• Title/Summary/Keyword: Mobile ad hoc networks

Search Result 700, Processing Time 0.028 seconds

Reactive Routing Keyword based Routing Procedure in MANET (MANET에서의 Reactive Routing Keyword 기반 라우팅 프로시듀어)

  • Park Soo-Hyun;Shin Soo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.4
    • /
    • pp.55-69
    • /
    • 2004
  • In MANET(Mobile Ad-hoc Network), unlike in wired networks, a path configuration should be in advance of data transmission along a routing path. Frequent movement of mobile nodes, however, makes it difficult to maintain the configured path and requires re-configuration of the path very often. It may also leads to serious problems such as deterioration of QoS in mobile ad-hoc networks. In this paper, we proposed a Reactive Routing Keyword (RRK) routing procedure to solve those problems. Firstly, we noticed it is possible in RRK routing to assign multiple routing paths to the destination node. We applied this feature into active networks and SNMP information based routing by storing unique keywords in cache of mobile nodes corresponding to present and candidate routings in a path configuration procedure. It was shown that the deterioration of QoS which may observed in Dynamic Source Routing(DSR) protocol was greatly mitigated by using the proposed routing technique.

  • PDF

A Secure Intrusion Detection System for Mobile Ad Hoc Network (모바일 Ad Hoc 네트워크를 위한 안전한 침입 탐지 시스템)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo;Lee, Seong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.87-94
    • /
    • 2009
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies are dynamic, lack centralization and are vulnerable to attacks. Detection of malicious nodes in an open ad-hoc network in which participating nodes do not have previous security association has to face number of challenges which is described in this paper. This paper is about determining the malicious nodes under critical conditions in the mobile ad-hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

A Study of Efficiency Distributed routing path using LTD(Load Tolerance Density-distribution) in Mobile Ad-hoc Networks (모바일 애드 혹 네트워크에서 LTD(Load Tolerance Density-distribution)를 이용한 효율적인 분산경로에 관한 연구)

  • Oh, Dong-kuen;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.105-107
    • /
    • 2015
  • In this paper, we proposed LTD(Load Tolerance Density-distribution) algorithm using dynamic density for analyzing distribute routing path. MANET(Mobile Ad-hoc Networks) consists of the node that has a mobility. By the Mobility, the topology is exchanged frequently. To reduce the exchange of topology, the hierarchy network is studied. However, if the load is concentrated at the cluster head node, the communication is disconnected. the proposed algorithm measure the dynamic density of the node using poisson distribution. And this algorithm provides distribute routing path using dynamic density. The simulation results, the proposed algorithm shows improved packet delivery ratio than the compared algorithm.

  • PDF

A Reservation-based MAC Protocol for QoS Support in Mobile Ad-Hoc Networks (이동 애드혹 망에서 QoS 지원을 위한 예약 기반의 MAC 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.866-871
    • /
    • 2006
  • This paper presents the design of a reservation-based MAC protocol to support multimedia traffic over mobile ad-hoc networks and evaluates its performance. Our MAC protocol is based on a hierarchical approach consisting of two sub-layers. The lower sub-layer of the MAC protocol with reservation provides a fundamental access method using CSMA/CA in order to support asynchronous data traffic over mobile ad-hoc networks. The upper sub-layer supports real-time periodic data by making a slot reservation before transmitting actual data. The proposed protocol has been validated through simulations using ns-2. The results show that the proposed MAC protocol can offer higher throughput and lower delay than standard implementations of the IEEE 802.11.

An Enhanced Routing Protocol for Support Mobility in Mobile Ad hoc Networks (이동 ad hoc 네트워크의 이동성을 지원하기 위한 향상된 라우팅 프로토콜)

  • Kim, Kwan-Woong;Kim, Dae-Ik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.131-138
    • /
    • 2008
  • Mobile Ad hoc NETworks (MANETs) refer to autonomous networks in which wireless data communications are established between multiple nodes in a given coverage area without a base station or centralized administration. Because of node mobility and limited battery life, the network topology may changes frequently. Selecting the most reliable path during route discovery process is important to improve performance in ad hoc networks. In this paper, an enhanced routing protocol based on AODV(Ad hoc On-demand Distance Vector routing) by monitoring variation of receiving signal strength is proposed. New metric function that consists of node mobility and hops of path is used for routing decision. For preventing route failure by node movement during data transmission, a new route maintenance named as LRC (Local Route Change) is presented. If the node movement is detected, the routing agent switches path to its neighbor node in LRC. Simulation results show that the performance of the proposed routing scheme is superior to previous AODY protocol.

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.

Analysis of Power-Saving Protocols for Multi-hop Ad Hoc Networks (다중 홉 Ad Hoc 망에서 Power-Saving 프로토콜의 성능분석)

  • 김동현;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.203-207
    • /
    • 2003
  • Mobile Ad Hoc Network is a kind of network technology, that mobile hosts can compose networks freely and temporarily where the base networks don't exist and where its establishment is difficult or as occasion demands. Ubiquitous computer network is prograssing in the forms of miniaturization, lightweight or portability. So far, MANET was studied in the point how to route it efficiently, but its power saving problems are been issuing nowadays. We try to not only compare and analyze power saving protocols in multi-hop Ad Hoc network but also present their efficiencies in this thesis.

  • PDF

Ad-Hoc Behavior in Opportunistic Radio

  • Mumtaz, Shahid;Marques, Paulo;Gameiro, Atilio;Rodriguez, Jonathan
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.187-195
    • /
    • 2009
  • The application of mathematical analysis to the study of wireless ad hoc networks has met with limited success due to the complexity of mobility, traffic models and the dynamic topology. A scenario based universal mobile telecommunications system (UMTS) time division duplex (TDD) opportunistic cellular system with an ad hoc behaviour that operates over UMTS frequency division duplex (FDD) licensed cellular network is considered. In this paper, we present a new routing metric which overall improves system performance in terms of interference and routing which operate in an ad hoc network in an opportunistic manner. Therefore we develop a simulation tool that addresses the goal of analysis and assessment of UMTS TDD opportunistic radio system with ad hoc behavior in coexistence with a UMTS FDD primary cellular networks.

A QoS DAG-based QoS Routing Scheme for Mobile Ad-hoc Networks (무선 Ad-hoc 네트워크를 위한 QoS DAG 기반의 QoS 라우팅 기법)

  • Kang, Yong-Hyeog;Kim, Hyun-Ho;Kim, Jung-Hee;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10A
    • /
    • pp.736-745
    • /
    • 2009
  • The growth of mobile devices and the increase of using them have required the support of realtime multimedia application in wireless environments. Especially, wireless ad-hoc networks without central management system and with dynamically changing network topology need much researches of QoS routing for multimedia applications. However it is impossible to support the hard realtime QoS for these dynamic networks. In this paper, we propose a QoS routing scheme by using QoS DAG that is maintained by each mobile node and contains the QoS information for neighbor nodes. In order to maintain the QoS DAG, each node transmits its QoS information to neighbor nodes by local broadcasting, and the neighbor nodes update their QoS DAGs by the received message. In our proposed scheme, it is possible to search the QoS path efficiently by the QoS DAG without searching it in the whole network.