scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Performance measurement in MANET

TL;DR: Simulation results using Network Simulator 2(NS2) shows that, in a high mobility environment, malicious node could be detected and the packet delivery ratio has been improved.
Abstract: Mobile Adhoc Network (MANET) is vulnerable to many security issues and network attacks. We presented the comparison of three different routing protocols (AODV, DSR and DSDV) on the basis of different parameters. In this paper, black hole attack is implemented on AODV protocol which reduce the performance parameters of network by exploiting the packet sequence number included in any packet header. The proposed mechanism of Intrusion Detection System (IDS) is also implemented to enhance the network performance. Simulation results using Network Simulator 2(NS2) shows that, in a high mobility environment, malicious node could be detected and the packet delivery ratio has been improved.
Citations
More filters
Journal ArticleDOI
TL;DR: The framework, challenges and trends of Smart city IoT, use case for the smart street highlights the importance of proposed structure, and Smart City projects are discussed to recognize the importanceof IoT in smart cities and its future are identified.

33 citations

Proceedings ArticleDOI
01 Nov 2017
TL;DR: Different techniques that can be used to detect and prevent MANETs from black hole attacks are discussed.
Abstract: Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.

11 citations

Journal ArticleDOI
TL;DR: A combined approach which is used to detect both the black hole and worm hole attack is proposed and it is found that the parameters for Quality of Services (QoS) in MANET improved significantly as compare to conventional techniques.
Abstract: MANET is vulnerable to most of the security threats and we proposed a combined approach which is used to detect both the black hole and worm hole attack. We also carried out black hole and worm hole attack on MANET using Ad hoc On Demand Distance Vector (AODV) routing protocol and analyzed the performance parameters like Throughput, Packet Delivery Ratio(PDR) and Normalized Routing Load (NRL). After implementation of proposed technique, we found that the parameters for Quality of Services (QoS) in MANET improved significantly as compare to conventional techniques.

5 citations

Proceedings ArticleDOI
09 Jun 2017-Rice
TL;DR: How the mobility in VANET networks, impacts a continuous flow of data on TCP, is discussed, by modeling a scenario in NetLogo and its simulation with NS2.
Abstract: In this article is considered Vehicular Ad-Hoc Networks (VANETs) as a technology aimed at the exchange of information between vehicles, where the nodes/vehicles of origin and destination, do not have a direct communication. Also is emphasized and analized the use interest of a TCP (Transition Control Protocol) traffic flow, since it is one of the fundamental protocols for Internet of things (IoT). Most Internet applications use TCP to create “connections” with each other, in order to maintain applications with a continuous data flow, it is, TCP over Internet guarantees the integrity and delivery of the data to its destination without errors and in the same order in which they were originally transmitted. At the end of the article, it is discussed how the mobility in VANET networks, impacts a continuous flow of data on TCP, performing this analysis by modeling a scenario in NetLogo and its simulation with NS2.

2 citations


Cites background from "Performance measurement in MANET"

  • ...This measure estimates the overhead of the routing protocol; That is, how many routing or control packets need to be added to a data packet to discover, transport and maintain a route that can successfully transport the data packets to their destination[25]....

    [...]

Journal ArticleDOI
01 Jan 2021
TL;DR: A combination between source routing technique and on‐demand ad hoc routing algorithm to increase link reliability in power line communications over low‐tension power grid and unique lightweight packet structure is proposed to minimize algorithm overhead and to enhance the system robustness.
Abstract: This article proposes a combination between source routing technique and on‐demand ad hoc routing algorithm to increase link reliability in power line communications over low‐tension power...
References
More filters
01 Jul 2003
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

11,490 citations


"Performance measurement in MANET" refers methods in this paper

  • ...TABLE II CO MPARISON O F AOD V, D SD V AND D SR PROTO CO LS ON THE BASIS O F QOS According to table II, DSR routing protocol has maximum throughput and the same is illustrated in the graphical simulation....

    [...]

Proceedings ArticleDOI
25 Oct 1998
TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Abstract: An ad hoc networkis a collwtion of wirelessmobilenodes dynamically forminga temporarynetworkwithouttheuseof anyexistingnetworkirrfrastructureor centralizedadministration.Dueto the limitedtransmissionrange of ~vlrelessnenvorkinterfaces,multiplenetwork“hops”maybe neededfor onenodeto exchangedata ivithanotheracrox thenetwork.Inrecentyears, a ttiery of nelvroutingprotocols~geted specificallyat this environment havebeen developed.but little pcrfomrartwinformationon mch protocol and no ralistic performancecomparisonbehvwrrthem ISavailable. ~Is paper presentsthe results of a derailedpacket-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocolsthatcovera range of designchoices: DSDV,TORA, DSR and AODV. \Vehave extended the /~r-2networksimulatorto accuratelymodelthe MACandphysical-layer behaviorof the IEEE 802.1I wirelessLANstandard,includinga realistic wtrelesstransmissionchannelmodel, and present the resultsof simulations of net(vorksof 50 mobilenodes.

5,147 citations

Journal ArticleDOI
TL;DR: The results indicate that despite its improvement in reducing route request packets, CBRP has a higher overhead than DSR because of its periodic hello messages while AODV's end-to-end packet delay is the shortest when compared to DSR and CBRP.
Abstract: A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play an increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable and movement of communicating parties is possible. However, since there is no stationary infrastructure such as base stations, mobile hosts need to operate as routers in order to maintain the information about the network connectivity. Therefore, a number of routing protocols have been proposed for ad hoc wireless networks. In this paper, we study and compare the performance of the following routing protocols AODV, PAODV (preemptive AODV), CBRP, DSR, and DSDV. A variety of workload and scenarios, as characterized by mobility, load and size of the ad hoc network were simulated. Our results indicate that despite its improvement in reducing route request packets, CBRP has a higher overhead than DSR because of its periodic hello messages while AODV's end-to-end packet delay is the shortest when compared to DSR and CBRP. PAODV has shown little improvements over AODV.

320 citations


"Performance measurement in MANET" refers methods in this paper

  • ...TABLE II CO MPARISON O F AOD V, D SD V AND D SR PROTO CO LS ON THE BASIS O F QOS According to table II, DSR routing protocol has maximum throughput and the same is illustrated in the graphical simulation....

    [...]

Proceedings ArticleDOI
27 Aug 2007
TL;DR: Computer simulation using glomosim shows that the proposed protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Abstract: An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad-hoc networks is AODV (ad-hoc on demand distance vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called 'black hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Computer simulation using glomosim shows that our protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.

258 citations

Proceedings ArticleDOI
02 Apr 2009
TL;DR: Simulation revealed that although DSR perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
Abstract: Ad hoc networks are known by many specifications like multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols that plays an important role. This paper presents a performance comparison between two reactive routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On demand distance Vector (AODV).Both protocols were simulated using the tool ns-2 and were compared in terms of packet loss ratio, end to end delay, with mobile nodes varying number of nodes and speed. Simulation revealed that although DSR perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.

89 citations


"Performance measurement in MANET" refers methods in this paper

  • ...TABLE II CO MPARISON O F AOD V, D SD V AND D SR PROTO CO LS ON THE BASIS O F QOS According to table II, DSR routing protocol has maximum throughput and the same is illustrated in the graphical simulation....

    [...]