• Title/Summary/Keyword: Manet

Search Result 603, Processing Time 0.033 seconds

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.

Performance Enhancement of AODV Routing Protocol Based on Interrupt Message and Backup Path Strategy in MANET (MANET환경에서 Interrupt Message와 Backup path 기법에 기반한 AODV의 성능개선)

  • Lee, Yun-kyung;Kim, Ju-gyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1313-1329
    • /
    • 2015
  • In MANET, frequent route breaks lead to repeated route discovery process and this increases control packet overhead and packet drop. AODV-I improves performance of AODV by using the event driven approach which removes periodic Hello message. Unlike the Hello message, Interrupt message which is sent for each event can detect and predict the link failure because it allows node to know the status of the neighbor node. From this characteristics of Interrupt message, performance of AODV-I can be further improved by adding a processing procedures for each type of Interrupt message and it is also possible to improve AODV-I by adding the Backup path scheme because it originally has problems due to a single path of AODV. In this paper, we propose AODV-IB that combines improved Backup path scheme and Interrupt message approach of AODV-I in order to reduce transmission delay and the number of route discoveries. AODV-IB improves AODV-I by adding proper processing procedures for the link failure prediction and detection for each Interrupt message. We also implement improved Backup path strategy in AODV-IB by minimizing delay without additional Control packet. Simulation results, using the simulator QualNet 5.0, indicate that proposed AODV-IB performs better than AODV-I.

An Efficient Group Key Distribution Mechanism for the Secure Multicast Communication in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 안전한 멀티캐스트 통신을 위한 효율적인 그룹 키 분배 방식)

  • Lim Yu-Jin;Ahn Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.339-344
    • /
    • 2006
  • Secure delivery of multicast data can be achieved with the use of a group key for data encryption in mobile ad hoc network (MANET) applications based on the group communication. However, for the support of dynamic group membership, the group key has to be updated for each member joining/leaving and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not desirable for the small-sized MANET environment. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach in the small-sized MANET environment. PROMPT reduces the message overhead of the naive through the first-hop grouping from a source node and the last-hop grouping from proxy nodes using the characteristics of a wireless channel.

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks

  • Kim, Kap-Dong;Lee, Kwang-Il;Park, Jun-Hee;Kim, Sang-Ha
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.1-7
    • /
    • 2007
  • In mobile ad hoc networks, an application scenario requires mostly collaborative mobility behavior. The key problem of those applications is scalability with regard to the number of multicast members as well as the number of the multicast group. To enhance scalability with group mobility, we have proposed a multicast protocol based on a new framework for hierarchical multicasting that is suitable for the group mobility model in MANET. The key design goal of this protocol is to solve the problem of reflecting the node's mobility in the overlay multicast tree, the efficient data delivery within the sub-group with group mobility support, and the scalability problem for the large multicast group size. The results obtained through simulations show that our approach supports scalability and efficient data transmission utilizing the characteristic of group mobility.

Design of Covered Rout ing Protocol using Super Increasing Sequence and Knapsack Algorithm in MANET (초증가 수열과 Knapsack 알고리즘을 이용한 MANET에서의 은닉 라우팅 프로토콜 설계)

  • Choun Junho;Park Jaesung;Lee Sanghun;Jang Kun-Won;Jun Munseog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.67-69
    • /
    • 2005
  • 현재까지의 보안 라우팅 프로토콜은 유무선에 관계 없이 페이로드 부분은 암호화가 되더라도 패킷 헤더의 내용이 평문 형태로 무방비하게 노출되며 라우팅 경로가 안전하게 보장되더라도 악의적인 노드에게 경로가 알려지는 것을 차단 할 수 없다. 또한 유선 환경과는 달리 Ad-hoc 네트워크와 같은 무선 상황에서는 전파의 전방향성 때문에 송수신 범위 내에 있는 노드들이 평문 형태의 라우팅 정보 및 송수신 노드의 정보를 수집하는 것을 방지 할 수 없다. 본 논문에서 제안하는 은닉 라우팅 프로토콜은 한쌍의 노드가 비대칭키 암호화 알고리즘을 통해 공유한 초증가 수열을 통해 송수신 노드를 은닉하면서도 정당한 수신 노드만 자신이 수신 노드임을 알 수 있는 기법을 제공함으로서 악의적인 노드가 라우팅 경로에 대한 정보를 수집하는 것을 원천적으로 차단한다.

  • PDF

Mobile Agent based Dynamic Clustering scheme in MANET (MANET 환경에서의 이동 에이전트를 이용한 동적 클러스터링 기법)

  • Lim Won-tack;Kim Gu Su;Sun Seung Sang;Eom Young Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.313-315
    • /
    • 2005
  • 본 논문은 이동 애드혹 네트워크에서 이동 에이전트를 이용하여 동적으로 클러스터링을 구성하는 기법에 관한 것이다. 기존에 제안된 이동 애드혹 네트워크에서의 클러스터링 기법은 클러스터의 크기가 고정되어 있기 때문에 네트워크의 상태나 노드들의 이동성에 따라 클러스터 재구성의 오버헤드가 발생하였다. 본 제안 기법에서는 네트워크의 상태에 따라 클러스터 크기의 최대 임계치와 최소 임계치를 설정하고 이에 따라 이동 에이전트를 이용하여 클러스터를 병합 흑은 분할하면서 클러스터의 크기를 임계치 내에서 일정하게 유지시킴으로써, 클러스터 재구성의 오버헤드라 클러스터 내부의 경로 탐색의 오버헤드를 줄일 수 있다.

  • PDF

Enhancement of Route Recovery Algorithms in Mobile Ad hoc Networks (모바일 에드학 망에서의 경로 장애복구 알고리즘 개선)

  • Park No-Yeol;Kim Sang-Kyung;Kim Chang-Hwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.142-144
    • /
    • 2006
  • MANET(Mobile Ad hoc Network)은 기지국(Base Station)이나 AP(Access Point)와 같은 고정된 네트워크 인프라의 도움 없이 임시망을 구성하는 무선 단말 노드들의 집합이다. MANET의 단말들은 단말로서의 데이터 전송 역할 뿐만 아니라 라우터, 서버로서의 역할도 동시에 수행 하여야 한다. 또한 노드의 이동 패턴, 링크 품질, 잔존 배터리의 양 등에 따라 네트워크 토폴로지가 변할 수 있으므로, 모바일 노드들 간의 통신을 위한 경로 설정과 유지가 매우 어렵다. 따라서 효과적으로 모바일 노드 간에 경로를 설정하고 유지하기 위한 라우팅 프로토콜에 대한 많은 연구가 이루어지고 있다. 본 논문에서는 대표적인 On-demand 방식인 AODV 프로토콜을 개선하여 목적지 노드에서 경로 복구 절차를 시작함으로써 기존 설정된 경로를 최대한 이용하여 경로복구 과정에서 제어 트래픽 오버헤드 및 데이터 패킷의 손실을 최소화하기 위한 라우팅 프로토콜을 제안한다.

  • PDF