scispace - formally typeset
Open AccessJournal ArticleDOI

Mobile Ad Hoc Networks and It’s Routing Protocols

Rakesh Kumar, +2 more
- 01 Oct 2013 - 
- Vol. 7, Iss: 8, pp 1151-1160
TLDR
A new routing scheme developed by the use of evolutionary algorithms (EA) and analytical hierarchy process (AHP) which will be used for getting the optimized output of MANET is introduced.
Abstract
A mobile ad hoc network (MANET) is a self configuring network, without any centralized control. The topology of this network is not always defined. The main objective of this paper is to introduce the fundamental concepts of MANETs to the researchers and practitioners, who are involved in the work in the area of modeling and simulation of MANETs. This paper begins with an overview of mobile ad hoc networks. Then it proceeds with the overview of routing protocols used in the MANETS, their properties and simulation methods. A brief tabular comparison between the routing protocols is also given in this paper considering different routing protocol parameters. This paper introduces a new routing scheme developed by the use of evolutionary algorithms (EA) and analytical hierarchy process (AHP) which will be used for getting the optimized output of MANET. In this paper cryptographic technique, ceaser cipher is also employed for making the optimized route secure. Keywords—AHP, AODV, Cryptography, EA, MANET, Optimized output.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Trust based Dynamic Multicast Group Routing Ensuring Reliability for Ubiquitous Environment in MANETs

TL;DR: A model which is highly inspired by natural and social behavior of human beings that man is a social animal and is always associated with different types of dynamic groups and the proposed Multicast Route Reliability MRR is a purely a probabilistic function of Cartesian product of past relationships and present moving patterns.
Journal ArticleDOI

A survey of clustering algorithms for cognitive radio ad hoc networks

TL;DR: This paper introduces an extensive survey of the most important published algorithms for clustering formation in CRAHN, and classifies the proposed algorithms based on their objectives.
Journal ArticleDOI

A Survey on Security Issues and Challenges in Mobile Ad-hoc Network

TL;DR: In this paper, the authors discuss about the various attacks on a network together with the essential security procedures to be incorporated for securing the network and discuss the three major parameters to be ensured in the design of a secure network.

MART: Multipath-Based Anonymous Routing Protocol in MANETs

Thejaswi D T
TL;DR: A Multipath- based Anonymous Routing proTocol (MART) in MANETs uses multipath routing to route packets through multiple paths, which form a non-traceable anonymous route and effectively counters intersection and timing attacks.

A Survey: Routing Protocols In Mobile Ad hoc Networks

TL;DR: This research paper is aiming to analyse the performance of various geographic routing protocols in mobile ad hoc networks to find out if they are suitable for MANETs.
References
More filters
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

Energy conserving routing in wireless ad-hoc networks

TL;DR: An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor-based, monitoring system and algorithms to select the routes and the corresponding power levels such that the time until the batteries of the nodes drain-out is maximized are proposed.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Proceedings ArticleDOI

A distance routing effect algorithm for mobility (DREAM)

TL;DR: A new routing protocol for ad hoc networks built around two novel observations, one of triggering the sending of location updates by the moving nodes autonomously, based on a node's mobility rate, and the other of minting the overhead used for maintaining routes using the two new principlw of update message frequency and distance.
Related Papers (5)