Journal articles on the topic 'MANETs'

To see the other types of publications on this topic, follow the link: MANETs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MANETs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
2

Eltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (April 22, 2023): 1956. http://dx.doi.org/10.3390/electronics12091956.

Full text
Abstract:
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs’ nodes create on-the-fly connections with each other to share information, and they frequently join and leave MANET during run time. Therefore, flexibility in MANETs is needed to be able to handle variations in the number of existing network nodes. An effective routing protocol should be used to be able to route data packets within this dynamic network. Lacking centralized infrastructure in MANETs makes it harder to secure communication between network nodes, and this lack of infrastructure makes network nodes vulnerable to harmful attacks. Testbeds might be used to test MANETs under specific conditions, but researchers prefer to use simulators to obtain more flexibility and less cost during MANETs’ environment setup and testing. A MANET’s environment is dependent on the required scenario, and an appropriate choice of the used simulator that fulfills the researcher’s needs is very important. Furthermore, researchers need to define the simulation parameters and the other parameters required by the used routing protocol. In addition, if the MANET’s environment handles some conditions where malicious nodes perform network attacks, the parameters affecting the MANET from the attack perspective need to be understood. This paper collects environmental parameters that might be needed to be able to set up the required environment. To be able to evaluate the network’s performance under attack, different environmental parameters that evaluate the overall performance are also collected. A survey of the literature contribution is performed based on 50 recent papers. Comparison tables and statistical charts are created to show the literature contribution and the used parameters within the scope of the collected papers of our survey. Results show that the NS-2 simulator is the most popular simulator used in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
3

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
4

Debnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.

Full text
Abstract:
In Mobile Ad-hoc Network (MANET), portable devices like smartphones, or laptop PC can join together to make provisional networks without any infrastructure The objective of multicast or unicast protocols is to ensure an efficient route formation and flow control mechanism which is a very challenging issue for many group computing services in MANETs. MANETs can support several real-time applications like emergency rescue, and disaster relief operations which require minimum Quality of Service (QoS) to handle high traffic. Providing QoS for multimedia and group-oriented computing in MANETs becomes a real challenge due to the wireless medium and the mobility of operating nodes. Therefore, an investigation of routing protocols for one-to-many or many-to-many computing is important that supports acceptable QoS in MANETs. Numerous QoS metrics have been considered for the assessment like packet delivery ratio, latency, packet loss rate, control overhead, and throughput. By considering different network topologies and scenarios with different performance parameters, the primary goal of this study is to explore the challenges and factors for QoS services in MANET’s multicast communication. The outcomes of investigation can be used to design the future MANET protocol for multimedia applications. The performance results indicate that the increasing number of sending/receiving nodes may increase the overhead or latency of the network but capable of providing higher network throughput, carried out in NS-2. The results also indicate although MANETs can induce errors and packets are lost as part of the normal operating context, multicast AODV practice superior to the unicast protocol to various QoS in a wide range of scenarios with less overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Kurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.

Full text
Abstract:
Battery energy is a crucial issue that limits battery-powered mobile devices’ operational efficiency in Mobile Ad hoc Networks (MANETs). Failure of a node affects both the lifetime and connectivity of a MANET, which has to initiate finding a new route from source to destination. This initiation causes more energy consumption in nodes. Failure of a node also causes network partitions, thereby resulting in sparse networks being formed. Existing energy-efficient strategies only defer the end of a node’s battery lifetime; they could not guarantee the MANET’s nonstop functioning. To address the issues caused by battery depletion, this paper proposes a “Cloud” oriented approach called Power-as-a-Service (PaaS), a hierarchical on-demand charging model for recharging the mobile nodes of the MANET. In PaaS, the MANET is alienated into non-overlapping disjoint zones, and for each zone, one Zone Charging Cloud Node (ZccN) is deployed to recharge the mobile nodes of that particular zone wirelessly. A High-power Charging Cloud Node (HccN) is deployed to wirelessly recharge the ZccNs in the MANET for the entire network. In PaaS, the ZccN recharges both the selected node for recharge and other nodes around the selected node that requested recharge and has higher power transfer efficiency. This strategy of PaaS improves the charging efficiency of cloud chargers by minimizing the urgent charging requests in the future, and thus the operational efficiency of the MANET improves. Extensive simulations indicate that the proposed PaaS model with a hierarchy of cloud chargers improves the operational efficiency of MANETs in terms of reducing the death rate of mobile nodes, thereby improving the lifetime and connectivity probability of MANETs.
APA, Harvard, Vancouver, ISO, and other styles
6

Kanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.

Full text
Abstract:
A mobile ad hoc network (MANET) has several intrinsic features that create unique queuing dynamics, and thus congestion control inside a MANET must be achieved under time-critical conditions. Meanwhile, the Named Data Networking (NDN) architecture ensures traffic optimization and has attracted renewed attention as part of the future internet. The synergy between NDN and MANETs can be exploited in order to improve the performance of dynamic content routing and congestion control mechanisms. This overview identifies the key concepts involved in congestion control for NDN-based MANETs. It also proposes some criteria for categorising existing congestion control solutions for NDN-based MANETs and discusses the advantages and disadvantages of each category. Future challenges regarding congestion control for NDN-based MANETs are also highlighted.
APA, Harvard, Vancouver, ISO, and other styles
7

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (January 20, 2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.

Full text
Abstract:
MANETs (Mobile Ad hoc Networks) had become the most important next generation wireless network technologies. It is made up of self-configurable mobile nodes, Intruders mieght decrease MANET functionality due to the dispersed and wireless nature of MANETs, and therefore they were vulnerable to numerous attacks at different levels. The important challenges for MANET were the security and routing protocols. This paper examined the impact of Jammer which it was a kind of DoS attack which interfere with the normal operation of network and show how the Jammer increased the delay and data dropped and decreased the throughput which they were the important parameters for the measurements of network performance. This performance could be improved using routing protocols (AODV, DSR, OLSR and GRP). Riverbed Modeler Academic Edition (17.5) was utilized for this study in number of modeled scenarios for video applications. The results address the impact of Jammers and show that the MANET's Routing Protocols could improve the throughput and data dropped of the network but on the expense of increasing the delay.
APA, Harvard, Vancouver, ISO, and other styles
8

Al Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.

Full text
Abstract:
Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.
APA, Harvard, Vancouver, ISO, and other styles
9

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (December 8, 2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols are vulnerable to various kinds of attacks. Recently, several research efforts have been made to counter these adversarial activities. This survey investigates the latest and on demand security concerns in MANET. This paper comprehensively discusses the existing attacks in the network layer, various categories of defense mechanisms in the literature, and their benefits and defects when applying to MANET. This paper also classifies the attacks and defense mechanisms based on the routing nature, such as topological and geographical. It also discusses intrusion detection systems as well as anonymous routing in MANETs. Finally, it discusses the challenges and future directions in routing security over the MANET environment.
APA, Harvard, Vancouver, ISO, and other styles
11

S, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (July 27, 2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.

Full text
Abstract:
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for communication. In this network, nodes are self-organized and can act as router. They are battery operated and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible application of Block chain in many sectors including MANETs. This paper surveys the existing researches done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for improving security while routing packets from one node to another. Some researchers have proposed trust models using block chain. This paper reviews some of the existing approaches where block chain is used in MANETs for routing the packets, creating trust models, and dealing with network partitioning problem and scalability problem. This paper acts as a review paper to study on block chain applications in MANET.
APA, Harvard, Vancouver, ISO, and other styles
12

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (October 10, 2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulnerable to numerous attacks that wreak havoc on their performance than any network. Traditional cryptography techniques cannot entirely defend MANETs in terms of fresh attacks and vulnerabilities due to the distributed architecture of MANETs; however, these issues can be overcome by using machine learning approaches-based intrusion detection systems (IDS). IDS, typically screening system processes and identifying intrusions, are commonly employed to supplement existing security methods because preventative techniques are never enough. Because MANETs are continually evolving, their highly limited nodes, and the lack of central observation stations, intrusion detection is a complex and tough process. Conventional IDSs are difficult to apply to them. Existing methodologies must be updated for MANETs or new approaches must be created. This paper aims to present a novel concept founded on deep belief networks (DBN) and long shortterm memory (LSTM) for MANET attack detection. The experimental analysis was performed on the probe, root to local, user to root, and denial of service (DoS) attacks. In the first phase of this paper, particle swarm optimization was used for feature selection, and subsequently, the DBN and LSTM were used for the classification of attacks in the MANET. The experimental results gave an accuracy reaching 99.46%, a sensitivity of 99.52%, and a recall of 99.52% for DBN and LSTM accuracy reaching 99.75%, a sensitivity of 99.79%, and a recall of 99.79%.
APA, Harvard, Vancouver, ISO, and other styles
13

Dhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (December 30, 2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.

Full text
Abstract:
MANET (mobile ad hoc network) is a collection of mobile nodes that interact without the need for a fixed physical foundation. MANETs have grown in popularity as a result of characteristics like dynamic topology, quick setup, multi-hop data transfer, and so on. MANETs are well-suited to various real-time applications, including environmental monitoring, disaster management, and covert and military operations, because of their distinguishing characteristics. MANETs may also be used in conjunction with new technologies like cloud computing, IoT, and machine learning algorithms to help realize the vision of Industry 4.0. Secure and reliable data transfer is essential for any MANET-based sensitive real-time applications that must achieve the requisite QoS. It is challenging to provide safe and efficient data transfer with MANET. As a result, this article examines different Trust-based Approaches that take a step forward in providing secure transmission while simultaneously improving MANET performance. Furthermore, the study's analysis based on many aspects exposes the inadequacies of existing techniques and provides future directions for improvement.
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
15

A.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (July 8, 2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.

Full text
Abstract:
Purpose In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for greater energy usage, thereby affecting the parameter metrics network performance, throughput, packet overhead, energy consumption in addition to end-to-end delay. The effective parameter metric measures are implemented and made to enhance the network lifetime and energy efficiency. The transmission of data for at any node should be more efficient and also the battery of sensor node battery usage should be proficiently applied to increase the network lifetime. The paper aims to discuss these issues. Design/methodology/approach In this research work for the MANETs, the improvement of energy-efficient algorithms in MANETs is necessary. The main aim of this research is to develop an efficient and accurate routing protocol for MANET that consumes less energy, with an increased network lifetime. Findings In this paper, the author has made an attempt to improve the genetic algorithm with simulated annealing (GASA) for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent. Originality/value In this paper, the author has made an attempt to improve the GASA for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.
APA, Harvard, Vancouver, ISO, and other styles
16

Goyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (August 5, 2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.

Full text
Abstract:
In this paper, we perform rigorous analysis of MANET routing protocols selected from different categories over various scenarios using a large set of performance evaluation metrics. The traffic that we model on source-destination pairs is the video streams that consist of varying sized data frames and the inter-packet time is very low. In this way, we can check the MANET routing protocols over varying data sets and can provide the analysis that among the existing MANET routing protocols which routing protocol is best suited for data transmission over MANETs. To analyze the behavior of various routing protocols during the data communication in MANETs, we generate simulation results over various MANET scenarios consists of varying number of nodes and source destination pairs. The simulation process is done by using the open source simulator NS-3. We generate and analyze the scenarios where the effects of data communication is evaluated and analyzed over the increase in network mobility and network data traffic. The work is helpful for the students working on the various issues on MANETs as attacks, Quality-of-Service etc to identify which protocol they should use for their work as a base routing protocol. Â
APA, Harvard, Vancouver, ISO, and other styles
17

Haglan, Hussein M., Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd Zainuri Saringatb, Hosam Alhakami, and Wajdi Alhakami. "Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment." Bulletin of Electrical Engineering and Informatics 10, no. 1 (February 1, 2021): 434–40. http://dx.doi.org/10.11591/eei.v10i1.2516.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.
APA, Harvard, Vancouver, ISO, and other styles
18

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
19

Khan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, Rashidah Funke Olanrewaju, Miss Laiha B. Mat Kiah, Md Arafatur Rahman, and Zuriati Janin. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (October 30, 2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.

Full text
Abstract:
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited battery power, mobility, dynamic topology, open media, and so on. Numerous MANET-related attacks have been classified based on their sources, behaviour, participating nodes, processing capability, and layering. The many different types of misbehaviour a node can exhibit and the various ways a node can behave were investigated. Two major types of MANETs misbehaviour have been evaluated, classified and analysed. Notably, mitigating node misbehaviour in MANET is a critical issue that must be addressed to ensure network node functionality and availability. Strategies for detecting network nodes that misroute packets are also examined. Finally, the paper emphasises the need for effective solutions to secure MANETs.
APA, Harvard, Vancouver, ISO, and other styles
20

Hanin, Moulay Hicham, Mohamed Amnai, and Youssef Fakhri. "New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2134. http://dx.doi.org/10.11591/ijece.v11i3.pp2134-2142.

Full text
Abstract:
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
APA, Harvard, Vancouver, ISO, and other styles
21

Zaid Ihsan Nouri. "Comparative analysis of routing protocols for wireless area networks and evaluation of the effectiveness." Jornual of AL-Farabi for Engineering Sciences 1, no. 2 (December 1, 2022): 9. http://dx.doi.org/10.59746/jfes.v1i2.48.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is a gathering of mobile nodes that want to communicate without any preplanned infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article been compared AODV, DSR and DSDV routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. I study these three MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
APA, Harvard, Vancouver, ISO, and other styles
22

Velagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (November 25, 2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.

Full text
Abstract:
A MANET can be treated as a network in which the nodes have the capability of self-configuring among themselves. These nodes are connected by wireless links to form an distributed topology without the help of any pre-existing infrastructure. Each node in a MANET can itself act as a router on its own. To perform effective routing operation in MANETS , several routing protocols were proposed, addressing several issues in MANETS. In this paper ,we tried to study the operation of DSDV protocol ,which is a proactive protocol and analyse the results obtained by simualting the DSDV protocol using NS-2 Simulator.
APA, Harvard, Vancouver, ISO, and other styles
23

Soni, S., and J. S. Shah. "Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks." Engineering, Technology & Applied Science Research 7, no. 3 (June 12, 2017): 1681–84. http://dx.doi.org/10.48084/etasr.1167.

Full text
Abstract:
MANETs (Mobile Ad-hoc Networks) is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service) support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing) protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay) selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC). OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.
APA, Harvard, Vancouver, ISO, and other styles
24

Islam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.

Full text
Abstract:
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on the evolution of MANETs followed by its significance in various fields. Besides, the MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated.
APA, Harvard, Vancouver, ISO, and other styles
25

M. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (March 29, 2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.

Full text
Abstract:
In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data tampering, crucial for secure communication in dynamic, resource-limited MANET environments. Our proposed system utilizes a combination of face and fingerprint biometrics for encryption, enhancing network security. Through testing, our system demonstrates a high authentication rate of 92.42% with minimal processing times: 0.042 ms for key generation, 0.019 ms for encryption, and 0.032 ms for decryption, based on a 1024-bit key size. These practical results showcase the resilience and efficiency of our secure system.
APA, Harvard, Vancouver, ISO, and other styles
26

Manwal, Manika. "Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (December 15, 2020): 2032–40. http://dx.doi.org/10.17762/turcomat.v11i3.13600.

Full text
Abstract:
Mobile devices are able to build their own networks, which are referred to as mobile ad hoc networks. These networks do not require any kind of permanent wiring or other infrastructure (MANETs). The success of MANETs and their adaptability to a variety of tasks is, to a considerable extent, based on the routing protocols that they use. Using metrics such as routing overhead, end-to-end delay, and packet delivery ratio, we compare and contrast the various routing protocols that can be employed in MANETs, including proactive, reactive, and hybrid protocols. This comparison and contrast is carried out in this study. In addition to this, we discuss the simulation tools that are utilized to evaluate the efficacy of MANET routing algorithms and define the several performance indicators that may be utilizedin the course of this endeavor. This paper makes a contribution to an ongoing body of research into the analysis of routing protocols in MANETs by offering guidance to network engineers and researchers on how to select the most appropriate routing protocol and simulation tool for a particular MANET scenario. In doing so, the paper maximizes the potential for effective and efficient communication between mobile nodes, which is one of the main goals of the research.
APA, Harvard, Vancouver, ISO, and other styles
27

Gangwar, Sanjeev. "Mobile Ad Hoc Networks: Comparasion of Multipath Routing Protocols with Unipath Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 193–99. http://dx.doi.org/10.24297/ijct.v5i3.3520.

Full text
Abstract:
The latest technology MANETs is being studied widely and attracting a large variety of applications. Due to varying network topology, The most common challenging factor in MANET is routing [1][2]. Future applications of MANETs are expected to be based on all-IP architecture and be capable of carrying multitude real-time multimedia applications such as voice and video as well as data. It is very necessary for MANETs to have an efficient routing and quality of service (QoS) mechanism to support diverse applications. In this research paper, we study the various unipath routing protocols such as DSDV, WRP,GSR,FSR,AODV,DSR,CBRP and various Multipath routing protocols such as AOMDV,SMR,AODVM,MSR.
APA, Harvard, Vancouver, ISO, and other styles
28

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
29

Abdali, Taj-Aldeen Naser, Rosilah Hassan, Ravie Chandren Muniyandi, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen, and Ahmed Salih Al-Khaleefa. "Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET." Information 11, no. 11 (November 15, 2020): 529. http://dx.doi.org/10.3390/info11110529.

Full text
Abstract:
Mobile Ad-hoc Network (MANETs) is a wireless network topology with mobile network nodes and movable communication routes. In addition, the network nodes in MANETs are free to either join or leave the network. Typically, routing in MANETs is multi-hop because of the limited communication range of nodes. Then, routing protocols have been developed for MANETs. Among them, energy-aware location-aided routing (EALAR) is an efficient reactive MANET routing protocol that has been recently obtained by integrating particle swarm optimization (PSO) with mutation operation into the conventional LAR protocol. However, the mutation operation (nonuniform) used in EALAR has some drawbacks, which make EALAR provide insufficient exploration, exploitation, and diversity of solutions. Therefore, this study aims to propose to apply the Optimized PSO (OPSO) via adopting a mutation operation (uniform) instead of nonuniform. The OPSO is integrated into the LAR protocol to enhance all critical performance metrics, including packet delivery ratio, energy consumption, overhead, and end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
30

Kanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (January 2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.

Full text
Abstract:
A lot of intensive research has been carried out in the direction of providing multimedia communication over wireless mobile ad hoc network (MANET). In MANET, various QoS problems exist such as inefficient routing, handling node mobility, power conservation, limited processing capabilities of network devices, high error rates. Wireless routing introduces new challenges as applying basic routing algorithms directly on MANET could lead to large power consumption, interference, and load-balancing problems. Many routing algorithms have been proposed as extensions to the basic routing algorithms to enhance their performance in MANETs. This paper summarizes existing solutions on QoS routing and resource reservation mechanisms in order to provide multimedia communication over MANET. It also considers the limitations of existing QoS models with regard to satisfying QoS in serving multimedia over MANET. The newest QoS architectures give much better results in providing QoS support. However, more refinements must be proposed in order to enhance further their performance in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
31

Ahirwal, Ramratan, Nitesh Kumar Chaurasiya, and Yogendra Kumar Jain. "An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 15, 2013): 3147–57. http://dx.doi.org/10.24297/ijct.v12i1.3368.

Full text
Abstract:
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no inner control in a MANET, a mobile node itself acts as a router. Undoubtedly, MANETs plays a critical job in situations where a wired infrastructure is neither available nor easy to install. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. The end-to-end throughput degrades rapidly with increase in number of hops. This is one of the biggest problems in MANET.In this paper we introduce an algorithm for avoiding congestion in MANETs. The algorithm demonstrates fast response and superior stability with the controlled packet dropping rate, and reduces end-to-end delay in MANETs, while still fully utilizing the network resources. Analysis and simulation show the strength and robustness of the algorithm. This method is simple and easy to use. We also illustrate the advantages of our proposed approach by comparing its results with standard AODV with recommended parameter settings.
APA, Harvard, Vancouver, ISO, and other styles
32

Al-Shehri, Salman, and Pavel Loskot. "Enhancing Reliability of Tactical MANETs by Improving Routing Decisions." Journal of Low Power Electronics and Applications 8, no. 4 (November 28, 2018): 49. http://dx.doi.org/10.3390/jlpea8040049.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) have been primarily designed to enhance tactical communications in a battlefield. They provide dynamic connectivity without requiring any pre-existing infrastructure. Their multi-hop capabilities can improve radio coverage significantly. The nature of tactical MANET operations requires more specialized routing protocols compared to the ones which are used in commercial MANET. Routing decisions in MANETs are usually conditioned on signal-to-interference-plus-noise ratio (SINR) measurements. In order to improve routing decisions for use in highly dynamic tactical MANETs, this paper proposes to combine two different metrics to achieve reliable multicast in multi-hop ad hoc networks. The resulting protocol combining received signal strength (RSS) with SINR to make routing decisions is referred to as Link Quality Aware Ad-hoc On-Demand Distance Vector (LQA-AODV) routing. The proposed routing protocol can quickly adapt to dynamic changes in network topology and link quality variations often encountered in tactical field operations. Using computer simulations, the performance of proposed protocol is shown to outperform other widely used reactive routing protocols assuming several performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
33

Bhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.

Full text
Abstract:
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the different MANET constraints and also is robust in nature, since it is able to identify and prevent four routing strikes parallel.
APA, Harvard, Vancouver, ISO, and other styles
34

Bhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (May 30, 2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.

Full text
Abstract:
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.
APA, Harvard, Vancouver, ISO, and other styles
35

Et. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.

Full text
Abstract:
With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key management schemes such as symmetric and asymmetric cryptography have been used to support MANET environment. This paper conducted survey to gain a quick knowledge of security design demand and cryptography solutions to secure MANET. This survey focused on security schemas and case studies of cryptography techniques on Ad Hoc networks. Finally, conclusions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Soni, S., and J. S. Shah. "QoS frameworks for Multimedia Traffic in Mobile Adhoc Networks: A Comparative Review." Engineering, Technology & Applied Science Research 7, no. 3 (June 12, 2017): 1708–12. http://dx.doi.org/10.48084/etasr.1131.

Full text
Abstract:
MANETs (Mobile Adhoc Networks) has gained an increased interest by the research community. Regular intelligent exchanges of multimedia will be typical in MANET, though the extended motivation on QoS (Quality of Service). However, various properties of the discussed QoS framework are provisioned for QoS as a challenging concern. Providing QoS provisioning is, to a great degree, challenging in MANETs in view of bouncing correspondences, center point movability and nonattendance of central coordination. Thus, most of the research has focused on giving QoS guarantees in MANETs coordinating traditions. Though huge numbers of QoS coordinating procedures have been proposed in composing, focusing on different QoS estimations yet none of the prescribed or discussed frameworks achieves a universal course of action. There exist several genuine necessary research areas of focus such as QoS metric assurance and cost limit layout, source level scheduling framework and QoS coordinating. In this paper, working and connecting of various QoS frameworks for MANETs is investigated throughout several veritable focus areas of research. After a comparative review, it is concluded that there is still a good scope of research for proposing a QoS framework for MANETs which could have cross-layer advantages, resource reservation, connection admission control, multi-constrained QoS parameters, hard QoS assurance, proactive routing advantages etc.
APA, Harvard, Vancouver, ISO, and other styles
37

Barolli, Leonard, Akio Koyama, Takuo Suganuma, and Norio Shiratori. "GAMAN: A GA Based QoS Routing Method for Mobile Ad-Hoc Networks." Journal of Interconnection Networks 04, no. 03 (September 2003): 251–70. http://dx.doi.org/10.1142/s0219265903000866.

Full text
Abstract:
The Mobile Ad Hoc Networks (MANETs) are useful in many applications environments and do not need any infrastructure support. Much work has been done on routing in MANETs. However, the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS) requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention in the wireline network domain. However, these QoS routing algorithms can not be applied directly to MANETs, because of the bandwidth constraints and dynamic network topology of MANETs. Searching for the shortest path with minimal cost and finding delay constrained least-cost paths are NP-complete problems. For this reason, approximated solutions and heuristic algorithms should be developed for multi-path constraints QoS routing. Also, to cope with changing of MANET topology, routing methods should be adaptive, flexible, and intelligent. In this paper, we propose a Genetic Algorithm (GA) based routing method for Mobile Ad-hoc Networks (GAMAN). Robustness rather than optimality is the primary concern of GAMAN. The GAMAN uses two QoS parameters for routing. The performance evaluation via simulations shows that GAMAN is a promising QoS routing algorithm for MANETs.
APA, Harvard, Vancouver, ISO, and other styles
38

Singh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be discover complex properties of mobile ad hoc networks and evolve intrusion detection programs suitable for this new environment. Programs evolved using Grammatical Evolution techniques which is part of Evolutionary Computation, will be able to detect specific routing attacks on mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Kaur, Rajveer, Dr Shaveta Rani, and Dr Paramjeet Singh. "Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 214–19. http://dx.doi.org/10.24297/ijct.v5i3.3522.

Full text
Abstract:
In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.
APA, Harvard, Vancouver, ISO, and other styles
40

RAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (September 30, 2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.

Full text
Abstract:
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
41

Abdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (November 4, 2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.

Full text
Abstract:
Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms. Findings High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced. Research limitations/implications Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability. Originality/value The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.
APA, Harvard, Vancouver, ISO, and other styles
42

Veerasamy, Anitha, Srinivasa Rao Madane, K. Sivakumar, and Audithan Sivaraman. "Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs." Scientific World Journal 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/3596345.

Full text
Abstract:
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.
APA, Harvard, Vancouver, ISO, and other styles
43

Jim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Australian Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61. http://dx.doi.org/10.18080/ajtde.v5n2.100.

Full text
Abstract:
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralised infrastructure where each node can act as the source, destination and relay for traffic. MANET’s are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilise fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper, we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using Artificial Immune System based Danger signal (DS) and Pathogen Associated Molecular Pattern (PAMP) signal to identify a PST routing attack.
APA, Harvard, Vancouver, ISO, and other styles
44

Jim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61–74. http://dx.doi.org/10.18080/jtde.v5n2.100.

Full text
Abstract:
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralised infrastructure where each node can act as the source, destination and relay for traffic. MANET’s are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilise fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper, we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using Artificial Immune System based Danger signal (DS) and Pathogen Associated Molecular Pattern (PAMP) signal to identify a PST routing attack.
APA, Harvard, Vancouver, ISO, and other styles
45

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-reconfiguration nature of the system which does not depend on any settled infrastructure-based foundation. There is dynamic change in its topology because of rapidly moving versatile nodes. This article features few security issues emerging because of network matter among robots and proposes a lively MANET-based automated convention called PD-ROBO with a committed Intrusion Detection System (IDS) structure that utilizations portable operator method to stay away from replay assault in mechanical based MANET.
APA, Harvard, Vancouver, ISO, and other styles
46

Mishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.

Full text
Abstract:
Abstract: To put it simply, a Mobile Ad-Hoc Network (MANET) is indeed a network of wireless mobile hosts that have formed temporarily without the use of any dedicated infrastructure or centralized administration. The network's nodes are selforganizing & self-configuring because of their mobility. The hosts also serve as routers. Their job is to route information to and from other network nodes. Routing protocols are essential in MANETs because they determine the best ways to get from one node to another. Any ad hoc network's routing protocol should be designed with the ever-evolving topology in mind. For this reason, it is important to set up a path between any two nodes that uses as little bandwidth as possible and as few hops as possible in the routing process. Due to the transient and ever-changing nature of mobile ad hoc networks, designing suitable routing protocols is difficult. For MANETs, routing protocols can be either proactive or reactive. Features and difficulties of MANETs are discussed in this work. Furthermore, both proactive and reactive routing systems, as described earlier, are discussed in detail. Additionally, DSDV, DSR, and AODV are compared with one another in terms of attributes and performance. Finally, certain articles that have dealt with routing in MANET are critically examined.
APA, Harvard, Vancouver, ISO, and other styles
47

Kancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (October 26, 2022): 3480. http://dx.doi.org/10.3390/electronics11213480.

Full text
Abstract:
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this regard, detecting or preventing deceitful nodes that will launch blackhole attacks is a challenge in MANETs. In this paper, we propose an Enhanced Blackhole Resistance (EBR) protocol to identify and resist nodes that are responsible for blackhole attacks. EBR can avoid congested traffic by passing the data packets through a safe route with the minimum RTT. The EBR protocol uses a combination of time to live (TTL) and round trip time (RTT), which is also called a TR mechanism, to detect the blackhole attacks. Our algorithm does not require any cryptographic or authentication mechanisms. Simulation results prove that EBR behaves better than other protocols in terms of throughput, end-to-end delay, packet delivery ratio, energy, and routing overhead.
APA, Harvard, Vancouver, ISO, and other styles
48

L. Esteban, Allen Paul. "Anomaly Recognition in Wireless Ad-hoc Network by using Ant Colony Optimization and Deep Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (May 20, 2023): 395–403. http://dx.doi.org/10.17762/ijritcc.v11i5.6692.

Full text
Abstract:
As a result of lower initial investment, greater portability, and lower operational expenses, wireless networks are rapidly replacing their wired counterparts. The new technology that is on the rise is the Mobile Ad-Hoc Network (MANET), which operates without a fixed network infrastructure, can change its topology on the fly, and requires no centralised administration to manage its individual nodes. As a result, MANETs must focus on network efficiency and safety. It is crucial in MANET to pay attention to outliers that may affect QoS settings. Nonetheless, despite the numerous studies devoted to anomaly detection in MANET, security breaches and performance difficulties keep coming back. There is an increased need to provide strategies and approaches that help networks be more safe and robust due to the wide variety of security and performance challenges in MANET. This study presents outlier detection strategies for addressing security and performance challenges in MANET, with a special focus on network anomaly identification. The suggested work utilises a dynamic threshold and outlier detection to tackle the security and performance challenges in MANETs, taking into account metrics such as end-to-end delay, jitter, throughput, packet drop, and energy usage.
APA, Harvard, Vancouver, ISO, and other styles
49

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
50

Chatheka, Ngazi Mangazi, and Selvam Glorindal. "Secure and efficient data transfer in AODV routing protocol using RSA encryption." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 1. http://dx.doi.org/10.26634/jdf.1.1.19389.

Full text
Abstract:
Mobile Ad-Hoc Networks (MANETs) are recognised as a key emerging technology for use whenever cellular communications are either infeasible, inefficient, or cost-ineffective. MANETS are composed of nodes that are arranged in a self-organizing manner, without a central device like a switch or router. The nodes communicate with each other over wireless links and cooperate in a distributed fashion. Smartphones are the most ideal network nodes in many scenarios where traditional networks are unavailable, but building a secure network with them is not easy. This paper extensively uses the existing possibilities to build a secure MANET. The designed MANET has been built on an NS3 simulator, with the base protocol being Ad-hoc On-demand Distance Vector (AODV) and message encryption is done by using RSA Algorithm. The Secure AODV protocol extension is implemented using the RSA extension.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography