• Title/Summary/Keyword: Ad hoc routing protocols

Search Result 257, Processing Time 0.025 seconds

Virtual Cluster-based Routing Protocol for Mobile Ad-Hoc Networks (이동 Ad-hoc 네트워크를 위한 가상 클러스터 방식의 경로 설정 프로토콜)

  • 안창욱;강충구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.544-561
    • /
    • 2002
  • In this paper, we propose a new hybrid type of the routing protocol (Virtual Cluster-based Routing Protocol: VCRP) for mobile ad-hoc networks, based on a virtual cluster, which is defined as a narrow-sense network to exchange the basic information related to the routing among the adjacent nodes. This particular approach combines advantage of proactive routing protocol (PRP), which immediately provides the route collecting the network-wide topological and metric information, with that of reactive routing protocol, which relies on the route query packet to collect the route information on its way to the destination without exchanging any information between nodes. Furthermore, it also provides the back-up route as a byproduct, along with the optimal route, which leads to the VCBRP (Virtual Cluster-based Routing Protocol with Backup Route) establishing the alternative route immediately after a network topology is changed due to degradation of link quality and terminal mobility, Our simulation studies have shown that the proposed routing protocols are robust against dynamics of network topology while improving the performances of packet transfer delay, link failure ratio, and throughput over those of the existing routing protocols without much compromising the control overhead efficiency.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

Ship Ad-hoc Communication (SAC) Protocol for SANETs (선박용 애드혹 네트워크를 위한 Ship Ad-hoc Communication 프로토콜)

  • Yun, Chang-Ho;Kim, Seung-Gun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.906-912
    • /
    • 2012
  • A ship ad-hoc network (SANET) can provide ships with diverse multimedia services by replacing expensive satellite communications. While ITU-R M. 1842-1, standards for maritime VHF band digital communications, can be used as the specifications of physical layer for SANETs, no standards are specified for higher layers of SANETs. In this paper, we propose a ship ad-hoc communication (SAC) protocol for SANETs, based on medium access control (MAC) and routing protocols for terrestrial ad-hoc networks. SAC protocol is a cross-layer protocol which combines MAC and routing into one algorithm and considers maritime environments, including the existence of neighboring ships, the possibility of routing to a destination, and changing the communication mode in case of VHF channel failure.

Restricted Multi-path Flooding for Efficient Data Transmission in Wireless Sensor Networks (무선 센서 네트워크 상에서 효율적인 데이터 전송을 위한 제한된 다중경로 플러딩)

  • Cho Hyun-Tae;Baek Yun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.534-539
    • /
    • 2005
  • The key in wireless sensor networks, which consist of a number of sensor nodes, is an energy efficiency. Many routing protocols have been proposed for prolonging network lifetime and reducing traffic in wireless sensor networks. Wireless sensor networks usually use wireless ad-hoc network protocols for routing, but these protocols are not well-suited for wireless sensor networks due to many reasons. In this paper, RM-flooding protocol is proposed for reducing routing overhead occurred when packet flooding. The nodes using this routing protocol can consume the limited energy effectively, and exchange information with remote nodes usulg information receiving from multipath. So, RM-flooding prolongs the network's lifetime.

A re-route method for reliable data transport in Ad Hoc Networks (Ad Hoc 망에서 신뢰성 있는 데이터 전송을 위한 경로 재설정 기법)

  • 한정안;백종근;김병기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.276-287
    • /
    • 2004
  • An ad hoc network is infra(Base Sstation or Access Point) free wireless mobile communication technology. Mobile nodes function as routers and servers in ad hoc networks. Many routing protocols for ad hoc network have been proposed. If any route is broken owing to moving node, source must repair broken route again. But route repair technology after route collapses is not suitable to transmit real-time data packet for QoS guarantee. So this paper presents route repair technology that prevents route from breaking. If intermediate node moves to critical section, the node issues handoff packet and sends the packet to the next node. After next node receives handoff packet, the node broadcasts route request packet to the previous node for intermediate node. Finally, even if intermediate node moves out of the routing region, the source can continuously transmit data packets to the destination through the new path.

Performance Comparison of OLSR and AODV Routing Protocols Using OPNET (OPNET을 이용한 OLSR과 AODV 라우팅 프로토콜 성능 비교)

  • Wang, Ye;Zhang, Xiao-Lei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.9-17
    • /
    • 2009
  • A Mobile Ad hoc network(MANET) is a network consisting of a set of wireless mobile nodes, which communicate with each other without centralized control or established infrastructure. In this paper, to obtain a better understanding of AODV(Ad hoc On-Demand Distance Vector Routing Protocol)and OLSR(Optimized Link State Routing Protocol) routing protocols, different performances are simulated and analyzed using OPNET modeler 14.5 with the various performance metrics, such as packet delivery ratio, end-to-end delay and routing overhead. As a conclusion, in static analysis, the routing overhead of OLSR is affected by the number of nodes, but not data traffic. In AODV case, it is affected by both data traffic and number of nodes. In mobility analysis, routing overhead is not greatly affected by mobility speed in AODV and OLSR, and the PDR(Packet Delivery Ration) of OLSR is decreased as the node speed increased, while AODV is not changed. AS to delay, AODV is always higher than OLSR in both static and nobility cases.

  • PDF

An Improvement of Routing Performance in Ad Hoc Networks (애드혹 네트워크에서의 라우팅 성능 개선)

  • Park, No-Yeul;Kim, Chang-Hwa;Kim, Sang-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.79-86
    • /
    • 2006
  • This paper proposes a new protocol to enhance the routing performance and applies our proposal to AODV (Ad hoc On-demand Distance Vector routing) protocol, which is a typical on-demand routing protocol in MANET. In general, when a route repair procedure is performed due to the transfer or failure of a node, the source node re-initiate a route discovery procedure in most routing protocols of MANET. This causes to increase the control traffic overhead largely and degrade the routing performance. The main idea of our study is to provide a methodology that can minimize the control traffic overhead and enhance the performance by initiating a route repair procedure at destination node and utilizing the previous routing information maximumly. To evaluate the performance of the our mechanism, we have performed a series of simulations. The simulations include comparisons with AODV and AODV with local repair. The simulations have been executed under simulation environments taking into account mobility speed and network site. The simulation results show that our proposal overall outperforms the existing protocols.

  • PDF

Routing Based on Ad Hoc Link Reliability (애드 혹 링크 신뢰도(Reliability) 기반 라우팅 기법)

  • Shin, Kwon-Seung;Chung, Min-Young;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.175-183
    • /
    • 2006
  • An ad-hoc network is a group of mobile nodes acting as routers. The of hoc node has a precondition of mobility, allowing path to be easily disconnected when transmitting data, thereby increasing network overhead. However, most of hoc routing protocols set up the path based only on the number of hops without considering other practical factors. Here we consider a path with the least substantial number of transmission (SNT) from source to destination based on reliabilities of links. This includes retransmissions due to unreliable links. In this paper, an efficient ad-hoc link reliability based routing (PU) protocol suitable for mobile ah-hoc network in terms of SNT, is proposed. The network overhead and data transmission delay ore reduced, by considering both ad-hoc link reliability and the number of hops. Our empirical performance evaluation comparing to AODV (8) shows that the enhancement is up to about 31% for SNT depending upon the mobility of nodes.

  • PDF

A Reservation-based QoS Routing Protocol for Mobile Ad-Hoc Networks (이동 애드혹 네트워크를 위한 예약 기반의 QoS 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.805-810
    • /
    • 2005
  • According to the user requirements for continuous and real-time multimedia information, the concept of Quality of Service (QoS) has emerged as a main issue in mobile ad-hoc networks. QoS routing is to find the route that meets the QoS requirements of the users. In this paper, we propose a routing protocol that is based on AODV over TDMA, one of the typical routing protocols for mobile ad-hoc networks, by making a bandwidth reservation for QoS guarantee. While the existing schemes calculate the maximum available bandwidth for each candidate path, our scheme is to check only if the bandwidth of a given path satisfies the end-to-end QoS requirement and then to make a reservation by allocating time slots efficiently in the wireless environment. In order to evaluate the performance of the proposed QoS routing protocol, some simulations are carried out in the ad-hoc environment.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.