Journal articles on the topic 'Mobile ad hoc networks'

To see the other types of publications on this topic, follow the link: Mobile ad hoc networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile ad hoc networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mikarić, Bratislav, Petar Spalević, and Branimir Jakšić. "Mobile ad-hoc networks: MANET." Trendovi u poslovanju 6, no. 2 (2018): 47–60. http://dx.doi.org/10.5937/trendpos1802047m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (January 2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.

Full text
Abstract:
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are highly susceptible to various security threats due to their inherent characteristics that can adversely affect their performance. In order to provide secure communication in mobile ad hoc networks, it is required to understand various possible attacks at different layers of the communication protocol stack. The intent of this paper is to provide structured and comprehensive study of prominent security attacks reported in the literature for mobile ad hoc networks. In addition, we also discuss various well-known reactive and proactive security solutions proposed in literature to prevent those attacks in MANETs. Finally, the paper is concluded with a brief discussion on future direction of research in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
3

Gerla, Mario, Carla-Fabiana Chiasserini, Kenichi Mase, Eytan Modiano, and Jason Redi. "Mobile ad hoc wireless networks." Journal of Communications and Networks 6, no. 4 (December 2004): 291–94. http://dx.doi.org/10.1109/jcn.2004.6596848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (February 3, 2021): 364. http://dx.doi.org/10.3390/electronics10040364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Vinesh H., Mukesh A. Zaveri, and Hemant Kumar Rath. "Trust Based Routing in Mobile Ad-Hoc Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 318–24. http://dx.doi.org/10.7763/lnse.2015.v3.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Havinal, Ramanna, Girish V. Attimarad, and M. N. Giriprasad. "Power Optimized Routing in Mobile Ad Hoc Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 67–72. http://dx.doi.org/10.9756/bijsesc.8245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.

Full text
Abstract:
A mobile ad hoc network is made up of mobile wireless hosts. When hosts move, the routes change, necessitating the need for a system to find new routes. A crucial aspect of the development of wireless networks is ad-hoc networking. Ad-hoc networks often consist of identical nodes that connect with one another via wireless links without the use of a centralized controller. Ad-hoc wireless networks carry over the standard issues with wireless and mobile communications, like bandwidth optimization, battery management, and improvement of transmission quality. Due to its self-upkeep and self-configuration characteristics or behavior, mobile ad hoc networks (MANET) have achieved great success and attention. Routing attacks are used to quickly alter the network topology of MANETs based on wired and wireless networks. Therefore, securing this network without infrastructure is a big problem. In recent years, experts from all over the worldhave paid particular attention to research on improving the performance of mobile ad-hoc networks (MANETs). Routing methods are especially crucial in a dynamic network environment like MANET for enhancing overall network performance. In addition to discussing the technical difficulties that protocol designers and network engineers must overcome, this paper offers insight into the possible applications of ad hoc networks. Routing, service and resource discovery, Internet access, billing, and security are some of these difficulties.
APA, Harvard, Vancouver, ISO, and other styles
9

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
10

Kadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (June 16, 2021): 1446. http://dx.doi.org/10.3390/electronics10121446.

Full text
Abstract:
Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]
APA, Harvard, Vancouver, ISO, and other styles
11

Kasem Mohammed, Abdulghani Saif, and Khalid Hamid Bilal. "Survey of mobile ad hoc networks (manets)." International Journal of Engineering and Computer Science 8, no. 02 (February 22, 2019): 24484–90. http://dx.doi.org/10.18535/ijecs.v8i02.4229.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of MANET and challenges that are imposed by Mobile ad-hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Misra, Rahul, and Prashant Sharma. "Challenges in Mobile Ad Hoc Network for Secure Data Transmission." International Journal of Electrical and Electronics Research 1, no. 1 (June 30, 2013): 8–12. http://dx.doi.org/10.37391/ijeer.010103.

Full text
Abstract:
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR (Dynamic Source Routing). The Location Aided Routing protocol uses location information to reduce routing overhead of the ad-hoc network! Normally the LAR protocol uses the GPS (Global Positioning System) to get these location information’s. With the availability of GPS, the mobile hosts knows there physical location. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks - multiple routes between nodes to defend routing against denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
13

Cai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.

Full text
Abstract:
A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly analyzes the routing attacks of mobile Ad hoc networking, then elaborates and compares some ad hoc secure routing protocols, at last points the future researches.
APA, Harvard, Vancouver, ISO, and other styles
14

Sajid, Md, and Syed Hamid. "Mobile Ad-Hoc Networks: An Overview." International Journal of Computer Applications 176, no. 3 (October 17, 2017): 18–20. http://dx.doi.org/10.5120/ijca2017915555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shrivastava, Priya, Sushil Kumar, and Manish Shrivastava. "Study of Mobile Ad hoc Networks." International Journal of Computer Applications 86, no. 3 (January 16, 2014): 9–14. http://dx.doi.org/10.5120/14964-3140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dai Cun-Li, Zhao Yan-Yan, Wu Wei, and Zeng Lun-Wu. "Synchronizability of mobile Ad Hoc networks." Acta Physica Sinica 59, no. 11 (2010): 7719. http://dx.doi.org/10.7498/aps.59.7719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

YAN, Wei. "Manycast in Mobile Ad hoc Networks." Journal of Software 16, no. 9 (2005): 1647. http://dx.doi.org/10.1360/jos161647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

M. Mahajan, Poonam. "Mobile Ad Hoc Networks: An Overview." International Journal of Computer Trends and Technology 48, no. 3 (June 25, 2017): 123–27. http://dx.doi.org/10.14445/22312803/ijctt-v48p125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hassanein, Hossam, and Ioanis Nikolaidis. "Mobile and ad-hoc local networks." Computer Networks 41, no. 3 (February 2003): 285–87. http://dx.doi.org/10.1016/s1389-1286(02)00421-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Carvalho, Marco. "Security in Mobile Ad Hoc Networks." IEEE Security & Privacy Magazine 6, no. 2 (March 2008): 72–75. http://dx.doi.org/10.1109/msp.2008.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ghassemi, Fatemeh, and Wan Fokkink. "Model checking mobile ad hoc networks." Formal Methods in System Design 49, no. 3 (August 4, 2016): 159–89. http://dx.doi.org/10.1007/s10703-016-0254-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sra, Pushp, and Satish Chand. "QoS in Mobile Ad-Hoc Networks." Wireless Personal Communications 105, no. 4 (February 14, 2019): 1599–616. http://dx.doi.org/10.1007/s11277-019-06162-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Palanisamy, B., N. Karthik, K. Chandrakumar, K. Thirunavukkarasu, and R. Jayasudha. "Improving Network Security in Mobile Ad Hoc Networks." Journal of Computational and Theoretical Nanoscience 16, no. 5 (May 1, 2019): 2299–301. http://dx.doi.org/10.1166/jctn.2019.7888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

VikramPhaneendra, S., Sreenivasulu T, and B. Jalaja Kumari. "Identifying Stable Network in Mobile Ad-Hoc Networks." International Journal of Computer Applications 43, no. 18 (April 30, 2012): 22–25. http://dx.doi.org/10.5120/6204-8761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bhumika, Gohil, Mukesh A. Zaveri, and Hemant Kumar Rath. "Trust Based Service Discovery in Mobile Ad-Hoc Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 308–13. http://dx.doi.org/10.7763/lnse.2015.v3.210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gandhi, V. Karamchand, and D. P. Jeyabalan D.P.Jeyabalan. "Classification of Attacks Against the Mobile AD Hoc Networks." International Journal of Scientific Research 2, no. 3 (June 1, 2012): 77–80. http://dx.doi.org/10.15373/22778179/mar2013/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

MOHAMMADI, HOSSEIN, EHSAN NEDAAEE OSKOEE, MOHSEN AFSHARCHI, NASSER YAZDANI, and MUHAMMAD SAHIMI. "A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS." International Journal of Modern Physics C 20, no. 12 (December 2009): 1871–902. http://dx.doi.org/10.1142/s0129183109014795.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are random, self-configurable and rapidly-deployable networks. The main goal of developing the MANETs is not only obtaining better service, but also having networks that can serve in situations in which no other means of communications can operate. Examples include networks that are used in battlefields, in search-and-rescue operations, and networks of sensors. We propose a percolation model for studying the properties of the MANETs. The model is based on a random network of sites, distributed in space, which represent the mobile nodes. Two nodes are linked if they are within each other's transmission ranges. A node may be lost or become inactive if, for example, it runs out of energy (provided by its batteries). A link can be lost if, for example, one of its two end nodes moves outside of the other's transmission range. Extensive Monte Carlo simulations are carried out to study the properties of the model. The network's topology is characterized by a critical transmission range, which is the analogue of the percolation threshold. It is shown that not only can the model take into account several important features of the real MANETs and explain them in physical terms, but also leads to the development of efficient protocols for self-configuration, adaptability, and disaster survival, which are of utmost importance to the practical applications.
APA, Harvard, Vancouver, ISO, and other styles
28

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Rong Xin, Chao Mei Zheng, and Ling Chai. "Study on Power-Aware Routing Mechanism in MANET." Applied Mechanics and Materials 263-266 (December 2012): 1100–1104. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1100.

Full text
Abstract:
A mobile ad hoc networks (MANET) is a group of mobile wireless nodes which communicate without any fixed networking infrastructure. The nodes in an ad hoc mobile network are typically powered by batteries with a limited energy supply. For MANETs, One of the most important and challenging issues is how to conserve energy, maximizing the network lifetime.Since routing is an essential function in these networks, developing power-aware routing protocols has been an intensive research area in recent years. As a result, many power-aware routing protocols have been proposed from a variety of perspectives. In this article,we propose and analyse the model of power consumption in ad hoc network, present different power-aware metrics base on power consumption and survey some power-aware routing protocols proposed for mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
30

Al-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, Mangal Sain, and Hoonjae Lee. "Moving Ad Hoc Networks—A Comparative Study." Sustainability 13, no. 11 (May 31, 2021): 6187. http://dx.doi.org/10.3390/su13116187.

Full text
Abstract:
An ad hoc network is a wireless mobile communication network composed of a group of mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is established temporarily. The mobile nodes of the network use their own wireless transceivers to exchange information; when the information is not within the communication range, other intermediate nodes can be used to relay to achieve communication. They can be widely used in environments that cannot be supported by wired networks or which require communication temporarily, such as military applications, sensor networks, rescue and disaster relief, and emergency response. In MANET, each node acts as a host and as a router, and the nodes are linked through wireless channels in the network. One of the scenarios of MANET is VANET; VANET is supported by several types of fixed infrastructure. Due to its limitations, this infrastructure can support some VANET services and provide fixed network access. FANET is a subset of VANET. SANET is one of the common types of ad hoc networks. This paper could serve as a guide and reference so that readers have a comprehensive and general understanding of wireless ad hoc networks and their routing protocols at a macro level with a lot of good, related papers for reference. However, this is the first paper that discusses the popular types of ad hoc networks along with comparisons and simulation tools for Ad Hoc Networks.
APA, Harvard, Vancouver, ISO, and other styles
31

Hussain, Khalid, Abdul Hanan Abdullah, Saleem Iqbal, Khalid M. Awan, and Faraz Ahsan. "Efficient Cluster Head Selection Algorithm for MANET." Journal of Computer Networks and Communications 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/723913.

Full text
Abstract:
In mobile ad hoc network (MANET) cluster head selection is considered a gigantic challenge. In wireless sensor network LEACH protocol can be used to select cluster head on the bases of energy, but it is still a dispute in mobil ad hoc networks and especially when nodes are itinerant. In this paper we proposed an efficient cluster head selection algorithm (ECHSA), for selection of the cluster head efficiently in Mobile ad hoc networks. We evaluate our proposed algorithm through simulation in OMNet++ as well as on test bed; we experience the result according to our assumption. For further evaluation we also compare our proposed protocol with several other protocols like LEACH-C and consequences show perfection.
APA, Harvard, Vancouver, ISO, and other styles
32

Oksiiuk, Oleksandr, and Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (March 3, 2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Full text
Abstract:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
APA, Harvard, Vancouver, ISO, and other styles
33

Cha, Hyun Jong, Jin Mook Kim, and Hwang Bin Ryou. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network." Applied Mechanics and Materials 224 (November 2012): 520–23. http://dx.doi.org/10.4028/www.scientific.net/amm.224.520.

Full text
Abstract:
A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.
APA, Harvard, Vancouver, ISO, and other styles
34

Elkabour, Ahmed, and Dr. Rahma Teirab Abaker Haroun. "Mitigating Routing Attacks in Mobile Ad Hoc Networks." International Journal for Innovation Education and Research 7, no. 7 (July 31, 2019): 227–33. http://dx.doi.org/10.31686/ijier.vol7.iss7.1603.

Full text
Abstract:
Abstract - Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry. Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.
APA, Harvard, Vancouver, ISO, and other styles
35

S.SivaNageswara Rao, Dr, Orchu Aruna, and Dr K.Lakshminadh. "Mobile ad hoc network integrated wireless networks: a survey." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 217. http://dx.doi.org/10.14419/ijet.v7i1.9.9827.

Full text
Abstract:
Now a day, every one using mobile devices for communicating with others. The development of new technologies, like Internet of Things (IoT) needs coverage, connectivity, scalability and QoS. In ubiquity networks, the major issues are coverage, connectivity, scalability and QoS. To solve these limitations, integrating wireless networks with ad hoc networks. This paper provides detail survey on how ad hoc networks are integrated with Cellular Network, Wireless Mesh Networks and Wireless Sensor Networks. This integration may resolve the problems of coverage, connectivity, scalability and QoS.
APA, Harvard, Vancouver, ISO, and other styles
36

Patel, Deepak Kumar, and Rakesh Kumar. "A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 495–508. http://dx.doi.org/10.24297/ijct.v4i2b2.3315.

Full text
Abstract:
A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through some routing protocol. But whenever any mobile node want to communicate a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes These Gateway nodes act as a bridge between the mobile ad hoc networks and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet.
APA, Harvard, Vancouver, ISO, and other styles
37

Xue, Qi, and Aura Ganz. "Ad hoc QoS on-demand routing (AQOR) in mobile ad hoc networks." Journal of Parallel and Distributed Computing 63, no. 2 (February 2003): 154–65. http://dx.doi.org/10.1016/s0743-7315(02)00061-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

An, Qi, Yong Jian Luo, Hai Yan Zhao, and Jing Zhao. "Research on Ad Hoc Network Security Protection Model Based on Mobile Agent." Applied Mechanics and Materials 644-650 (September 2014): 3008–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3008.

Full text
Abstract:
security objectives, and the commonly used Mobile Ad hoc networks security protection technology, and finally discusses the application of mobile Ad hoc network in the field, and their security policy are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
39

LI, He, KyoungSoo BOK, and JaeSoo YOO. "P2P Based Social Network over Mobile Ad-Hoc Networks." IEICE Transactions on Information and Systems E97.D, no. 3 (2014): 597–600. http://dx.doi.org/10.1587/transinf.e97.d.597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Voulgaris, Spyros, Matthew Dobson, and Maarten Van Steen. "Decentralized Network-Level Synchronization in Mobile Ad Hoc Networks." ACM Transactions on Sensor Networks 12, no. 1 (March 21, 2016): 1–42. http://dx.doi.org/10.1145/2880223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Sharma, Rohit, and Sangeeta Sharma. "Enhanced AODV for Mobile Ad-hoc Networks." International Journal of Computer Applications 69, no. 7 (May 17, 2013): 14–19. http://dx.doi.org/10.5120/11853-7615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ludeña-González, Patricia, Rommel Torres, Manuel Quiñónez, and Samanta Cueva. "Overhead impact on ad hoc mobile networks." Enfoque UTE 8, no. 4 (September 29, 2017): 16–26. http://dx.doi.org/10.29019/enfoqueute.v8n4.169.

Full text
Abstract:
Overhead quantifies how much routing and control information is necessary for the application data to reach the destination node. This is very important in Ad Hoc networks because the mobility of nodes makes routing paths change constantly, therefore, the exchange of control and routing information increases. In this work the overhead for AODV, BCHP and DSVD mobile routing protocols is analyzed. Protocol reliability is used like a metric based on overhead behavior. The results show that the overhead can be between 30% to 60% with respect to the total throughput. BCHP is the most effective protocol because with similar expected overhead it has a better level of application information delivered.
APA, Harvard, Vancouver, ISO, and other styles
43

Krzesinski, Anthony. "Robust Cooperation in Mobile Ad Hoc Networks." International Journal of Information, Communication Technology and Applications 1, no. 1 (March 9, 2015): 83–95. http://dx.doi.org/10.17972/ajicta2015114.

Full text
Abstract:
Consider a mobile ad hoc network where the nodes belong to different authorities. The nodes must be given incentives to spend their resources (battery power and transmission bandwidth) in forwarding packets that originate at nodes belonging to another authority. This can be done by assigning a credit balance to each node: when a node acts as an originating node it uses its credits to pay for the costs of sending its own traffic; when a node acts as a transit node it earns credits by forwarding traffic from other nodes.This paper presents a credit-based incentive scheme which assists nodes when they lack the credits necessary to transmit their data. An essential part of the credit-based scheme is a decentralised credit redistribution mechanism to destroy (create) credit at nodes that are over (under) supplied with credit.The goal of this paper is to investigate the effect of various fraudulent activities on the performance of the credit-based incentive scheme. We show that the credit-based scheme is inherently robust with respect to a number of fraudulent activities, provided the nodes behave in a rational manner. We show that credit redistribution is the main reason why the credit-based incentive scheme is relatively immune to fraud.
APA, Harvard, Vancouver, ISO, and other styles
44

Krzesinski, Anthony. "Promoting Cooperation in Mobile Ad Hoc Networks." International Journal of Information, Communication Technology and Applications 2, no. 1 (January 31, 2016): 24–46. http://dx.doi.org/10.17972/ijicta20162126.

Full text
Abstract:
Consider a mobile ad hoc network (MANET) where the nodes belong todifferent authorities. The nodes must be given incentives to spend theirresources (battery energy, transmission bandwidth, buffer space) inforwarding packets that originate at nodes belonging to anotherauthority. This can be done by assigning a credit balance to each node:when a node acts as an originating node it uses its credits to pay forthe costs of sending its own traffic; when a node acts as a transit nodeit earns credits by forwarding traffic from other nodes. This paperpresents a credit-based incentive scheme which assists nodes thatpersistently lack the credits necessary to transmit their data, andprotects nodes from using too large a proportion of their resources toforward traffic that originated from other nodes. We first present twobasic incentive schemes: the first scheme free-for-all does not regulatethe willingness of the nodes to forward packets on behalf of othernodes; the second scheme tit-for-tat contains such a regulatorymechanism. Next we present the origin pays and the destination paysprotocol which contain a decentralised credit redistribution mechanismto destroy (create) credit at over (under) provisioned nodes. Bothconstant and congestion-dependent resource prices are investigated.Congestion pricing is also used to reward (penalise) the destinationnode for receiving packets on under (over) utilised routes. Initialexperiments indicate that the origin pays protocol with congestionpricing offers a substantial improvement over the free-for-all protocolthat is currently used in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
45

Karlsson, Jonny, Laurence S. Dooley, and Göran Pulkkis. "Routing Security in Mobile Ad-hoc Networks." Issues in Informing Science and Information Technology 9 (2012): 369–83. http://dx.doi.org/10.28945/1628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Vegda, Hiral, and Nimesh Modi. "Review Paper on Mobile Ad-hoc Networks." International Journal of Computer Applications 179, no. 37 (April 18, 2018): 33–35. http://dx.doi.org/10.5120/ijca2018916859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Aldabbas, Hamza. "Data Confidentiality in Mobile Ad hoc Networks." International Journal of Wireless & Mobile Networks 4, no. 1 (February 29, 2012): 225–36. http://dx.doi.org/10.5121/ijwmn.2012.4117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jungeblut, T., M. Grünewald, M. Porrmann, and U. Rückert. "Realtime multiprocessor for mobile ad hoc networks." Advances in Radio Science 6 (May 26, 2008): 239–43. http://dx.doi.org/10.5194/ars-6-239-2008.

Full text
Abstract:
Abstract. This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC) for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC). The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.
APA, Harvard, Vancouver, ISO, and other styles
49

Alfawaer, Zeyad M., GuiWei Hua, and Noraziah Ahmed. "Routing Protocol for Mobile Ad Hoc Networks." American Journal of Applied Sciences 4, no. 5 (May 1, 2007): 333–38. http://dx.doi.org/10.3844/ajassp.2007.333.338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Baskar. "QUEUEING MODELS IN MOBILE AD-HOC NETWORKS." American Journal of Applied Sciences 11, no. 2 (February 1, 2014): 308–15. http://dx.doi.org/10.3844/ajassp.2014.308.315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography