• Title/Summary/Keyword: MANET

Search Result 600, Processing Time 0.031 seconds

A Routing Protocol for Improving Path Stability in Mobile Ad-hoc Networks (애드혹 네트워크에서 경로 안정성 향상을 위한 라우팅 프로토콜)

  • Kim, Hyungjik;Choi, Sunwoong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1561-1567
    • /
    • 2015
  • Nodes of Mobile ad-hoc network usually use the energy-limited battery. Balanced energy consumptionis important to maintain path's stability. In this paper, we focus on improving the stability of the routing path in mobile ad-hoc networks. For that purpose, we propose a new routing protocol to find the highest minimum node residual energy path among shortest paths. The largest path of minimum value of the remain energy has a longer life than other paths to improve the reliability to data-transmission. Using ns-3 simulator, we show that the proposed routing protocol can provide more long-life stable routing path than AODV and EA-AODV.

A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks

  • Imani, Mehdi;Joudaki, Majid;Arabnia, Hamid R.;Mazhari, Niloofar
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1436-1458
    • /
    • 2017
  • Quorum-based algorithms are widely used for solving several problems in mobile ad hoc networks (MANET) and wireless sensor networks (WSN). Several quorum-based protocols are proposed for multi-hop ad hoc networks that each one has its pros and cons. Quorum-based protocol (QEC or QPS) is the first study in the asynchronous sleep scheduling protocols. At the time, most of the proposed protocols were non-adaptive ones. But nowadays, adaptive quorum-based protocols have gained increasing attention, because we need protocols which can change their quorum size adaptively with network conditions. In this paper, we first introduce the most popular quorum systems and explain quorum system properties and its performance criteria. Then, we present a comparative and comprehensive survey of the non-adaptive and adaptive quorum-based protocols which are subsequently discussed in depth. We also present the comparison of different quorum systems in terms of the expected quorum overlap size (EQOS) and active ratio. Finally, we summarize the pros and cons of current adaptive and non-adaptive quorum-based protocols.

An Effective Emergency Message Delivery Mechanism for VANET (VANET에서의 효율적인 긴급 메시지 전송 기법)

  • Hwang, Jeong-Hee;Choe, Jong-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.86-94
    • /
    • 2012
  • VANETs can provide traffic warring service to help drivers drive safely based on the information of the traffic condition. The driver can drive safely through the warning service information provided by the VANET and know the traffic condition exactly more than through only the sight of driver. In this paper we suggest a new mechanism of updating the table to broadcast the message more rapidly based on the table driven method as the way of sending the emergency message in the VANETs. When updating the table, nodes sends only based on the message transmission success rate. In the result of simulation we could find that the suggested mechanism would reduce the delay time of the emergency message broadcast compared to the existing mechanism.

Efficient Network Structure Using UAV Squad In DTN (DTN에서 UAV 편대를 이용한 효율적인 네트워크 구조)

  • Dho, Yoon-hyung;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.907-909
    • /
    • 2016
  • In this peper, we proposed efficient network structure using UAV squad in DTN. In Delay Tolerant Network(DTN), the routing protocols adopting store-carry-forward method are used for solving network problem occurred by the unstable network environments. This routing method is useful for work in disaster and battle field so many researches are in progress. This paper is part of that, we use UAV squad in DTN which is dynamic environments for efficient network structure. Propsed measure use environment information in disparate sensor node and organize UAV squad for stable network.

  • PDF

On Hybrid Re-Broadcasting Techniques in Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Abbas, Fizza;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.610-613
    • /
    • 2013
  • Vehicular Ad Hoc NETwork (VANET), a subclass of Mobile Ah Hoc NETwork (MANET) has been a tech-buzz for the last couple of decades. VANET, yet not deployed, promises the ease, comfort, and safety to both drivers and passengers once deployed. The by far most important factor in successful VANET application is the data dissemination scheme. Such data includes scheduled beacons that contain whereabouts information of vehicles. In this paper, we aim at regularly broadcasted beacons and devise an algorithm to disseminate the beacon information up to a maximum distance and alleviate the broadcast storm problem at the same time. According to the proposed scheme, a vehicle before re-broadcasting a beacon, takes into account the current vehicular density in its neighborhood. The re-broadcasters are chosen away from the source of the beacon and among the candidate re-broadcasters, if the density in the neighborhood is high, then the candidate rebroadcaster re-broadcasts the beacon with high probability and with low probability, otherwise. We also performed thorough simulations of our algorithms and the results are sound according to the expectations.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

Routing Mechanism for Data Transmission QoS in Mobile Ad-hoc Network (무선 애드 혹 네트워크에서의 데이터 전송 QoS를 위한 라우팅 기법)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Shin, Hyo-Young;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1829-1836
    • /
    • 2009
  • A wireless Ad-hoc network is willing to send and receive data and for other nodes, and it is a temporal network where the nodes with mobility are automatically constituted. This network has been studied to construct networks in the state where there is no infrastructure. The limited nodes and its frequent moving in a wireless Ad-hoc network have resulted in frequent network disconnection. Therefore, the data transmission rate should be secured in a wireless Ad-hoc network. This study proposes the method to improve QoS of data transmission considering the mobility of nodes that respond to path searching by means of AOMDV routing protocol. By applying the suggested method, it is possible to raise the transmission rate by improving the reliability of transmission path.

A Heterogeneous-carrier Selectable Routing Scheme Based on Normalized Location and Transmission Characteristics (MCS-NLTC) for Multi-carrier MANETs at Sea (다중매체로 이루어진 해상 자율망에서 이종 매체 선택이 가능하고 정규화된 위치와 전송특성에 의한 라우팅)

  • Son, Joo-Young
    • Journal of Navigation and Port Research
    • /
    • v.38 no.4
    • /
    • pp.343-348
    • /
    • 2014
  • A routing scheme called MCS-NLTC using a self-configuration marine network model and the diversity and heterogeneity of broadband wireless access technologies is newly proposed. The MCS-NLTC algorithm selects optimal nodes and carriers for every hop in optimal routes based on not conventional hop counts but normalized distances to destination ships (location information of destination ships). Normalized transmission characteristics of applications and carriers are considered to get optimal routes as well. The location information enhances convergence speed to get destinations, which makes the route search time faster. Evaluated performances are compared with those of the schemes based on max-win (OMH-MW), and normalized transmission characteristics (MCS-NTC).

Improved cluster-based routing protocol using cluster header in Mobile ad hoc network (모바일 애드혹 네트워크에서 클러스터 헤드를 이용한 향상된 클러스터 기반 라우팅 프로토콜)

  • Kim, Chang-Jin;Kim, Wu-Woan;Jang, Sang-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.241-244
    • /
    • 2012
  • In mobile ad-hoc networks, it should be the most important issue to reduce the power consumption of communications, because the resource of a node is limited in these networks. In existing cluster-based routing protocols, cluster headers participate in almost all communication processes. Therefore the lifetime of the cluster header is shortened and it does not have the effective route. In the proposed cluster-based routing protocol, the cluster header transmits a control packet which gives the route information to member nodes. This makes that the cluster header decreases the number of participating in communications, and that node members do not have to communicate trough the cluster header. This results in extending the lifetime of the cluster header, and having the effective route, data transmission rate and improved stability of routes.

  • PDF