• 제목/요약/키워드: MANETs

검색결과 156건 처리시간 0.016초

Performance Comparison of MISP-based MANET Strong DAD Protocol

  • Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권9호
    • /
    • pp.3449-3467
    • /
    • 2015
  • A broadcast operation is the fundamental transmission technique in mobile ad-hoc networks (MANETs). Because a broadcast operation can cause a broadcast storm, only selected forwarding nodes have the right to rebroadcast a broadcast message among the one-hop and two-hop neighboring nodes of a sender. This paper proposes the maximum intersection self-pruning (MISP) algorithm to minimize broadcasting redundancy. Herein, an example is given to help describe the main concept of MISP and upper bounds of forward node have been derived based on induction. A simulation conducted demonstrated that when conventional blind flooding (BF), self-pruning (SP), an optimized link state routing (OLSR) multipoint relay (MPR) set, and dominant pruning (DP), are replaced with the MISP in executing Strong duplicate address detection (DAD), the performances in terms of the energy consumption, upper bounds of the number of forward nodes, and message complexity have been improved. In addition, to evaluate the performance in reference to the link error probability, Pe, an enhancement was achieved by computing a proposed retransmission limit, S, for error recovery based on this probability. Retransmission limit control is critical for efficient energy consumption of MANET nodes operating with limited portable energy where Strong DAD reacts differently to link errors based on the operational procedures.

Road Aware Information Sharing in VANETs

  • Song, Wang-Cheol;Rehman, Shafqat Ur;Awan, Muhammad Bilal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권9호
    • /
    • pp.3377-3395
    • /
    • 2015
  • Recently, several approaches to share road conditions and/or digital contents through VANETs have been proposed, and such approaches have generally considered the radial distance from the information source as well as the TTL to provision an ephemeral, geographically-limited information sharing service. However, they implement general MANETs and have not been tailored to the constrained movement of vehicles on roads that are mostly linear. In this paper, we propose a novel application-level mechanism that can be used to share road conditions, including accidents, detours and congestion, through a VANET. We assign probabilities to roads around each of the intersections in the neighborhood road network. We then use the graph representation of the road network to build a spanning tree of roads with the information source as the root node. Nodes below the root represent junctions, and the edges represent inter-connecting road segments. Messages propagate along the branches of the tree, and as the information propagates down the branches, the probability of replication decreases. The information is replicated until a threshold probability has been reached, and our method also ensures that messages are not delivered to irrelevant vehicles, independently of their proximity to the source. We evaluated the success rate and performance of this approach using NS-3 simulations, and we used IDM car following and MOBIL lane change models to provide realistic modeling of the vehicle mobility.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

Efficient routing in multicast mesh by using forwarding nodes and weighted cost function

  • Vyas, Kapila;Khuteta, Ajay;Chaturvedi, Amit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.5928-5947
    • /
    • 2019
  • Multicast Mesh based Mobile Ad-hoc NETworks (MANETs) provide efficient data transmission in energy restraint areas without a fixed infrastructure. In this paper, the authors present an improved version of protocol SLIMMER developed by them earlier, and name it SLIMMER-SN. Most mesh-based protocols suffer from redundancy; however, the proposed protocol controls redundancy through the concept of forwarding nodes. The proposed protocol uses remaining energy of a node to decide its energy efficiency. For measuring stability, a new metric called Stability of Node (SN) has been introduced which depends on transmission range, node density and node velocity. For data transfer, a weighted cost function selects the most energy efficient nodes / most stable nodes or a weighted combination of both. This makes the node selection criteria more dynamic. The protocol works in two steps: (1) calculating SN and (2) using SN value in the weighted cost function for selection of nodes. The study compared the proposed protocol, with other mesh-based protocols PUMA and SLIMMER, based on packet delivery ratio (PDR), throughput, end-to-end delay and average energy consumption under different simulation conditions. Results clearly demonstrate that SLIMMER-SN outperformed both PUMA and SLIMMER.

Routing Protocols for VANETs: An Approach based on Genetic Algorithms

  • Wille, Emilio C. G.;Del Monego, Hermes I.;Coutinho, Bruno V.;Basilio, Giovanna G.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.542-558
    • /
    • 2016
  • Vehicular Ad Hoc Networks (VANETs) are self-configuring networks where the nodes are vehicles equipped with wireless communication technologies. In such networks, limitation of signal coverage and fast topology changes impose difficulties to the proper functioning of the routing protocols. Traditional Mobile Ad Hoc Networks (MANET) routing protocols lose their performance, when communicating between vehicles, compromising information exchange. Obviously, most applications critically rely on routing protocols. Thus, in this work, we propose a methodology for investigating the performance of well-established protocols for MANETs in the VANET arena and, at the same time, we introduce a routing protocol, called Genetic Network Protocol (G-NET). It is based in part on Dynamic Source Routing Protocol (DSR) and on the use of Genetic Algorithms (GAs) for maintenance and route optimization. As G-NET update routes periodically, this work investigates its performance compared to DSR and Ad Hoc on demand Distance Vector (AODV). For more realistic simulation of vehicle movement in urban environments, an analysis was performed by using the VanetMobiSim mobility generator and the Network Simulator (NS-3). Experiments were conducted with different number of vehicles and the results show that, despite the increased routing overhead with respect to DSR, G-NET is better than AODV and provides comparable data delivery rate to the other protocols in the analyzed scenarios.

Energy Efficient and Secure Multipoint Relay Selection in Mobile Ad hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1571-1589
    • /
    • 2016
  • Nodes in MANETs are battery powered which makes energy an invaluable resource. In OLSR, MPRs are special nodes that are selected by other nodes to relay their data/control traffic which may lead to high energy consumption of MPR nodes. Therefore, employing energy efficient MPR selection mechanism is imperative to ensure prolonged network lifetime. However, misbehaving MPR nodes tend to preserve their energy by dropping packets of other nodes instead of forwarding them. This leads to huge energy loss and performance degradation of existing energy efficient MPR selection schemes. This paper proposes an energy efficient secure MPR selection (ES-MPR) technique that takes into account both energy and security metrics for MPR selection. It introduces the concept of 'Composite Eligibility Index' (CEI) to examine the eligibility of a node for being selected as an MPR. CEI is used in conjunction with willingness to provide distinct selection parameters for Flooding and Routing MPRs. Simulation studies reveal the efficiency of ES-MPR in selection of energy efficient secure and stable MPRs, in turn, prolonging the network operational lifetime.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • 박요한;박영호;문상재
    • 한국산업정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

이동 애드-혹 망을 위한 클러스터 기반 퍼지 협력 캐싱 방법의 설계 및 평가 (Design and evaluation of a cluster-based fuzzy cooperative caching method for MANETs)

  • 이은주;배인한
    • Journal of the Korean Data and Information Science Society
    • /
    • 제22권2호
    • /
    • pp.269-285
    • /
    • 2011
  • 이동 애드-혹 망에서 자주 액세스되는 데이터의 캐싱은 데이터 액세스 성능 및 가용성을 향상시킬 수 있는 잠재적 기술이다. 다수의 클라이언트들 간의 캐시된 데이터의 공유와 협동을 허용하는 협력 캐싱은 캐싱 기술의 잠재력을 더 향상시킬 수 있다. 이 논문에서, 우리는 이동 애드-혹 망을 위한 클러스터 기반 퍼지 협력 캐싱 방법을 제안한다. 그리고 제안된 방법의 성능은 분석적 모델을 통해 평가하고, 그것의 성능을 다른 모바일 협력 캐싱 방법과 비교한다.

MANET에서 군집지능을 이용한 라우팅 방안 (A Routing Method Using Swarm Intelligence in MANETs)

  • 우미애;;노우종
    • 한국통신학회논문지
    • /
    • 제33권7B호
    • /
    • pp.550-556
    • /
    • 2008
  • 군집지능은 단순한 객체들이 팀을 이루어 간단, 단순한 행동을 조합하여 복잡하고 의미 있는 과제를 수행하는 것을 말한다. 네트워크 라우팅 분야에서도 이러한 군집지능을 이용한 연구가 수행되어 왔다. 특히 동적 토폴로지에서 지역적 정보를 이용한 경로 설정이 필요한 이동 애드혹 네트워크 (mobile ad-hoc network: MANET)에서의 라우팅은 군집지능의 한 응용분야로 알려져 있다. 본 논문에서는 MANET에서 개미의 군집지능을 이용한 라우팅 방안을 제안한다. 제안 방안은 효율적인 개미 관리를 통하여 오버헤드를 줄이고, 경로 설정시간을 단축하는 것을 목표로 설정하였다. 모의실험 결과, 제안 방안은 패킷 전송율의 성능은 유지하면서 경로 설정시간, 종단간 지연, 오버헤드에서는 향상된 성능을 보여주었다.

Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구 (A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network)

  • 최영민;성보현;윤종택;김영호
    • 한국군사과학기술학회지
    • /
    • 제15권5호
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.