To see the other types of publications on this topic, follow the link: ADHOC ON-DEMAND DISTANCE VECTOR.

Journal articles on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (September 18, 2014): 40–45. http://dx.doi.org/10.5120/17839-8725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

G Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (May 25, 2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

dhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (December 30, 2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protocols, including Dynamic Source Routing (DSR), Ad-hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance-Vector Routing (DSDV), and Ad-hoc On-Demand Distance Vector (AODV). The performance analysis is done using the NS2.35 simulator.
APA, Harvard, Vancouver, ISO, and other styles
6

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector routing. We adopt On Demand Distance Vector routing solely based on source routing and “On Demand” process, so each packet does not have to transmit any periodic routing information. We implemented intrusion detection system with five different nodes and the performance parameters like packet delivery ratio, throughput, delay are computed with attacker and without attacker and on demand distance vector routing protocols is proposed to implement in hardware using Zigbee</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Soundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Ekta, and Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol." International Journal of Future Generation Communication and Networking 7, no. 6 (December 31, 2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.

Full text
Abstract:
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish
APA, Harvard, Vancouver, ISO, and other styles
11

Umaparvathi, M., and Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs." International Journal of Business Data Communications and Networking 7, no. 4 (October 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.

Full text
Abstract:
Mobile Adhoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messages, thus attacking the normal operation of MANET. One such attack is Black hole attack, in which, a malicious node called Black hole node attracts all the traffic of the network towards itself, and discards all the packets without forwarding them to the intended recipients. This paper evaluates the performance of Adhoc on-demand Distance Vector (AODV) and its multi-path variant Adhoc On-demand Multi-path Distance Vector (AOMDV) routing protocols under black hole attack. Non-cryptographic solutions Secure Blackhole AODV (SBAODV) and Secure Blackhole AOMDV (SBAOMDV) have been proposed to mitigate the effect of black hole attack. Through NS-2 simulations, the performance of the proposed protocols with video streaming is analyzed. The results show that the proposed solutions provide better performance than the conventional AODV and AOMDV.
APA, Harvard, Vancouver, ISO, and other styles
12

Ahmed. "PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN." Journal of Computer Science 10, no. 8 (August 1, 2014): 1466–72. http://dx.doi.org/10.3844/jcssp.2014.1466.1472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

C, Mohanadevi, and Sweatha Selvakumar. "An Effective Encryption Mechanism for Security Issues in Adhoc Networks." ECS Transactions 107, no. 1 (April 24, 2022): 17465–74. http://dx.doi.org/10.1149/10701.17465ecst.

Full text
Abstract:
In a wireless adhoc network, overtly on the market transmission signals impose a major security risk. Dos attacks on the network layer are a big threat to adhoc networks. The widespread attacks on adhoc networks are blackhole and grayhole attacks. By broadcasting bogus routing data, malicious nodes will prevent information from being sent throughout the network. As a result of this understanding, the United States of America were able to address the problem of information security in wireless adhoc networks with a unique viewpoint, allowing them to have a communication route free of all of the security dangers stated earlier. The goal of this study is to present a low-cost Adhoc On-Demand Distance Vector (AODV) protocol that uninflects the hostile node, ensuring safe communication. In order to achieve this purpose, intermediate nodes that receive erroneous routing data from a neighbour node are designed to see that neighbour node as malevolent. The term "adhoc network" refers to a network that is created on the fly.
APA, Harvard, Vancouver, ISO, and other styles
14

Ahmed, Shadab. "Ad_Hoc on Demand Distance Vector Routing using MANET." IJARCCE 6, no. 3 (March 30, 2017): 944–48. http://dx.doi.org/10.17148/ijarcce.2017.63220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pamungkas, Dimas W. L., and Radityo Anggoro. "An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment." Journal of Development Research 5, no. 1 (May 31, 2021): 1–6. http://dx.doi.org/10.28926/jdr.v5i1.133.

Full text
Abstract:
MANET (Mobile Ad hoc Network) is a technology used for data communication on mobile media. MANET moves and speeds also randomly with different distances between nodes. In the AODV reactive protocol, the development of a routing protocol with an ant colony model can significantly improve performance. The measurement results will impact the decision on the development of the ant colony protocol implemented in AODV to obtain the best route for data transmission. Several studies have developed the K-Means clustering method to obtain the shortest and best route from the AODV protocol. It does not measure congestion, distance, energy, and signal strength of the wireless network. In this research, a combination of methods was carried out, by combining clustering and also ant colony method to get the best route while dealing with the problems that have been mentioned. Implementation is done by modifying the AODV protocol and adding the two methods. At the end of the research, metric measurements were carried out to determine the Packet Delivery Ratio, End to End Delay and also the Average Hop Count.
APA, Harvard, Vancouver, ISO, and other styles
16

Sumathi. "EVALUATING AN AUTHENTICATED TRUST BASED ADHOC ON DEMAND DISTANCE VECTOR FOR MALICIOUS NODES ISOLATION IN MANET." Journal of Computer Science 10, no. 9 (September 1, 2014): 1859–64. http://dx.doi.org/10.3844/jcssp.2014.1859.1864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rahman, Md Abdur, Md Mizanur Rahman, and Md Abdul Alim. "Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks." Telecom 4, no. 1 (January 18, 2023): 100–117. http://dx.doi.org/10.3390/telecom4010007.

Full text
Abstract:
This paper proposes a MAC protocol for ad hoc networks using In-band Full-duplex (IBFD) wireless communications, which are named as AdHoc-FDMAC. To utilize IBFD communications in ad hoc networks, this protocol modifies a number of control frames in the IEEE 802.11 Distributed Coordination Function (DCF) MAC standard. Here, the detailed time sequences for all types of IBFD communications are shown for the data transmission and routing. In this paper, the probability and throughput equations for IBFD communications in different situations have been derived. The performance of the proposed AdHoc-FDMAC has been analysed in terms of probability, throughput, and routing time. The Maximum throughput of AdHoc-FDMAC has been found to be 48.34 Mbps, and it is compared with a recently published ad hoc MAC as well as with the conventional HD MAC. The AdHoc-FDMAC outperforms the recently published ad hoc MAC and conventional HD MAC by 16.80% and 66.50% throughput gain, respectively. AdHoc-FDMAC incorporates the existing Ad hoc On-demand Distance Vector (AODV) routing protocol, but this AODV routing is utilized here using IBFD communications. This paper also compares the routing time of the IBFD-based AODV with the conventional AODV. The result shows that the IBFD-based AODV requires 33.33% less routing time than that of the conventional AODV for 3-hop distance between the transmitter and receiver. This paper suggests that the AdHoc-FDMAC protocol provides much more throughput in ad hoc networks by utilizing IBFD communications.
APA, Harvard, Vancouver, ISO, and other styles
18

V. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.

Full text
Abstract:
The self-configuring ability of nodes in Mobile Adhoc Network (MANETs) made it popular among critical applications like military use or natural emergency recovery. Most of the proposed protocols assume that all nodes in the network are cooperative, and do not address any security issue. To adjust such trend, it is vital to address its potential security issues. The main objective of this paper is to define the path for security and to further improve delay, energy, throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. In this paper, performance analysis of hybrid cryptography with reactive protocol Elliptic Curve Cryptography - Ad hoc On- Demand Distance Vector Routing (ECC-AODV) designed for MANET. In this design there is a two key encryption technique based on elliptic curve based theory that can be used to create faster, smaller, and more energetic and efficient cryptography. Network Simulator (NS2) is used to implement and test the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
19

Deepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.

Full text
Abstract:
In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases. The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm. This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.
APA, Harvard, Vancouver, ISO, and other styles
20

RATNASIH, RATNASIH, RISKI MUKTIARTO NUGROHO AJINEGORO, and DOAN PERDANA. "Analisis Kinerja Protokol Routing AOMDV pada VANET dengan Serangan Rushing." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (July 9, 2018): 232. http://dx.doi.org/10.26760/elkomika.v6i2.232.

Full text
Abstract:
ABSTRAKVehicular Ad-hoc Network (VANET) adalah salah satu jaringan mobile Ad Hocyang memiliki mobilitas tinggi serta topologi yang berubah – ubah secara konstan dalam waktu yang singkat. Sistem broadcast yang diterapkan padaVANET ketika pembentukan arsitektur infrastruktur bisa dijadikan peluang bagi penyerang node untuk melakukan serangan terhadap routing protocol. Rushing Attack adalah sebuah serangan jaringan dimana serangan ini melakukan duplikasi secara cepat dengan transmisi yang lebih tinggi untuk mengacaukan jaringan dan mendapatkan forward akses yang lebih dibandingkan dengan node yang lain. Sasaran utama dari penelitian ini yaitu untuk mengukur dampak dari serangan Rushing pada protocol routing AOMDV (Adhoc on Demand Multipath Distance Vector) menggunakan software NS-2. Nilai QoS yang didapatkan pada hasil penelitian ini tidak maksimal, karena attacker mengirimkan rushed routing packets (RREQ or RREP) yang mempengaruhi routing tabel eksisting dan mengacaukan proses pengiriman paket.Kata kunci: VANET, Rushing Attack, AOMDV, NS-2 ABSTRACTVehicular Ad-hoc Network (VANET) is kind of an Ad-Hoc mobile network thathave high mobility and with changing topology constantly in a short time. The broadcast system that applied to the infrastructure architecture formation when VANET can be used as opportunities for penyerang nodes to perform attacks on the routing protocol. Rushing Attack is an attack on the network that the attacks quickly duplicating with higher transmission to disrupt the network and getting forward more access than the other node. The main target of this project is to measure how big the impact of the rushing attack on AOMDV(Adhoc on Demand Multipath Distance Vector) routing protocol using NS-2 software. On this project did not gets the maximum value for QoS because the attacker sent rushed routing packets (RREQ or RREP) that affect the routing table and disturb the delivery package.Keywords: VANET, Rushing Attack, AOMDV, NS-2
APA, Harvard, Vancouver, ISO, and other styles
21

Murty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering 11, no. 4 (March 30, 2023): 1–9. http://dx.doi.org/10.35940/ijese.d2547.0311423.

Full text
Abstract:
This paper aimed at the detection of wormhole attack and proposed a new method called as Neighbour Node Ratio Adhoc On demand Distance Vector Routing (NNR-AODV). NNR-AODV is an extended version of the traditional AODV routing protocol. The proposed NNR-AODV calculates the neighbour node count for every node and based on that it will decide whether the wormhole is present or not. Furthermore, NNR-AODV is able to detect both external and internal wormhole attacked nodes. Also, NNR-AODV derived a Neighbor node Threshold value which is based on the cumulative distances between nodes present in the wormhole attack. For experimental validation, we have accomplished an extensive simulation and the performance is measured through Number of bogus links, Detection rate, False positive Rate, Packet delivery ratio and Packet loss ratio. The obtained results have shown superior performance in the detection of wormhole attacks than the existing methods.
APA, Harvard, Vancouver, ISO, and other styles
22

Abul Hassan, Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (January 1, 2021): 465. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp465-471.

Full text
Abstract:
<span>Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its resources in path selection process and data routing from source to destination. Selecting of efficient routing protocol to utilize all available resources played vital role in extending network life time. In this article fisheye state routing (FSR) protocol is implemented in FANET and compare networks performance in term of channel utilization, link utilization vs throughput and packet delivery ratio (PDR) with distance sequence distance vector (DSDV), optimized link state routing (OLSR), adhoc on demand distance vector (AODV), dynamic source routing (DSR) and temperary ordered routing protocol (TORA). Experimental analysis slows that FSR is good in term of PDR (16438 packets delivered), channel utilization (89%) and link vs throughput from the rest of routing protocols after addressing of these problems UAVs resources are efficiently utilized (energy).</span>
APA, Harvard, Vancouver, ISO, and other styles
23

Bharadwaj, Priyanka, and Surjeet Balhara. "A Bandwidth and Energy Aware QoS Routing Protocol for Enhanced Performance in Ad-hoc Networks." International Journal of Sensors, Wireless Communications and Control 9, no. 2 (October 25, 2019): 203–13. http://dx.doi.org/10.2174/2210327908666180801125735.

Full text
Abstract:
Background & Objective: There are some challenging issues such as providing Quality of Service (QoS), restricted usage of channels and shared bandwidth pertaining to ad-hoc networks in a dynamic topology. Hence, there is a requirement to support QoS for the application environment and multimedia services in ad-hoc networks with the fast growing and emerging development of information technology. Eventually, bandwidth is one of the key elements to be considered. Methods: Energy aware QoS routing protocol in an ad-hoc network is presented in this article. Results and Conclusion: The simulation results indicate that the improved protocol outperforms Adhoc On-Demand Distance Vector (AODV) routing protocol in terms of QoS metric such as throughput, packet delivery ratio, loss rate and average delay.
APA, Harvard, Vancouver, ISO, and other styles
24

Vasundra, S., and D. Venkatesh. "Performance Evaluation of Routing Protocols for Voice and Video Traffics." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 86–90. http://dx.doi.org/10.51983/ajcst-2018.7.3.1890.

Full text
Abstract:
Wireless networks are comprised of nodes which are high in mobility and are adhoc natured where centralized access point is not required. Each node will have particular transmission range in which the data transmits from source to destination in that transmission range. Route construction for transmission of data from source to destination is tough due to high node mobility and dynamic nature of network. Many routing protocols are proposed and implemented in networks to reduce such mobility and dynamic difficulties for route construction. These routing protocols construct a route from source to destination based on availability of network nodes. Adhoc On demand Distance vector (AODV) is a self-starting dynamic network, Dynamic source routing (DSR) and Temporally Ordered Routing Algorithm (TORA) are most frequent used ones for dynamic route construction. Voice and Video are two mostly used applications nowadays as the users are immensely using them. In this paper, a comparison is made in performances of AODV, DSR and TORA for the traffics of voice and video. The performance is evaluated in terms of delay, throughput and packet delivery ratio. Simulations are conducted using network simulator NS 2.35.
APA, Harvard, Vancouver, ISO, and other styles
25

Makani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.

Full text
Abstract:
Background & Objective:: In past few years, Cognitive Radio (CR) paradigm has emerged as a promising and revolutionary solution to avoid problems of spectrum paucity and inefficiency in spectrum usage. Efficiently utilization of the spectrum offers high network performance. CRs are proficient to identify and adopt the unused spectrum in order to allow secondary users to occupy it without interfering the primary user’s activity. Cognitive Internet on Things (CIoT) is an integration of several technologies and communication solutions which can be effectively realized as Cognitive Radio Adhoc Networks (CRAHN). In CRANH, on-demand routing protocols are the best suitable protocols due to their dynamic feature of available un-utilized channel/spectrum selection. Methods: Here, firstly, Ad-Hoc On-Demand Distance Vector (AODV) routing protocol has been modified and further evaluated to address route selection challenges in CIoT framework. Secondly, the effects on network performance under network layer routing attacks (i.e. blackhole attack, byzantine attack and flooding attacks) are evaluated. Conclusion: The simulations results demonstrate network performance increase with more channels and degrade differently under attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

Murty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering 13, no. 1 (March 30, 2023): 1–9. http://dx.doi.org/10.35940/ijsce.a3592.0313123.

Full text
Abstract:
This paper aimed at the detection of blackhole attacks and proposed a new method called as Secure and Light Weight Adhoc On demand Distance Vector Routing (SLW-AODV). SLW-AODV is an extended version of the traditional AODV routing protocol. The proposed SLW-AODV ensures resilience for both blackhole and cooperative blackhole attacks. It employs a simple Challenge, Response and Confirm (CRC) strategy with chaotic maps for the identification of both blackhole and cooperative blackhole attacks. SLW-AODV identifies the attacked nodes at both route discovery and data forwarding process. For experimental validation, we have conducted extensive simulations and the performance is validated through Packet Delivery Ratio, Throughput and Average end-to-end delay. The obtained performance metrics shows an outstanding performance than the state-of-the art methods.
APA, Harvard, Vancouver, ISO, and other styles
27

S., Dr Smys, and Dr Jennifer S. Raj. "Performance Improvement in Conventional AODV Using Energy Efficient, Manifold Route Discovery Scheme." Journal of ISMAC 2, no. 2 (May 14, 2020): 129–39. http://dx.doi.org/10.36548/jismac.2020.2.006.

Full text
Abstract:
The decentralized network formed without any assistance of the fixed infrastructure and just by the employing the volunteering mobile or the portable devices that work in a cooperative manner along with the other devices that are clubbed in the network are inbuilt with the capacity of providing a best data conveyance facility utilizing the unicast, multicast and the broadcast methods of the routing strategies. Despite the capabilities of these type of networks, it faces difficulties in devising a strategy of routing according to the dynamic nature of the distributed network. The reactive type or the on demand routing are highly used over the proactive way of routing in the decentralized network as the performance of the former is better compared to the latter. As the mobile device employed are capable are moving from its position irrespective of time, and they behave as the route and as well as the end node or the initiating node. The important factors to be considered while forming the route is the power required for transmission and the current position of the nodes, this is quiet tedious. The study in the paper provides the importance of the on demand routing distance vector routing for the distributed network that are linked in a adhoc manner and analysis all the existing on demand distance vector routing strategies and form a new manifold route discovery scheme to improve the conventional_AODV. The method devised to improve the conventional_AODV proves to be efficient when simulated using the NS-3 on the basis of the packet delivery rate, load balancing and the energy usage.
APA, Harvard, Vancouver, ISO, and other styles
28

Prajapati, Meenakshi. "An Implementation and Modification of Routing Protocol Against Vehicular Adhoc Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 1777–80. http://dx.doi.org/10.22214/ijraset.2021.38680.

Full text
Abstract:
Abstract: Today the sector is transferring toward wi-fi system. Wireless networks are gaining reputation to its height today, because the customers need wi-fi connectivity regardless of their geographic position. Vehicular advert-hoc networks (VANETs) are taken into consideration to be the unique software of infrastructure-much less wi-fi Mobile advert-hoc community (MANET). In those networks, motors are used as nodes. The thesis works is primarily based totally on assessment among Ad hoc on call for Distance Vector routing protocol (AODV) and Modified ADHOC call for distance vector routing (MAODV) in VANET on the idea of electricity, packet shipping ratio, throughout, overhead and give up to give up delay. Researchers are constantly publishing paperson overall performance paintings on VANET for this reason we labored at the issue. The gear which we used for the paintings of overall performance are NETWORK SIMULATOR (NS2).
APA, Harvard, Vancouver, ISO, and other styles
29

Kumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.

Full text
Abstract:
In recent years, Mobile ad hoc networks ((MANETs) have generated great interest among researchers in their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. The ad hoc on demand distance vector (AODV) is most suitable routing protocol for mobile adhoc networks in which resource consumption attacks are frequent if it is not detected timely. In this paper, we have proposed a scheme to detect as well as overcome black hole attacks using an Intrusion Detection System (IDS). The proposed scheme is implemented using network simulator 2(NS2) to compare its performance against the standard AODV with and without attack. The results of the simulation show that proposed scheme optimizes the end-to-end delay, normalized routing load, packet delivery fraction and average throughput in comparison with AODV protocols under black hole attack.
APA, Harvard, Vancouver, ISO, and other styles
30

Geetha, M. "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET." International Journal of Computer Sciences and Engineering 6, no. 7 (July 31, 2018): 413–18. http://dx.doi.org/10.26438/ijcse/v6i7.413418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Aldabbagh, Ghadah, Peer Azmat Shah, Halabi B. Hasbullah, Farhan Aadil, Khalid Mahmood Awan, and Farman Marwat. "Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (January 1, 2017): 620–30. http://dx.doi.org/10.1166/jctn.2017.6252.

Full text
Abstract:
Nodes in a multi-hop wireless network rely on each other to maintain network connectivity. A primary design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, the movement of nodes creates service disruption and delay as path failure detection and re-establishment consume considerable amount of time. Existing solutions for link classification and prediction operate on discrete values resulting in performance degradation. This problem can best be modelled using fuzzy logic. This work presents a new fuzzy logic based link status classification mechanism for the use with multipath routing protocols in multi-hop wireless networks. The new Enhanced Adhoc On-demand Multipath Distance Vector (eAOMDV) uses fuzzy logic to classify the link status as active, about-to-break or broken. On the basis of fuzzy input parameters RSSI, velocity, distance and bit error rate, the fuzzy based classification mechanism predicts in advance that a particular link, on the active path between the sender and receiver, is about-to-break and helps the reactive multipath routing protocol to start the rerouting operation, thus minimizing the service disruption time, route discovery frequency, end-to-end delay and the packet loss.
APA, Harvard, Vancouver, ISO, and other styles
32

Asha Latha, S., and A. Sivabalan. "Efficient Security Authentication Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 418–23. http://dx.doi.org/10.4028/www.scientific.net/amm.573.418.

Full text
Abstract:
Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).
APA, Harvard, Vancouver, ISO, and other styles
33

Raghavendar Raju, L., and C. R. K. Reddy. "Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 09 (September 5, 2019): 40. http://dx.doi.org/10.3991/ijim.v13i09.9329.

Full text
Abstract:
<p align="justify"> Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA). NTPA aims to prevent the interference of an anomalous node in a MANET. There by improving the <strong><em>security and data delivery output</em></strong>. The NTPA calculates the node trust prediction by evaluating the four most frequent actions that are performed by a node in the communication process. <em>Node authorization </em>is a key aspect in the evaluation of an ad hoc network’s security. In the proposed method, we monitor the <em>valid</em> and <em>Invalid Authorization </em>of a node. Data delivery reliability is measured with S<em>uccess of Packet delivery </em>and <em>Loss or Drop of packets. </em>In this paper, NTPA is compared with SAR(Security-Aware Routing) and AODV (Adhoc on-Demand Distance Vector), to evaluate the efficiency in an adhoc networks. The empirical results shows that there is an increase of 25% packet delivery and a 40% reduction in routing overhead. <strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
34

Fatima, Lubna Naaz, Syeda Hajra Mahin, and Fahmina Taranum. "Efficient strategies to reduce power consumption in MANETs." PeerJ Computer Science 5 (November 18, 2019): e228. http://dx.doi.org/10.7717/peerj-cs.228.

Full text
Abstract:
In current circumstances, where amelioration in technology is elevating, power optimization is of grave concern, whilst perceiving portable conditions. The focus is to design an efficient system with an aim to reduce power consumption and improve performance of other metrics. Heterogeneous wireless systems will command in the next-generation wireless networks with the aggregation of different remote access mechanisms. A node in MANET (Mobile Adhoc NETworks) while consuming significant amount of energy practices data transmission and data retrieval process whilst bonding with other neighboring nodes that are within its range. The proposed work implements User Specified energy model and DYMO (DYnamic Manet On-demand) routing protocol. Further, additional features of IEEE 802.11 i.e., Power Saving Mode is employed. To obtain enhanced coverage at targeted areas, multi-hop relay strategy is taken into account, also to achieve a less power consuming network with a greater service life. Consequently, the efficiency of the devices is monitored by opting Residual Life Accurate battery model, by using different datasets of Duracell AA and AAA batteries. Simultaneously, battery model, energy model and DYMO (DYnamic Manet On-demand) are applied for IEEE 802.16 to get a comparative assessment of power consumption between IEEE 802.11 and IEEE 802.16. Results are generated for both the architectures i.e., 802.11 and 802.16 for metrics such as residual amount of energy for varying simulation time for all the nodes and for energy consumption in AODV (Ad Hoc On-Demand Distance Vector) and DYMO (DYnamic Manet On-demand) routing protocol using Qualnet version 7.4.
APA, Harvard, Vancouver, ISO, and other styles
35

Rath, Mamata, Binod Kumar Pattanayak, and Bibudhendu Pati. "Energy Competent Routing Protocol Design in MANET with Real Time Application Provision." International Journal of Business Data Communications and Networking 11, no. 1 (January 2015): 50–60. http://dx.doi.org/10.4018/ijbdcn.2015010105.

Full text
Abstract:
With the increase of mobile activities in technological environment, it is a challenge to develop and maintain robust networking system with provision of high connectivity. In this context, Mobile Adhoc Network (MANET) is a feasible solution because it is dynamic in nature and the self-configured nodes of MANET can communicate intelligently in adverse and dynamic mobile situations. Though Adhoc on Demand Distance Vector (AODV) Routing protocol handles the networking issues efficiently, still power and delay efficiency has always been a challenging task in MANET due to the resource constrained nodes which are supplied with limited battery power during the operation in the network. Hence while performing various networking activities; gradually the battery power reduces resulting in delay in processing of packet and forwarding them to the next node during transmission. This causes overall end to end delay in the total transmission. Therefore many researches are still going on in the direction of designing robust and reliable protocols. In this paper the authors have developed a robust and energy efficient routing protocol for MANET with real time support. Their approach is different as it calculates the remaining residual battery power, bounded delay and packet processing rate of the intermediate node before selecting a node to forward the packet in the direction of destination. The cost function calculated using the above three factors along with the condition of congested node is also checked to correctly choose a load balanced path from source to destination. Simulation results show that the proposed protocol performs better than the conventional AODV protocol in terms of better network life time, throughput, delay and packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
36

Bhardwaja, Manish, and Anil Ahlawat. "Evaluation of Maximum Lifetime Power Efficient Routing in Ad hoc Network Using Magnetic Resonance Concept." Recent Patents on Engineering 13, no. 3 (September 19, 2019): 256–60. http://dx.doi.org/10.2174/1872212112666180815120447.

Full text
Abstract:
Background: A mobile Ad-hoc Network is a network in which each node is independent of all other nodes of the network. In MANETs, nodes do not have proper infrastructure. The power source of the Mobile Ad-hoc network is battery power. As we all know, battery power has a certain limit and problems. Objective: The main objective of this manuscript is to resolve the power problem of nodes of mobile ad hoc networks and increase the lifetime of the network. Methods: This paper implements the concept of wireless power transfer between the nodes of Adhoc network and transfers the power to these nodes wirelessly and uses the maximum lifetime power efficient routing algorithm (MLPER) to reduce the consumption of power used by the nodes. The wireless power transfer can be achieved with the help of one type of near-field techniques called magnetic resonance which works at the same resonance frequency. This technique is nonradiative in nature. Results: This paper reduces the problem of power of the ad hoc network nodes nearly 70 to 80 % from the traditional concept used for lifetime optimization of these nodes. Conclusion: In this manuscript, performance optimization can be analysed with the help of AODV (Ad hoc On-Demand Distance Vector Routing Protocol) on-demand routing protocol. This manuscript shows that the proposed algorithm gives significant better results than AODV protocol with some performance metrics. We revised some patents relating to Wireless power transfer.
APA, Harvard, Vancouver, ISO, and other styles
37

Yoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, J. Pusppanathan, Jamil Abedalrahim Jamil Alsayaydeh, Fatin Hamimi Mustafa, Win Adiyansyah Indra, and Johar Akbar Mohamat Gani. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.

Full text
Abstract:
<p>In this paper, an alternative improvement is proposed which is the adaptive wireless access networks-based optical backhaul convergence that will greatly promote to use the existing resource of MANET (mobile ad hoc network). However, these characteristics itself acts as a drawback to the MANET applications such as the random distribution of nodes and continuously changing topology. MiNiTab statistical software was used to model the effect of the parameter variation to predict the field quality through the design of experiments while OMNeT++ network simulation was created to visualize the effect of QoS performance study in response with varying speed scenario. The result shows that the proposed ESCMDR scheme can obtain robustness and outperformed compared to the non-Taguchi previous study when it is used in random waypoint mobility model in any speed of sources. The work is based on Packet Delivery Ratio (PDR) and Packet Loss Probability (PLP) metric under the varying speed scenario. It results in better QoS network PDR of 28.9% improvement, with 83.56% improvement on average PLP. The paper shows that the MANET QoS performance constrained can be addressed with the self-configured data rate of integrated optimization with Taguchi method on AODV-UU (Adhoc On Demand Distance Vector-Uppsala University) routing technique.</p>
APA, Harvard, Vancouver, ISO, and other styles
38

Joseph, Abin John, R. Asaletha, V. J. Manoj, and R. Nishanth. "Enhancing the network lifetime of a wireless sensor network using modified k-means Firefly Optimization." Journal of Physics: Conference Series 2466, no. 1 (March 1, 2023): 012019. http://dx.doi.org/10.1088/1742-6596/2466/1/012019.

Full text
Abstract:
Abstract Developing technology including the Internet of Things, digital services, smart microgrids, and machine-to-machine systems encourage the implementation of self-configuring, automated systems in massive wireless sensor networks (WSNs). Effective Power utilization is critical in order to keep a network operational for the maximum possible time. Sensor nodes, which are small, battery-powered devices, are used in WSNs. As a result, one of the significant research issues in improving the lifespan of a WSN is resource management. A modified k-means (Mk-means) algorithm for clustering has been proposed to select Cluster Head (CH) to minimize energy usage of the nodes. Several optimization methods have been suggested in this area to extend the WSN lifetime. Following that, the Firefly Algorithm (FFA) is employed to generate the optimal routing through the CHs to a Base Station (BS), where multiple fitness functions such as residual energy, distance, and routing traffic are taken into account to optimize the FFA. As a result, information transmission among intermediate CHs in a hierarchy cluster-based design aids in lowering node energy usage. The proposed MKMFA (modified k-means Firefly Algorithm) technique’s performance is evaluated with K-means AODV (Ad-hoc On-demand Distance Vector) and IPC-KMAN(Improved Performance Clustering Using Modified K-Means Algorithm in Mobile Adhoc Networks) using network lifetime, throughput, Load Balancing Factor (LBF), and Packet Delivery Ratio (PDR). This work is based on recent advances in WSNs, which include application fields, design parameters, and lifetime prediction designs.
APA, Harvard, Vancouver, ISO, and other styles
39

Martinaa, M., B. Santhi, and A. Raghunathan. "An energy-efficient and novel populated cluster aware routing protocol (PCRP) for wireless sensor networks (WSN)." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8529–42. http://dx.doi.org/10.3233/jifs-189170.

Full text
Abstract:
Wireless Sensor Networks (WSNs) is created, stemming from their applications in distinct areas. Huge sensor nodes are deployed in geographically isolated regions in WSN. As a result of uninterrupted transmission, the energy level of the nodes gets rapidly depleted. Sensor node batteries cannot be replaced or recharged often and maintaining the energy level is a crucial issue. Thus energy efficiency is the significant factor to be consider in WSN. This paper focuses to implement an efficient clustering and routing protocols for maximized network lifetime. Clustering has been confirmed as a successful approach in network organization. The fundamental responsibilities of the clustering mechanism include improved energy efficiency and extended network lifespan. In this work, energy efficiency is improved to maximize lifespan of the WSN by proposing a novel method known as the Populated Cluster aware Routing Protocol (PCRP). The proposed method comprises three different steps: cluster formation, cluster head selection, and multi-hop data transmission. All sensor nodes are joined to a Cluster Head in a single hop in the cluster formation phase. Node distance is calculated and from which cluster head is selected. Then, cluster head aggregates the data from sensor nodes and transfer to the Base Station (BS). The shortest pathway is estimated by the Energy Route Request Adhoc On-demand Distance Vector (ERRAODV) algorithm. The proposed method considers the residual energy involved to attain high energy efficiency and network stability. The experimental analysis is demonstrated to validate the proposed method with existing, which improves the network lifespan. Vital parameters are validated using Network Simulator (NS2).
APA, Harvard, Vancouver, ISO, and other styles
40

Sharma, Sharad, Shakti Kumar, and Brahmjit Singh. "AntMeshNet." International Journal of Applied Metaheuristic Computing 5, no. 1 (January 2014): 20–45. http://dx.doi.org/10.4018/ijamc.2014010102.

Full text
Abstract:
Wireless Mesh Networks (WMNs) are emerging as evolutionary self organizing networks to provide connectivity to end users. Efficient Routing in WMNs is a highly challenging problem due to existence of stochastically changing network environments. Routing strategies must be dynamically adaptive and evolve in a decentralized, self organizing and fault tolerant way to meet the needs of this changing environment inherent in WMNs. Conventional routing paradigms establishing exact shortest path between a source-terminal node pair perform poorly under the constraints imposed by dynamic network conditions. In this paper, the authors propose an optimal routing approach inspired by the foraging behavior of ants to maximize the network performance while optimizing the network resource utilization. The proposed AntMeshNet algorithm is based upon Ant Colony Optimization (ACO) algorithm; exploiting the foraging behavior of simple biological ants. The paper proposes an Integrated Link Cost (ILC) measure used as link distance between two adjacent nodes. ILC takes into account throughput, delay, jitter of the link and residual energy of the node. Since the relationship between input and output parameters is highly non-linear, fuzzy logic was used to evaluate ILC based upon four inputs. This fuzzy system consists of 81 rules. Routing tables are continuously updated after a predefined interval or after a change in network architecture is detected. This takes care of dynamic environment of WMNs. A large number of trials were conducted for each model. The results have been compared with Adhoc On-demand Distance Vector (AODV) algorithm. The results are found to be far superior to those obtained by AODV algorithm for the same WMN.
APA, Harvard, Vancouver, ISO, and other styles
41

Juneja, Kapil. "DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 79–93. http://dx.doi.org/10.2174/2210327909666190208154847.

Full text
Abstract:
Background: The blackhole infection can affect the collaborative communication in mobile networks. It is man-in-middle attack that seizes and deflects the route and avoids packet-forwarding in the network. The occurrence of collaborative-blackhole reduces the trust and trustworthiness over the network. Objective: A probabilistic and weighted analysis based protocol is proposed in this research for detection of cooperative blackhole nodes and generating the preventing route over the network. The aim of the work is to improve the communication reliability. Methods: In this paper, the communication behaviour is analyzed under associated and probabilistic measures using Data Routing Information (DRI) table to discover the blackhole attack. It applies a dual check based on participation and communication constraints to estimate the node criticality. The evaluation is performed by neighbours and neighbour-on-neighbour nodes with weights and threshold specific decisions. These measures are evaluated through composite and integrated measures and presented as decision metrics. The parametric and probabilistic checks are conducted as a comprehensive evaluation within the proposed PSAODV (Probabilistic Secure Adhoc On Demand Distance Vector) protocol. Results: The simulation of PSAODV protocol is conducted in NS2 environment on various scenarios with mobility, density and traffic type variations. The scenarios are defined with a higher density of blackhole nodes within the network. The adaptive weights are identified by simulating the network with different weight combinations. These weights are employed within the PSAODV protocol to configure it with the maximum benefits. The analytical evaluations are taken against AODV and SAODV protocols and identified the performance enhancement in terms of Packet Delivery Ratio (PDR) Ratio, delay, attack detection ratio parameters. Conclusion: A significant improvement in attack detection is achieved by this proposed PSAODV protocol. The proposed protocol improved the reliability and effectiveness of mobile network.
APA, Harvard, Vancouver, ISO, and other styles
42

Prashanthi, V., D. Suresh Babu, and C. V. Guru Rao. "Network Coding aware Routing for Efficient Communication in Mobile Ad-hoc Networks." International Journal of Engineering & Technology 7, no. 3 (July 11, 2018): 1474. http://dx.doi.org/10.14419/ijet.v7i3.12928.

Full text
Abstract:
Existing approach of routing protocols had only partial support towards energy efficiency. However, none of them had focused on considering network coding aware routing to reduce energy consumption. Majority of the existing solutions in literature to improve the communication performance of MANET has focused on minimum cost routing protocols. There are very less significant studies towards network coding in performing routing in MANET system. Therefore, it is totally unknown how network coding could be used to solve such issues. Throughput in wireless networks can be enhanced with the help of network coding. This approach also increases network lifetime in the cases of devices running on battery, such as wireless sensor nodes. Additionally, network coding achieves a reduction in the number of transmissions needed for transmission of a specific message through the network by making energy usage more efficient. Despite its benefits, however, network coding can have a negative impact on network lifetime if it is implemented excessively. Initially, to achieve the goal of improving throughput, reducing energy efficiency by reducing the number of broadcasting transmissions, a network coding model is created in this study and the MANET broadcast based on network coding is improved by the heuristic principle of Ant Colony Optimization. This study proposes the application of a network coding based dominating set approach to traditional routing protocols like adhoc on demand distance vector (AODV) as a solution to this issue. Coding gain of different topologies with different offer loads is evaluated using network coding. We discussed the performance of Alice-bob, cross, X, and wheel topologies using network coding. The study has paid particular attention to the trade-off between selection of paths compatible with network coding and network lifetime. The present study addresses this compromise that demonstrates that networks with energy restrictions are incompatible with the current network coding strategies based on throughput. One routing issue is attributed particular importance, namely, reduction of overall energy usage and improvement of individual node lifetime through effective routing of a series of traffic demands over the network. A range of analytical formulations is put forth to generate an optimal solution for the issue of multi-path routing. Results show that, by comparison to solutions without network coding, the suggested solutions improve energy efficiency while at the same time satisfying the specified lifetime restrictions.
APA, Harvard, Vancouver, ISO, and other styles
43

M, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (January 20, 2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.

Full text
Abstract:
<p>Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.<strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
44

Marina, Mahesh K., and Samir R. Das. "Ad hoc on-demand multipath distance vector routing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 92–93. http://dx.doi.org/10.1145/581291.581305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Sung-Ju, Elizabeth M. Belding-Royer, and Charles E. Perkins. "Ad hoc on-demand distance-vector routing scalability." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 94–95. http://dx.doi.org/10.1145/581291.581306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 106–7. http://dx.doi.org/10.1145/581291.581312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Marina, Mahesh K., and Samir R. Das. "Ad hoc on-demand multipath distance vector routing." Wireless Communications and Mobile Computing 6, no. 7 (2006): 969–88. http://dx.doi.org/10.1002/wcm.432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lalwani, Praveen, Mahesh Motwani, and Piyush Kumar Shukla. "Optimized Ad-hoc on Demand Distance Vector Routing Protocol." International Journal of Computer Applications 55, no. 4 (October 20, 2012): 13–17. http://dx.doi.org/10.5120/8742-2614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Singh, Virendra, and Dhanroop Mal. "Modified Ad Hoc On-Demand Distance Vector Routing Protocols." International Journal of Computer Applications 130, no. 12 (November 17, 2015): 1–6. http://dx.doi.org/10.5120/ijca2015907111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Meeta, and Sudeep Kumar. "A Survey: Ad-hoc on Demand Distance Vector (AODV) Protocol." International Journal of Computer Applications 161, no. 1 (March 15, 2017): 38–44. http://dx.doi.org/10.5120/ijca2017913109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography