Using multicast transmission approaches, flying ad hoc network applications may need to send the same message to a specific group of flying nodes. The multicast communication approaches can benefit flying ad hoc network applications in conserving the scarce resources of flying nodes. Research works have been proposed to tackle the challenges in multicast routing with multi-hop communication in ad hoc network environments. Nevertheless, the conventional multicast routing mechanisms incur excessive control message overhead when a large number of nodes experience frequent topological changes. A scalable geographic multicast routing mechanism, which specially require localized operation and reduced control packet overhead, is necessary. Multicast routing in flying ad hoc networks is extremely challenging because of the dynamic topology changes and network disconnection resulted from frequent mobility of nodes. In this article, we present and implement a scalable and predictive geographic multicast routing mechanism in flying ad hoc networks. In uniform and random deployment scenarios, the MATLAB-based evaluation result has revealed that when the communication range increases, the probability of finding one-hop predicted forwarders to reach multicast destinations also increases. The implementation of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is done using Optimizing Network Engineering Tools Modeler 16.0. We have added the scalable and predictive geographic multicast routing mechanism in flying ad hoc network as a new routing scheme in the Mobile Ad hoc Network routing protocol groups of the Optimizing Network Engineering Tools Modeler. Then, the performance of scalable and predictive geographic multicast routing mechanism in flying ad hoc network is compared with two of the existing Mobile Ad hoc Network routing protocols (Geographic Routing Protocol and Dynamic Source Routing). Eventually, we present two instance scenarios regarding the integration of scalable and predictive geographic multicast routing mechanism in flying ad hoc network scheme in the Internet of Things platform.
APA, Harvard, Vancouver, ISO, and other styles
13

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-configuration characteristics or behavior, mobile ad hoc networks (MANET) have achieved great success and attention. Routing attacks are used to quickly alter the network topology of MANETs based on wired and wireless networks. Therefore, securing this network without infrastructure is a big problem. In recent years, experts from all over the worldhave paid particular attention to research on improving the performance of mobile ad-hoc networks (MANETs). Routing methods are especially crucial in a dynamic network environment like MANET for enhancing overall network performance. In addition to discussing the technical difficulties that protocol designers and network engineers must overcome, this paper offers insight into the possible applications of ad hoc networks. Routing, service and resource discovery, Internet access, billing, and security are some of these difficulties.
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Qi. "The Research of Ad Hoc Network Routing Protocols." Advanced Materials Research 926-930 (May 2014): 2626–29. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2626.

Full text
Abstract:
Wireless Ad Hoc network routing algorithm is one of the core technologies of wireless Ad Hoc networks. Ad Hoc network is dynamic topology on characteristic, mainly reflected on the network node number and node movement, which lead to network topology changes, in order to study the Ad Hoc network size and topology changes influence on packet delivery, time delay and routing control, through experiment it is concluded that, the dynamic source routing protocol is an ideal choice.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Xiao Pei, Teng Fei, and Cheng Zhu. "Bluetooth Ad Hoc Network Technology." Applied Mechanics and Materials 198-199 (September 2012): 1615–20. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1615.

Full text
Abstract:
With the growing maturity of the Bluetooth technology, Bluetooth technology to the utility and safety are getting higher and higher. As open-standard of short distance wireless technology of communications. Bluetooth has much virtue of low-power consumption, low-cost and strong anti-interference. It is convenient and economical when used by mobile devices in Small scope. This thesis summaries the background of the thesis, also simply illustrates Ad Hoc network and the application of Bluetooth in Ad Hoc network. At the beginning of this article, the main research task and arrangement of chapters are introduced. Introduce Bluetooth technology and architecture. Based on the introduction of the system module of Bluetooth personal area network (PAN), implementation of the application module of PAN is presented. The implementations of software and hardware platform of Bluetooth ad hoc are also presented. An application of Bluetooth ad hoc---wireless communication positioning system based on Bluetooth, GPRS and GSM is designed and realized. Finally, Summary of the main technology and project, summarize the relevant work of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Xue Bing. "Heterogeneous Architecture for Ad Hoc Networks." Advanced Materials Research 756-759 (September 2013): 1059–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1059.

Full text
Abstract:
By making small adjustment to general ad hoc network architecture, we build a network topology with short average path length and high clustering coefficient, which are two important metrics of ad hoc networks. Furthermore, an efficient probabilistic flooding routing algorithm is proposed based on this network model. Simulation results show that this architecture behaves better performance than its ordinary counterpart.
APA, Harvard, Vancouver, ISO, and other styles
17

Rahman, Md Torikur. "An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network MANET." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 409–16. http://dx.doi.org/10.31142/ijtsrd23727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Misra, Rahul, and Prashant Sharma. "Challenges in Mobile Ad Hoc Network for Secure Data Transmission." International Journal of Electrical and Electronics Research 1, no. 1 (June 30, 2013): 8–12. http://dx.doi.org/10.37391/ijeer.010103.

Full text
Abstract:
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR (Dynamic Source Routing). The Location Aided Routing protocol uses location information to reduce routing overhead of the ad-hoc network! Normally the LAR protocol uses the GPS (Global Positioning System) to get these location information’s. With the availability of GPS, the mobile hosts knows there physical location. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks - multiple routes between nodes to defend routing against denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Kumar, Mahendra, and A. K. Jain. "Comparative Performance Analysis of Different Routing Protocols in Wireless Ad-hoc networks (IEEE 802.11)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 8, no. 3 (June 30, 2018): 874–86. http://dx.doi.org/10.24297/ijct.v8i3.3398.

Full text
Abstract:
Wireless Ad-hoc networks have lack of mass deployment. An Ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. There is an infrastructure less and decentralized network which need a robust dynamic routing protocol. This article presents performance comparison of wireless Ad-hoc network on different routing protocols. Network simulator QualNet 5.0.2 has been used to evaluate the performance of wireless networks with various routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
20

Pestin, Maxim S., and Alexander S. Novikov. "Simulation model of wireless ad-hoc network to study algorithms of traffic routing." Journal Of Applied Informatics 17, no. 4 (August 31, 2022): 75–86. http://dx.doi.org/10.37791/2687-0649-2022-17-4-75-86.

Full text
Abstract:
Communication network simulators are software designed to model, explore, test and debug network technologies, including wireless decentralized self-organizing networks or ad-hoc networks. They greatly simplify the research, development and optimization of routing protocols in these networks. However, the well-known simulators have a number of disadvantages, including the difficulty of adding custom extensions to ad-hoc network routing protocols, the lack of the necessary network stack, the lack of routing algorithm visualization modes, low performance, and difficulty in debugging communication protocols. The purpose of this work is to create a simulation model of a wireless network that would allow us to explore, debug and evaluate the developed algorithms and routing protocols for ad-hoc networks. At the same time, the requirements for interface ergonomics and the ability to visualize the operation of algorithms, ensure the collection of statistics, and create various scenarios for the operation of the network come to the fore. The article proposes the structure of the simulation model, which includes the modules of the network subscriber, application software, network layer of the OSI data transmission model, radio module, radio transmission environment, statistics collection, visualization and scenario management. To solve the tasks set, the approach of discrete-event modeling was used. To create a simulator of wireless decentralized networks and routing algorithms, a set of classes was developed that implement the modules of the simulation model. Based on the proposed structure, module classes and discrete event simulation algorithm, a software implementation of the simulation model was created using the C++ programming language and the Qt framework. The developed simulation model was used in the course of an experimental study of the effectiveness of the network routing algorithm. The proposed software will simplify the development and debugging of algorithms and routing protocols for ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
21

Kumaran, U., A. Ramachandran, J. Jegan, and E. K. Subramanian. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 949. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp949-956.

Full text
Abstract:
<p>A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network). Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms to understand the strengths &amp; threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks. The methodology of honeypot detects and isolates the attacks of the black hole. The results prove better delivery of packets with decreased load of the network.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Hussain, Altaf, Habib Ullah Khan, Shah Nazir, Ijaz Ullah, and Tariq Hussain. "Taking FANET to Next Level." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 10, no. 4 (February 8, 2022): 321–37. http://dx.doi.org/10.14201/adcaij2021104321337.

Full text
Abstract:
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance in which there is no human personnel involved. It is an ad-hoc network in which the UAVs can more in 3D ways simultaneously in the air without any onboard pilot. In other words, this is a pilot free ad-hoc network also known as Unmanned Aerial System (UAS) and the component introduced for such a system is known as UAV. There are many single UAV applications but using multiple UAVs system cooperating can be helpful in many ways in the field of wireless communication. Deployments of these small UAVs are quick and flexible which overcome the limitation of traditional ad hoc networks. FANETs differ from other kinds of ad hoc networks and envisioned to play an important role where infrastructure operations are not available and assigned tasks are too dull, dirty, or dangerous for humans. Moreover, setting up to bolster the range and performance of small UAV in ad hoc network lead to emergent evolution with its high stability, quick deployment, and ease-of-use for the formation of the network. Routing and task allocation are the challenging research areas of the network with ad hoc nodes. The paper overview based on the study of biological inspired routing protocols (Moth-and-Ant and Bee Ad-Hoc) routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
23

Lopez, Juan, and Jorge Trivino. "Scalability in Ad Hoc Networks:The Effects of its Complex Nature." International Journal of Engineering & Technology 3, no. 3 (June 22, 2014): 315. http://dx.doi.org/10.14419/ijet.v3i3.2828.

Full text
Abstract:
One of the expected properties of the ad hoc networks is the ability to increase its size to receive new nodes and configure new applications without affecting the quality of services. This property, called scalability is affected by the decentralized nature of ad hoc networks making it necessary to develop mechanisms that allow a large number of nodes work together without affecting network performance. The following article describes how the scalability of the ad hoc networks are directly related to routing algorithms, the need of cooperation, competition for resources, the network architecture and the heterogeneous nature of the nodes.Keywords: Ad Hoc Networks, Network architecture, Game Theory, Scalability.
APA, Harvard, Vancouver, ISO, and other styles
24

Kasem Mohammed, Abdulghani Saif, and Khalid Hamid Bilal. "Survey of mobile ad hoc networks (manets)." International Journal of Engineering and Computer Science 8, no. 02 (February 22, 2019): 24484–90. http://dx.doi.org/10.18535/ijecs.v8i02.4229.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of MANET and challenges that are imposed by Mobile ad-hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
25

Sharma, Divya, and Ashwani Kush. "Power and Mobility Aware Protocol for Ad Hoc Network." International Journal of Engineering and Technology 3, no. 2 (2011): 161–64. http://dx.doi.org/10.7763/ijet.2011.v3.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Peng, Wu. "The Cognitive Ad-hoc Network Spectrum - Routing Selection Method." International Journal of Future Generation Communication and Networking 6, no. 6 (December 31, 2013): 133–42. http://dx.doi.org/10.14257/ijfgcn.2013.6.6.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gopichand, G., and RA K. Saravanaguru. "A Generic Review on Effective Intrusion Detection in Ad hoc Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1779. http://dx.doi.org/10.11591/ijece.v6i4.10008.

Full text
Abstract:
<p>Ad hoc network is specifically designed for the establishment of a network anywhere and anytime, which does not have any fixed infrastructure in order to support the mobility of the users in the network. The network is established without using any access points or base stations for communication implemented in multi hop schemes. Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network. Because of dynamic topological changes, these networks are vulnerable at the physical link, and they can easily be manipulated. An intruder can easily attack the Ad hoc network by loading the network resources which are available, such as wireless links and energy (battery) levels of other users, and then starts disturbing all the users. This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing security to the Ad hoc network.</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Gopichand, G., and RA K. Saravanaguru. "A Generic Review on Effective Intrusion Detection in Ad hoc Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1779. http://dx.doi.org/10.11591/ijece.v6i4.pp1779-1784.

Full text
Abstract:
<p>Ad hoc network is specifically designed for the establishment of a network anywhere and anytime, which does not have any fixed infrastructure in order to support the mobility of the users in the network. The network is established without using any access points or base stations for communication implemented in multi hop schemes. Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network. Because of dynamic topological changes, these networks are vulnerable at the physical link, and they can easily be manipulated. An intruder can easily attack the Ad hoc network by loading the network resources which are available, such as wireless links and energy (battery) levels of other users, and then starts disturbing all the users. This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing security to the Ad hoc network.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Jingyao, and Pingyi Fan. "On network coding in wireless ad-hoc networks." International Journal of Ad Hoc and Ubiquitous Computing 2, no. 3 (2007): 140. http://dx.doi.org/10.1504/ijahuc.2007.012415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Palanisamy, B., N. Karthik, K. Chandrakumar, K. Thirunavukkarasu, and R. Jayasudha. "Improving Network Security in Mobile Ad Hoc Networks." Journal of Computational and Theoretical Nanoscience 16, no. 5 (May 1, 2019): 2299–301. http://dx.doi.org/10.1166/jctn.2019.7888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kok, Gin-Xian, Chee-Onn Chow, and Hiroshi Ishii. "Improving network coding in wireless ad hoc networks." Ad Hoc Networks 33 (October 2015): 16–34. http://dx.doi.org/10.1016/j.adhoc.2015.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schweitzer, Nadav, Ariel Stulman, Tirza Hirst, Roy David Margalit, and Asaf Shabtai. "Network bottlenecks in OLSR based ad-hoc networks." Ad Hoc Networks 88 (May 2019): 36–54. http://dx.doi.org/10.1016/j.adhoc.2018.12.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

VikramPhaneendra, S., Sreenivasulu T, and B. Jalaja Kumari. "Identifying Stable Network in Mobile Ad-Hoc Networks." International Journal of Computer Applications 43, no. 18 (April 30, 2012): 22–25. http://dx.doi.org/10.5120/6204-8761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dietzel, Stefan, Jonathan Petit, Frank Kargl, and Bjorn Scheuermann. "In-Network Aggregation for Vehicular Ad Hoc Networks." IEEE Communications Surveys & Tutorials 16, no. 4 (2014): 1909–32. http://dx.doi.org/10.1109/comst.2014.2320091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Feng, Guinian, Pingyi Fan, and Soung Chang Liew. "Interference minimum network topologies for ad hoc networks." Wireless Communications and Mobile Computing 12, no. 6 (October 5, 2010): 529–44. http://dx.doi.org/10.1002/wcm.993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, Mangal Sain, and Hoonjae Lee. "Moving Ad Hoc Networks—A Comparative Study." Sustainability 13, no. 11 (May 31, 2021): 6187. http://dx.doi.org/10.3390/su13116187.

Full text
Abstract:
An ad hoc network is a wireless mobile communication network composed of a group of mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is established temporarily. The mobile nodes of the network use their own wireless transceivers to exchange information; when the information is not within the communication range, other intermediate nodes can be used to relay to achieve communication. They can be widely used in environments that cannot be supported by wired networks or which require communication temporarily, such as military applications, sensor networks, rescue and disaster relief, and emergency response. In MANET, each node acts as a host and as a router, and the nodes are linked through wireless channels in the network. One of the scenarios of MANET is VANET; VANET is supported by several types of fixed infrastructure. Due to its limitations, this infrastructure can support some VANET services and provide fixed network access. FANET is a subset of VANET. SANET is one of the common types of ad hoc networks. This paper could serve as a guide and reference so that readers have a comprehensive and general understanding of wireless ad hoc networks and their routing protocols at a macro level with a lot of good, related papers for reference. However, this is the first paper that discusses the popular types of ad hoc networks along with comparisons and simulation tools for Ad Hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
38

Cai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.

Full text
Abstract:
A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly analyzes the routing attacks of mobile Ad hoc networking, then elaborates and compares some ad hoc secure routing protocols, at last points the future researches.
APA, Harvard, Vancouver, ISO, and other styles
39

Prema K N, Ushadevi M B, Smitha S M, and Roopa B S. "End to end delay distribution analysis and interference aware high throughput for Wireless Mesh Networks." World Journal of Advanced Engineering Technology and Sciences 10, no. 1 (September 30, 2023): 122–29. http://dx.doi.org/10.30574/wjaets.2023.10.1.0255.

Full text
Abstract:
The wireless mesh network is an innovative and efficient wireless communication approach with immense potential to transform future wireless networks. This cutting-edge wireless technology provides a wide range of wireless services for personal, local, campus, and metropolitan environments. The wireless mesh network consists of a cluster of mobile wireless nodes that can dynamically and instantaneously create random and temporary network topologies, forming a wireless ad-hoc network. Ad hoc wireless networks are particularly advantageous due to their cost-effectiveness and ease of deployment. In order to further optimize the performance of ad-hoc networks, different routing algorithms such as Ad-hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing Algorithm (DSR) and Destination Sequenced Distance Vector (DSDV) have been thoroughly researched via simulation.
APA, Harvard, Vancouver, ISO, and other styles
40

Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (January 16, 2024): 29. http://dx.doi.org/10.3390/fi16010029.

Full text
Abstract:
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance. In this work, we review ad hoc network cross-layer methods, propose a new useful classification of cross-layer methods, and show future research directions in the development of ad hoc network cross-layer methods. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
APA, Harvard, Vancouver, ISO, and other styles
41

Pragya Kabra, Et al. "Techniques for Diversified Optimization of Routing Algorithms in Mobile Ad-Hoc Wireless Connections." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (August 31, 2023): 569–74. http://dx.doi.org/10.17762/ijritcc.v11i8.10057.

Full text
Abstract:
MANETs, for example, are a type of network that lacks a well-established infrastructure. Creating ad-hoc networks is difficult because of a lack of infrastructure. Choosing a routing protocol in an ad-hoc network may be difficult due to the network's volatility. To obtain the optimum performance, Zone Routing Protocol (ZRP) is a hybrid routing protocol that combines the best aspects of proactive (Optimized Link State Routing) and reactive (Ad hoc On-Demand Distance Vector) routing approaches. MANET performance can be improved using a Genetic Algorithm and Ant Colony Optimization.
APA, Harvard, Vancouver, ISO, and other styles
42

Alhaidari, Fahd A., and Alia Mohammed Alrehan. "A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems." International Journal of Distributed Sensor Networks 17, no. 3 (March 2021): 155014772110002. http://dx.doi.org/10.1177/15501477211000287.

Full text
Abstract:
Vehicular Ad hoc NETwork is a promising technology providing important facilities for modern transportation systems. It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks. Machine learning techniques, which mainly rely on the quality of the datasets used, play a role in detecting many attacks with a high level of accuracy. We conducted a comprehensive literature review and found many limitations on the datasets available for distributed denial of service attacks on Vehicular Ad hoc NETwork including the following: unavailability of online versions, an absence of distributed denial of service traffic, unrepresentative of Vehicular Ad hoc NETwork, and no information regarding the network configurations. Therefore, in this article, we proposed a novel simulation technique to generate a valid dataset called Vehicular Ad hoc NETwork distributed denial of service dataset, which is dedicated to Vehicular Ad hoc NETworks. Vehicular Ad hoc NETwork distributed denial of service dataset holds information on distributed denial of service attack traffic considering Vehicular Ad hoc NETwork architecture, traffic density, attack intensity, and nodes mobility. Well-known simulation tools such as SUMO, OMNeT++, Veins, and INET were used to ensure that all the properties of Vehicular Ad hoc NETwork have been captured. We then compared Vehicular Ad hoc NETwork distributed denial of service dataset with several studies to prove its novelty and evaluated the dataset using several machine learning models. We confirmed that studied models using this dataset achieved high accuracy above 99.5% except support-vector machine that achieved 97.3%.
APA, Harvard, Vancouver, ISO, and other styles
43

Khanpara, Pimal, and Sharada Valiveti. "An Efficient Bio-inspired Routing Scheme for Tactical Ad hoc Networks." Scalable Computing: Practice and Experience 24, no. 1 (April 19, 2023): 45–54. http://dx.doi.org/10.12694/scpe.v24i1.2052.

Full text
Abstract:
Ad hoc networks are temporary networks, created mainly for applications that are infrastructure-less. Such networks and network nodes demand special characteristics like mobile nodes having dynamic topology, wireless medium, heterogeneous deployment environment, and reactive or proactive routing depending on the nature of the network which includes network parameters such as node placement, mobility model, number of participants in the network, patterns of mobility, etc. Due to these characteristics and the mobility of network nodes, the process of routing is quite challenging in the ad hoc environment, especially when the node mobility is high. Bio-inspired routing can be an effective solution to meet all the design requirements and deal with the issues of tactical ad hoc networks. Different types of nature-inspired routing mechanisms are possible to use for tactical networks. This paper proposes the design of a novel Ant Colony Optimization-based routing strategy for ad hoc networks. Ant-based algorithms are dynamic and have adaptive behavior. Hence, they are competent for routing in ad hoc networks. Our proposed routing scheme is evaluated based on the network’s performance by varying different parameters. The performance of our proposed ACO-based routing approach is also compared to some existing ad hoc routing mechanisms. Different metrics in different deployment scenarios that can affect the efficiency of our proposed protocol are taken into consideration to evaluate the performance.
APA, Harvard, Vancouver, ISO, and other styles
44

Alam, Tanweer. "A Middleware Framework between Mobility and IoT Using IEEE 802.15.4e Sensor Networks." Jurnal Online Informatika 4, no. 2 (February 14, 2020): 90. http://dx.doi.org/10.15575/join.v4i2.487.

Full text
Abstract:
In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.
APA, Harvard, Vancouver, ISO, and other styles
45

Sharma, Ishu, and K. R. Ramkumar. "A survey on ACO based multipath routing algorithms for ad hoc networks." International Journal of Pervasive Computing and Communications 13, no. 4 (November 6, 2017): 370–85. http://dx.doi.org/10.1108/ijpcc-d-17-00015.

Full text
Abstract:
Purpose The purpose of this paper is to review the existing routing algorithms for wireless ad hoc networks to evaluate the methods according to the current requirements. Wireless ad hoc network can provide communication in emergency situations. Active nodes in ad hoc network work as sender, receiver and router at the same time. Nodes are equipped with limited bandwidth and energy. Optimal routing method can help in “smart use” of available resources. Evolvement of routing method based on need is a continuous process. Numerous applications of ad hoc network motivates researcher for further development to fulfill the need of society. Design/methodology/approach In this paper, routing algorithms for ad hoc network based on ant colony optimization, multipath routing and with multiple input multiple output (MIMO) antenna support have been discussed. Findings Comparative analysis has been drawn among existing algorithms of different categories. Transmitting message packets parallel through multiple paths in the network can save overall resource usage in the network. Originality/value The authors have discussed the future area of development for optimal routing in ad hoc networks. Considering signal noise ratio and congestion status while selecting path can provide better energy use in the network. Rather than leaving less prioritized route paths, multiple paths can be used for sending data packets parallel.
APA, Harvard, Vancouver, ISO, and other styles
46

Satyanarayana, D., and S. V. Rao. "Constrained Delaunay Triangulation for Ad Hoc Networks." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–10. http://dx.doi.org/10.1155/2008/160453.

Full text
Abstract:
Geometric spanners can be used for efficient routing in wireless ad hoc networks. Computation of existing spanners for ad hoc networks primarily focused on geometric properties without considering network requirements. In this paper, we propose a new spanner called constrained Delaunay triangulation (CDT) which considers both geometric properties and network requirements. The CDT is formed by introducing a small set of constraint edges into local Delaunay triangulation (LDel) to reduce the number of hops between nodes in the network graph. We have simulated the CDT using network simulator (ns-2.28) and compared with Gabriel graph (GG), relative neighborhood graph (RNG), local Delaunay triangulation (LDel), and planarized local Delaunay triangulation (PLDel). The simulation results show that the minimum number of hops from source to destination is less than other spanners. We also observed the decrease in delay, jitter, and improvement in throughput.
APA, Harvard, Vancouver, ISO, and other styles
47

Kumar, Kirshna, Sushil Kumar, Omprakash Kaiwartya, Ajay Sikandar, Rupak Kharel, and Jaime Lloret Mauri. "Internet of Unmanned Aerial Vehicles: QoS Provisioning in Aerial Ad-Hoc Networks." Sensors 20, no. 11 (June 2, 2020): 3160. http://dx.doi.org/10.3390/s20113160.

Full text
Abstract:
Aerial ad-hoc networks have the potential to enable smart services while maintaining communication between the ground system and unmanned aerial vehicles (UAV). Previous research has focused on enabling aerial data-centric smart services while integrating the benefits of aerial objects such as UAVs in hostile and non-hostile environments. Quality of service (QoS) provisioning in UAV-assisted communication is a challenging research theme in aerial ad-hoc networks environments. Literature on aerial ad hoc networks lacks cooperative service-oriented modeling for distributed network environments, relying on costly static base station-oriented centralized network environments. Towards this end, this paper proposes a quality of service provisioning framework for a UAV-assisted aerial ad hoc network environment (QSPU) focusing on reliable aerial communication. The UAV’s aerial mobility and service parameters are modelled considering highly dynamic aerial ad-hoc environments. UAV-centric mobility models are utilized to develop a complete aerial routing framework. A comparative performance evaluation demonstrates the benefits of the proposed aerial communication framework. It is evident that QSPU outperforms the state-of-the-art techniques in terms of a number of service-oriented performance metrics in a UAV-assisted aerial ad-hoc network environment.
APA, Harvard, Vancouver, ISO, and other styles
48

Neeraj Verma, Pro. (Dr.) Awakash Mishra. "Considering Performance Issues in Ad Hoc Networking : A Comprehensive Study." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (November 16, 2023): 5514–25. http://dx.doi.org/10.52783/tjjpt.v44.i4.1930.

Full text
Abstract:
Ad hoc networks have emerged as a versatile and dynamic communication paradigm with applications spanning from mobile devices and sensor networks to emergency response and military operations. However, their inherent decentralized and self-organizing nature gives rise to a myriad of performance challenges that must be comprehensively addressed to ensure reliable and efficient communication. This paper presents a comprehensive study of performance issues in ad hoc networking, aiming to provide a holistic understanding of the various factors impacting network performance. The study begins by examining the fundamental characteristics of ad hoc networks, highlighting their unique advantages and challenges. We delve into critical performance metrics such as throughput, latency, scalability, and energy efficiency, dissecting the factors that influence each of these metrics in ad hoc environments. The role of routing protocols, MAC layer design, and network topologies in shaping network performance is thoroughly analyzed. Furthermore, this study explores the impact of mobility patterns, traffic models, and interference on ad hoc network performance. It delves into the challenges posed by dynamic network topologies, node failures, and the need for adaptive mechanisms to maintain robust connectivity. Quality of service (QoS) considerations and their implications on performance are also discussed in detail. To provide a comprehensive view, we survey state-of-the-art solutions and techniques proposed in the literature to mitigate performance issues in ad hoc networks. These include adaptive routing algorithms, cross-layer optimization approaches, and novel communication paradigms like cognitive radio networks. Finally, we present a roadmap for future research directions in the field of ad hoc networking performance optimization. The goal is to inspire further investigation and innovation in addressing the evolving challenges faced by ad hoc networks, making them more reliable, efficient, and adaptable for a wide range of applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Jasmin Salma, S., and B. Aysha Banu. "Revealing of Reducing Manners in Ad Hoc Networks with Crosslayer Approach Using SVM and FDA in Distributed Architecture." Asian Journal of Computer Science and Technology 1, no. 1 (May 5, 2012): 76–79. http://dx.doi.org/10.51983/ajcst-2012.1.1.1666.

Full text
Abstract:
Ad hoc network is a structure less network with independent nodes. In the ad hoc network, the nodes have to cooperate for services like routing and data forwarding. The routing attacks in ad hoc networks have given rise to the need for designing novel intrusion detection algorithms, different from those present in conventional networks. In this work, distributed intrusion detection system (IDS) have proposed for detecting malicious sinking behavior in ad hoc network. Detection process of that sinking behavior node is very important to do the further forwarding process in network. Intrusion detection system use linear classifiers for training the intrusion detection model. Cross -layer approach is involved to increase the accuracy of intrusion detection process in ad hoc network. A machine learning algorithm in non linear manner named as Support Vector Machine (SVM) involved for training the detection system and used together with Fisher Discriminant Analysis (FDA). The proposed cross-layer approach aided by a combination of SVM and FDA reduces the feature set of MAC layer without reducing information content.
APA, Harvard, Vancouver, ISO, and other styles
50

Yan, Yao, and Rui Xu. "DDoS Attacks for Ad Hoc Network Based on Attack Cluster." Advanced Materials Research 546-547 (July 2012): 1371–76. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1371.

Full text
Abstract:
Show the definition of Ad Hoc network attack cluster, and propose a new method of DDoS attacks for Ad Hoc Networks, which can accurately attack the target node, demonstrate no redundant aggressive behavior compared with the traditional attack and reduce the detection rate of aggressive behavior. Use NS2 simulation platform to build Ad Hoc network simulation scenarios with dynamic topology, and simulate DDoS attacks in this environment; The simulation results show that the new DDoS attack method can effectively reduce the communication ability of the Ad Hoc network, and increasing the attack node density will strengthen the attack effect.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography