• Title/Summary/Keyword: MANETs

Search Result 156, Processing Time 0.03 seconds

Transmission Performance of Large Scale MANETs with IDS (IDS가 있는 대규모 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.642-645
    • /
    • 2012
  • MANET has disadvantage for information intrusion caused from non-infra structure. That is based on mixed problems caused from terminal devices has no capability of various resources using abilities to run intrusion prevention function, and also from difficulty of no easy using infra structural server like as firewall. In this paper, transmission performances, be effected from information intrusion and IDS(Intrusion Detection System), are analyzed for large scale MANET, and weakness from information intrusion of MANET are studied. This study is for large scale MANET which has some large communication area and lots of nodes, voice traffic, based on VoIP protocols, is considered as application services be transmitted over MANETs. Computer simulation using NS-2 is used to measure and show MOS and call connection ratios.

  • PDF

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning;Hua Kien A.;Liu, Danzhou
    • Journal of Communications and Networks
    • /
    • v.9 no.1
    • /
    • pp.56-66
    • /
    • 2007
  • Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

Stable and Efficient Distributed Cluster-based Routing Protocol for MANETs (MANETs 에서 안정적이고 효율적인 통신을 위한 클러스터 기반 분산 라우팅 프로토콜)

  • Jang, Joon-Hyouk;Jung, Jin-Man;Min, Hong;Cho, Yoo-Kun;Gim, Bong-Chan;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.272-277
    • /
    • 2010
  • 기존의 클러스터 기반 라우팅 프로토콜들은 클러스터 외부와의 통신을 클러스터 헤드가 전담함으로써 통신 경로의 구성을 단순화하고 클러스터 헤드를 통한 데이터 통신을 가능하게 하였다. 하지만 매 라운드마다 클러스터 헤드의 재선출(re-electioin) 및 클러스터의 재구성(re-clustering)에 드는 비용을 감수해야 한다. 본 논문에서는 클러스터 헤드없이 완전히 분산된 방식으로 클러스터를 구성하여 클러스터 헤드의 재선출 및 클러스터 재구성의 비용을 줄이고, 안정적인 클러스터 구조를 바탕으로 노드 간의 P2P 통신을 지원하는 라우팅 프로토콜(Distributed Cluster-based Routing Protocol, DCRP)을 제안한다. 제안 기법은 각각의 노드가 이웃 노드와의 연결 상태를 감지하여 독립적으로 자신의 상태를 변화시킴으로써 클러스터를 구성한다. 특정 클러스터를 지나는 경로는 완전히 해당 클러스터 내의 노드들의 책임 하에서 관리되기 때문에 에너지 소모를 효율적으로 관리하고 네트워크의 크기에 따른 확장성을 보장할 수 있다. 제안 기법은 시뮬레이션을 통해 기존 기법에 비해 네트워크 구조(topology)의 안정성이 향상되고 제어 메시지의 교환과 경로 설정에 소모되는 비용이 크게 줄었음을 확인하였다.

  • PDF

An Effective Resource Discovery in Mobile Ad-hoc Network for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 이동 애드혹 네트워크의 효율적인 리소스 발견 기법)

  • Noh Dong-Geon;Shin Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.666-676
    • /
    • 2006
  • Rapid advances in ubiquitous computing and its pervasive influence over our society demand an efficient way to locate resources over the network. In mobile ad-hoc networks (MANETs) which is a special type of the sub-networks in ubiquitous environment, effective resource discovery is particularly important, due to their dynamics and the resource constraints on wireless nodes. In this paper, we propose an adaptive and efficient resource discovery strategy for MANETs. Our strategy also provides a solution to bridge different types of networks which coexist in ubiquitous environment.

Trust Predicated Routing Framework with Optimized Cluster Head Selection using Cuckoo Search Algorithm for MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.115-125
    • /
    • 2015
  • This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing Framework with an optimized cluster head selection. The clustering technique designed in this framework leads to efficient routing in MANETs. The heavy work load in the node causes an energy drop in cluster head, which leads to re-clustering of the group, and another cluster head is selected to avoid packet loss during data transmission. The problem in the re-clustering process is that the overall efficiency of the routing process is reduced and the processing time is increased. A Cuckoo search based optimization algorithm is proposed to solve the problem of re-clustering by selecting the secondary cluster head within the initially formed cluster group and eliminating the reclustering process. The proposed framework enables a node to select a reliable and secure route for MANET and the performance can be evaluated by comparing the simulated results with the AODV routing protocol, which shows that the performance of the proposed routing protocol are improved significantly.

An Enhanced Robust Routing Protocol in AODV over MANETs (MANETs의 AODV기반 향상된 견고한 라우팅 프로토콜)

  • Kim, Kwan-Woong;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.1
    • /
    • pp.14-19
    • /
    • 2009
  • In Mobile Ad-hoc Network, link failure and packet loss may occur frequently due to its nature of mobility and limited battery life. In this paper, an enhanced robust routing protocol based on AODV(Ad hoc On-demand Distance Vector routing) by monitoring variation of receiving signal strength is proposed. New metric function that consists of node mobility and hops of path is used for routing decision. For preventing route failure by node movement during data transmission, a new route maintenance is presented. If the node movement is detected, the routing agent switches local path to its neighbor node. Simulation results show that the performance of the proposed routing scheme is superior to previous AODV protocol.

  • PDF

FADA: A fuzzy anomaly detection algorithm for MANETs (모바일 애드-혹 망을 위한 퍼지 비정상 행위 탐지 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.6
    • /
    • pp.1125-1136
    • /
    • 2010
  • Lately there exist increasing demands for online abnormality monitoring over trajectory stream, which are obtained from moving object tracking devices. This problem is challenging due to the requirement of high speed data processing within limited space cost. In this paper, we present a FADA (Fuzzy Anomaly Detection Algorithm) which constructs normal profile by computing mobility feature information from the GPS (Global Positioning System) logs of mobile devices in MANETs (Mobile Ad-hoc Networks), computes a fuzzy dissimilarity between the current mobility feature information of the mobile device and the mobility feature information in the normal profile, and detects effectively the anomaly behaviors of mobile devices on the basis of the computed fuzzy dissimilarity. The performance of proposed FADA is evaluated through simulation.

IPv6 Autoconfiguration for Hierarchical MANETs with Efficient Leader Election Algorithm

  • Bouk, Safdar Hussain;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.248-260
    • /
    • 2009
  • To connect a mobile ad hoc network (MANET) with an IP network and to carryout communication, ad hoc network node needs to be configured with unique IP adress. Dynamic host configuration protocol (DHCP) server autoconfigure nodes in wired networks. However, this cannot be applied to ad hoc network without introducing some changes in auto configuration mechanism, due to intrinsic properties (i.e., multi-hop, dynamic, and distributed nature) of the network. In this paper, we propose a scalable autoconfiguration scheme for MANETs with hierarchical topology consisting of leader and member nodes, by considering the global Internet connectivity with minimum overhead. In our proposed scheme, a joining node selects one of the pre-configured nodes for its duplicate address detection (DAD) operation. We reduce overhead and make our scheme scalable by eliminating the broadcast of DAD messages in the network. We also propose the group leader election algorithm, which takes into account the resources, density, and position information of a node to select a new leader. Our simulation results show that our proposed scheme is effective to reduce the overhead and is scalable. Also, it is shown that the proposed scheme provides an efficient method to heal the network after partitioning and merging by enhancing the role of bordering nodes in the group.

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

  • Sharma, Bharti;Bhatia, Ravinder Singh;Singh, Awadhesh Kumar
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.36-54
    • /
    • 2014
  • Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intra-cluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.

Design of VoIP System over MANET (MANET 기반 VoIP 시스템 설계)

  • Li, Ming;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.719-721
    • /
    • 2010
  • VoIP over MANET is an important IP phone technique used in mobile ad-hoc networks. VoIP system over wired networks is based on SIP, SIP UA and SIP server which process the users invite, register and so on. Since no base stations in MANETs to perform as SIP servers, VoIP service on MANETs is being done with tiny SIP server which is done on each node. In this paper, VoIP system is implemented with pseudo SIP server which can process 1 call based on modification of standard SIP server which is used on communication environment such as wired networks. The propesed system is performed well and compatible with SIP and SIP UA.

  • PDF