scispace - formally typeset
Search or ask a question

Showing papers on "Ad hoc On-Demand Distance Vector Routing published in 2014"


Journal ArticleDOI
TL;DR: This article discusses the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the IETF MANET research, and analyzes four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application.
Abstract: In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This paradigm has often been identified with the solutions developed inside the IETF MANET working group, and for this reason it is called the MANET paradigm. However, they do not coincide, and in the last decade they clearly diverged. In this article, we start from the reasons why the MANET paradigm did not have a major impact on computer communications, and we discuss the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the MANET research. Specifically, we analyze four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application of the multihop ad hoc networking paradigm. We also present the new research directions in the multihop ad hoc networking field: peoplecentric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications.

427 citations


Proceedings ArticleDOI
08 Jul 2014
TL;DR: A prototype implementation of Named Data Networking is described and its preliminary performance assessment is described, and remaining challenges are identified.
Abstract: In this paper we apply the Named Data Networking [8], a newly proposed Internet architecture, to networking vehicles on the run Our initial design, dubbed V-NDN, illustrates NDN's promising potential in providing a unifying architecture that enables networking among all computing devices independent from whether they are connected through wired infrastructure, ad hoc, or intermittent DTN This paper describes a prototype implementation of V-NDN and its preliminary performance assessment, and identifies remaining challenges

297 citations


Journal ArticleDOI
Li Wenchao, Ping Yi, Yue Wu, Li Pan1, Jianhua Li 
TL;DR: This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and it has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV).
Abstract: The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of wireless sensor networks, seriously restricting the application of wireless sensor network. Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. In this paper, we proposed a new intrusion detection system based on -nearest neighbor (-nearest neighbor, referred to as KNN below) classification algorithm in wireless sensor network. This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV). Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

204 citations


Journal ArticleDOI
TL;DR: A trust-based QoS routing algorithm (called TQR) from the trade-off between trust degree and link delay is designed and implemented by using NS2 and compared with AODV, Watchdog-DSR and QAODV.

105 citations


Journal ArticleDOI
TL;DR: This paper proposes an optimal routing protocol for WSN inspired by the foraging behavior of ants, which uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution.
Abstract: A wireless sensor network (WSN) is a collection of sensor nodes that dynamically self-organize themselves into a wireless network without the utilization of any preexisting infrastructure. One of the major problems in WSNs is the energy consumption, whereby the network lifetime is dependent on this factor. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulator 2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decreases the number of routing request packets, and increases the network lifetime in comparison with the original AODV.

74 citations


Proceedings ArticleDOI
15 May 2014
TL;DR: Simulation results show that ML-OLSR outperforms the original OLSR protocol in terms of packet delivery ratio and average end-to-end delay, and the mobility-aware and load-aware algorithm are introduced to the O LSR protocol.
Abstract: Unmanned Aerial Vehicles (UAVs) are widely used in military and civilian fields, which promotes the need of networking. Due to the complex features of UAV MANET, the development of UAV MANET faces many technical challenges, such as routing. Generally speaking, Optimized Link State Routing (OLSR) protocol gives better performance on delay compare to AODV protocol, so the OLSR protocol meets the high demand for real-time of UAV communication. High mobility and load imbalanced are two significant characteristics of UAV networks. The performance of UAV networks is largely affected by these characteristics. In order to reduce the effects of these problems, a Mobility and Load aware OLSR (ML-OLSR) protocol is proposed in this paper. The mobility-aware algorithm and load-aware algorithm are introduced to the OLSR protocol. The modelling and simulation of the ML-OLSR protocol was completed within QualNet simulator. Simulation results show that ML-OLSR outperforms the original OLSR protocol in terms of packet delivery ratio and average end-to-end delay.

62 citations


Journal ArticleDOI
Taehong Kim1, Seong Hoon Kim1, Jinyoung Yang1, Seong-eun Yoo2, Daeyoung Kim1 
TL;DR: The shortcut tree routing (STR) protocol is proposed that provides the near optimal routing path as well as maintains the advantages of the ZigBee tree routing such as no route discovery overhead and low memory consumption.
Abstract: The ZigBee tree routing is widely used in many resource-limited devices and applications, since it does not require any routing table and route discovery overhead to send a packet to the destination. However, the ZigBee tree routing has the fundamental limitation that a packet follows the tree topology; thus, it cannot provide the optimal routing path. In this paper, we propose the shortcut tree routing (STR) protocol that provides the near optimal routing path as well as maintains the advantages of the ZigBee tree routing such as no route discovery overhead and low memory consumption. The main idea of the shortcut tree routing is to calculate remaining hops from an arbitrary source to the destination using the hierarchical addressing scheme in ZigBee, and each source or intermediate node forwards a packet to the neighbor node with the smallest remaining hops in its neighbor table. The shortcut tree routing is fully distributed and compatible with ZigBee standard in that it only utilizes addressing scheme and neighbor table without any changes of the specification. The mathematical analysis proves that the 1-hop neighbor information improves overall network performances by providing an efficient routing path and distributing the traffic load concentrated on the tree links. In the performance evaluation, we show that the shortcut tree routing achieves the comparable performance to AODV with limited overhead of neighbor table maintenance as well as overwhelms the ZigBee tree routing in all the network conditions such as network density, network configurations, traffic type, and the network traffic.

60 citations


Journal ArticleDOI
TL;DR: This paper proposes an Innovative ACO based Routing Algorithm (ANTALG) by considering a random selection of source and destination nodes and exchanges the Ants (agents) between them and shows that throughput in the proposed ANTALG algorithm is more than in AODV, ADSR and HOPNET.

56 citations


Journal ArticleDOI
TL;DR: Which of the routing strategies for mobile MANETs: proactive, reactive or hierarchical, has a better performance in emergency and rescue scenarios?
Abstract: A mobile Ad Hoc network (MANET) is a collection of wireless mobile nodes that can dynamically configure a network without a fixed infrastructure or central administration. This makes it ideal for emergency and rescue scenarios, where sharing information is essential and should occur as soon as possible. This article discusses which of the routing strategies for mobile MANETs: proactive, reactive or hierarchical, has a better performance in such scenarios. By selecting a real urban area for the emergency and rescue scenario, we calculated the density of nodes and the mobility model needed for the validation study of AODV, DSDV and CBRP in the routing model. The NS2 simulator has been used for our study. We also show that the hierarchical routing strategies are better suited for this type of scenarios.

53 citations


Journal ArticleDOI
TL;DR: This paper proposes energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm.
Abstract: In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneously using the residual energy of each node and ETX metric in the context of the typical AODV protocol. In the simulations, we verify that the proposed algorithm has longer network lifetime and consumes the residual energy of each node more evenly when compared with the typical AODV protocol.

52 citations


Book ChapterDOI
27 Aug 2014
TL;DR: Quality of Service metrics for AODV, OLSR and HWMP routing protocols in Flying Ad Hoc Networks (FANETs) are analyzed with the help of an NS-3 simulation tool and results show that using HWMP in the considered mobile scenario grants higher PDR in trade-off, increased overheads.
Abstract: In this paper, we analyze Quality of Service (QoS) metrics for AODV, OLSR and HWMP routing protocols in Flying Ad Hoc Networks (FANETs) with the help of an NS-3 simulation tool. We compare proactive, reactive, and hybrid approaches to search and maintain paths in FANET based on hop count, PDR (Packet Delivery Ratio), and overheads metrics in source-destination transmission through the swarm of UAVs (Unmanned Aerial Vehicles). In the article, swarms of 10, 15 and 20 nodes were considered. The Gauss-Markov Mobility Model is used to simulate the UAV behavior in a swarm. The size of a simulated area is variable and changes from 250 to 750 meters. Average metrics were calculated in all cases. In addition, we calculate the Goodput metric and compare it with correspondent overheads. Results show that using HWMP in the considered mobile scenario grants higher PDR in trade-off, increased overheads.

Journal ArticleDOI
TL;DR: The proposed protocol Multiconstrained and Multipath QoS Aware Routing Protocol (MMQARP) is novel, which takes care of QoS parameters dynamically and simultaneously along with path finding, so that only link reliable, energy efficient paths are available for data transmission.
Abstract: The multimedia applications such as audio, video transmission in Mobile Ad Hoc Network (MANET) requires that the path in which such data transmits must be delay sensitive, reliable and energy efficient. An existing MANET routing protocol Ad Hoc On demand Multipath Distance Vector (AOMDV) fails to perform well in terms of QoS metrics such as delay, jitter, packet delivery ratio (PDR) etc., where there is high mobility and heavy traffic. The paths which are stored in the Routing table are not reliable and energy efficient. It is possible to modify the route discovery of AODV so that more than one node disjoint, link reliable and energy efficient paths are stored in the routing table. The proposed protocol Multiconstrained and Multipath QoS Aware Routing Protocol (MMQARP) is novel, which takes care of QoS parameters dynamically and simultaneously along with path finding, so that only link reliable, energy efficient paths are available for data transmission. The extensive simulation study shows that the proposed protocol performs better in terms of PDR, delay and jitter compared to AOMDV protocol.

Journal ArticleDOI
28 Jan 2014-Sensors
TL;DR: Experimental results show that the proposed forwarding decision outperforms existing solutions in terms of packet delivery and performance evaluation of the individual importance of each metric to make forwarding decisions are shown.
Abstract: In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.

Journal ArticleDOI
TL;DR: This study analyzes the performance of well known MANETs routing protocol in high mobility case under low, medium and high density scenario and confirms that AODV gives better performance as compared to DSR and DSDV.
Abstract: Mobile Ad hoc Networks (MANETs) are considered as a new paradigm of infrastructure-less mobile wireless communication systems. MANETs are being widely studied and it is the technology that is attracting a large variety of applications. Routing in MANETs is considered a challenging task due to the unpredictable changes in the network topology, resulting from the random and frequent movement of the nodes and due to the absence of any centralized control [1][2]. In this paper, we evaluate the performance of reactive routing protocols, Ad hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR) and proactive routing protocol Destination Sequenced Distance Vector (DSDV). The major goal of this study is to analyze the performance of well known MANETs routing protocol in high mobility case under low, medium and high density scenario. Unlike military applications, most of the other applications of MANETs require moderate to high mobility. Hence it becomes important to study the impact of high mobility on the performance of these routing protocols. The performance is analyzed with respect to Average End-to-End Delay, Normalized Routing Load (NRL), Packet Delivery Fraction (PDF) and Throughput. Simulation results verify that AODV gives better performance as compared to DSR and DSDV.

Journal ArticleDOI
01 Mar 2014
TL;DR: The Path Encounter Rate (PER) metric based on the concept of ''encounter'' reflects the environment's changes and therefore boosting the performance of routing protocols in MANETs, and achieves a remarkable improvement compared to other metrics in mobility scenarios.
Abstract: So far the hop-count has been considered as a good metric for routing in wired and wireless networks thanks to its simplicity and effectiveness In spite of that, the hop-count still manifests itself to be low adaptable to the environment in which nodes may be densely distributed and move at high speeds as in mobile ad-hoc networks (MANETs) Several metrics have been proposed as the replacements for the hop-count in routing of MANET such as the Expected Transmission Count (ETX) and the Expected Transmission Time (ETT) However, they only showed their outperformance in static scenarios To deal with the mobility, some routing models employed a metric named Mobility Factor (MF) based on detecting the change of neighbour sets in a period of HELLO messages to examine the link stability before sending a packet Nonetheless, to calculate MF values, each node needs to keep historical information of its neighbours which causes more resource usage and more computational complexity when MANETs scale up In an attempt to find a suitable and effective metric for MANET's routing, this paper introduces the Path Encounter Rate (PER) metric based on the concept of ''encounter'' The proposed metric reflects the environment's changes and therefore boosting the performance of routing protocols in MANETs The throughput achieved by using the proposed metric is 30% higher than those obtained by the hop-count metric when 100 nodes move at a maximum speed of 20m/s in the area of 300x1500m^2 This is a remarkable improvement compared to other metrics in mobility scenarios Additionally, the proposed metric is much simple and has less computation compared to MF metric in terms of implementation Though, the proposed metric and routing model in this paper is demonstrated on the Ad-hoc On-demand Distance Vector (AODV) protocol, it is generic and can be applied for various kinds of routing protocols in MANETs

Journal Article
TL;DR: Three routing protocols AODV (Ad- Hoc On-Demand Distance Vector), OLSR (Optimized Link State Routed Protocol) and DSR (Dynamic Source Routing Protocol) along with many other algorithms are described briefly.
Abstract: Mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime to exchange information without using any pre-existing network infrastructure. It is a self organized and self configurable network where the mobile nodes move randomly. In MANETs mobile nodes can receive and forward packets as a router and each node operates not only as an end system, but also as a router to forward packets. There is no fixed infrastructure, which results in addition and exclusion of any number of nodes from the network for relatively small networks routing protocols may be sufficient. However, in larger networks either hierarchical or geographic routing protocols are needed. In this survey paper three routing protocols AODV (Ad- Hoc On-Demand Distance Vector), OLSR (Optimized Link State Routing Protocol) and DSR (Dynamic Source Routing Protocol) along with many other algorithms are described briefly.

Journal ArticleDOI
01 Jan 2014-Optik
TL;DR: Preliminary work to address scalability concern over AODV protocol in wireless sensor network is presented and significance of scalability on the behaviour of application, MAC, transport and physical layer performance is described.

Journal ArticleDOI
01 May 2014
TL;DR: The simulation results show that the FMLB protocol has achieved an enhancement on packet delivery ratio, up to 21%, as compared to the Ad Hoc On-demand Distance Vector routing protocol (AODV) protocol, and up to 11% over the linear Multiple-path routing protocol.
Abstract: This paper explores Fibonacci Multipath Load Balancing protocol (FMLB) for Mobile Ad Hoc Networks (MANETs). The FMLB protocol distributes transmitted packets over multiple paths through the mobile nodes using Fibonacci sequence. Such distribution can increase the delivery ratio since it reduces the congestion. The FMLB protocol's responsibility is balancing the packets transmission over the selected paths and ordering them according to hops count. The shortest path is used more frequently than the other ones. The simulation results show that the FMLB protocol has achieved an enhancement on packet delivery ratio, up to 21%, as compared to the Ad Hoc On-demand Distance Vector routing protocol (AODV) protocol, and up to 11% over the linear Multiple-path routing protocol. Also the results show the effect of nodes pause time and speed on each of the data delivery ratio and End-to-End (E2E) delay transmission time. Finally, the simulation results are obtained by the well-known Glomosim Simulator, version 2.03, without any distance or location measurements devices.

Journal ArticleDOI
TL;DR: A power aware routing protocol for a MANET formed of heterogeneous nodes that takes into consideration the battery status of nodes when building the routing table and ensures fair distribution of routing load among the nodes and avoids exhausting nodes that are falling on optimal routes across the network, thus providing better connectivity and extending the network lifetime.

Proceedings ArticleDOI
07 Apr 2014
TL;DR: The proposed watchdog mechanism detect this black hole nodes in a MANET first detects a black hole node in the network and then provides a new route to source node to find out the performance of original-AODV and modified AODV called as watchdog-A ODV in the presence of multipleblack hole nodes.
Abstract: Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to Black hole Attack. The network performance and reliability is broken by the attacks on ad hoc routing protocols. Many mechanisms have been proposed to overcome the Black hole Attack. A malicious node or black hole node send Route Response (RREP) incorrectly of having route to destination with minimum hop count and when sender sends the data packet to this malicious node, it drops all the packet in the network. The propose watchdog mechanism detect this black hole nodes in a MANET. This method first detects a black hole node in the network and then provide a new route to source node. In this, the performance of original-AODV and modified AODV called as watchdog-AODV (or W-AODV) in the presence of multiple black hole nodes is find out on the basis of throughput and packet delivery ratio and routing and control load.

Proceedings ArticleDOI
21 Apr 2014
TL;DR: An approach based on genetic algorithm (GA) and artificial immune system (AIS) for dynamic intrusion detection in AODV-based MANETs, called GAAIS, is proposed, which is able to adapting itself to network topology changes using two updating methods: partial and total.
Abstract: Mobile ad hoc network (MANET) is a self-created and self organized network of wireless mobile nodes. Due to special characteristics of these networks, security issue is a difficult task to achieve. Hence, applying current intrusion detection techniques developed for fixed networks is not sufficient for MANETs. In this paper, we proposed an approach based on genetic algorithm (GA) and artificial immune system (AIS), called GAAIS, for dynamic intrusion detection in AODV-based MANETs. GAAIS is able to adapting itself to network topology changes using two updating methods: partial and total. Each normal feature vector extracted from network traffic is represented by a hypersphere with fix radius. A set of spherical detector is generated using NicheMGA algorithm for covering the nonself space. Spherical detectors are used for detecting anomaly in network traffic. The performance of GAAIS is evaluated for detecting several types of routing attacks simulated using the NS2 simulator, such as Flooding, Blackhole, Neighbor, Rushing, and Wormhole. Experimental results show that GAAIS is more efficient in comparison with similar approaches.

Book ChapterDOI
22 Jun 2014
TL;DR: The goal of this paper is to show the deployment of a real-time precision sprayer which uses video sensing captured by lightweight UAVs (unmanned aerial vehicles) forming ad hoc network based on a geo-reference system that takes into account weeds inside of a mapped area.
Abstract: Recent advances in technology applied to agriculture have made possible the Precision Agriculture (PA). It has been widely demonstrated that precision agriculture provides higher productivity with lower costs. The goal of this paper is to show the deployment of a real-time precision sprayer which uses video sensing captured by lightweight UAVs (unmanned aerial vehicles) forming ad hoc network. It is based on a geo-reference system that takes into account weeds inside of a mapped area. The ad hoc network includes devices such as AR Drones, a laptop and a sprayer in a tractor. The experiment was carried out in a corn field with different locations selected to represent the diverse densities of weeds that can be found in the field. The deployed system allows saving high percentage of herbicide, reducing the cost spent in fertilizers and increasing the quality of the product.

Proceedings ArticleDOI
20 May 2014
TL;DR: This paper improves the process of route selection in RGR by adding a criterion based on route reliability/stability, measured by means of a concept called reliable distance.
Abstract: The Reactive-Greedy-Reactive (RGR) protocol, as proposed in [2], is a routing protocol specifically designed for unmanned aeronautical ad hoc networks. Since RGR is based on the Ad Hoc On-Demand Distance Vector (AODV), the routes with the least number of hops are ultimately preferred during the route discovery. Overall, freshness and path length (in hops) are the two criteria that govern route selection. In this paper, we improve the process of route selection in RGR by adding a criterion based on route reliability/stability. Route stability here is measured by means of a concept called reliable distance. Route selection will prefer reliable routes before considering route length and freshness. Simulations in Opnet show a considerable improvement in performance at virtually no additional cost.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: A new detection algorithm is proposed based on a statistical method, linear regression and watchdog software that distinguishes the existence or not of a greedy behavior and suspects the compromised nodes using a new appropriate defined metrics.
Abstract: Vehicular Ad hoc Networks (VANETs) aim to provide a high safety level to road users and enhance driving conditions for drivers. Thus, they are exposed to several kinds of attacks such as Denial Of Service attacks (DOS), especially the greedy behavior which affects services availability of authentic users. Greedy behavior attack has been well studied for Wireless local area networks (WLAN) and for Mobile Ad hoc Networks (MANETs). However, this attack is less studied for the case of VANETs. Indeed, the detection of a greedy behavior in quasi-static network is much easier than that in a network with low or high mobility. The aim of this paper is to detect greedy behavior in VANETs. More specifically, we propose a new detection algorithm based on a statistical method, linear regression and watchdog software. This algorithm distinguishes the existence or not of a greedy behavior and suspects the compromised nodes using a new appropriate defined metrics. The proposed algorithm is passive, it can be executed by any node in the network and does not require any modification of the IEEE 802.11p protocol.

Journal ArticleDOI
TL;DR: A new routing protocol to meet requirements for mobile sensor networks based on a cross-layer interaction among five reference layers (application, transport, network, MAC and physical) and outperforms its counterparts in terms of route reliability and end-to-end delay performances.
Abstract: In mobile sensor networks (MSNs), sensor data is generally transferred via mobile sensor nodes by multi-hop fashion. Because of the mobility of the nodes in the network, the efficient routing protocols are needed to ensure end-to-end route reliability while incurring minimal power consumption and packet delay. In this study, we developed a new routing protocol to meet these requirements for MSNs based on a cross-layer interaction among five reference layers (application, transport, network, MAC and physical). The proposed protocol primarily exploits the idea of interaction among these five layers all-in-one protocol. Its primary goals are (i) to discover the most reliable route in network, (ii) to sustain the route reliability and (iii) to be energy efficient and delay aware. It has been designed, modeled and simulated by using OPNET Modeler simulation software. The simulation results of the proposed protocol have been compared to three well known routing protocols (i.e., AODV, Leach-Mobile, CBR-Mobile). According to the obtained results, the proposed protocol outperforms its counterparts in terms of route reliability and end-to-end delay performances.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: Modifications has been done in AODV routing protocol to detect and remove wormhole attack in real-world MANET and node authentication has been used to detect malicious nodes and remove false positive problem that may arise in WADP algorithm.
Abstract: Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics like dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. A node in MANET acts not only as an end terminal but both as router and client. In this way, multi-hop communication occurs in MANETs and thus it becomes much more difficult task to establish a secure path between the source and destination. The objective of this work is to overcome a special kind of attack called wormhole attack launched by at least two colluding nodes within a network In this research paper work, some modifications has been done in AODV routing protocol to detect and remove wormhole attack in real-world MANET. Wormhole attack detection and prevention algorithm, WADP, has been implemented in modified AODV. Also node authentication has been used to detect malicious nodes and remove false positive problem that may arise in WADP algorithm. Node authentication not only removes false positive but also helps in mapping exact location of wormhole and is a kind of double verification for wormhole attack detection. Simulation results proves the theory.

Book ChapterDOI
27 Aug 2014
TL;DR: A novel energy aware routing protocol called a balanced battery usage routing protocol (BBU) which uses residual energy, hop count and energy threshold as a cost metric to maximize network life time and distribute energy consumption of Mobile Ad hoc Network (MANET) based on Ad hoc on-demand Distance Vector (AODV).
Abstract: Energy efficiency is a critical issue for battery-powered mobile devices in ad hoc networks. Failure of node or link allows re-routing and establishing a new path from source to destination which creates extra energy consumption of nodes, sparse network connectivity and a more likelihood occurrences of network partition. Routing based on energy related parameters is one of the important solutions to extend the lifetime of the network. In this paper, we are designing and evaluating a novel energy aware routing protocol called a balanced battery usage routing protocol (BBU) which uses residual energy, hop count and energy threshold as a cost metric to maximize network life time and distribute energy consumption of Mobile Ad hoc Network (MANET) based on Ad hoc on-demand Distance Vector (AODV). The new protocol is simulated using Network Simulator-2.34 and comparisons are made to analyze its performance based on network lifetime, delivery ratio, normalized routing overhead, standard deviation of residual energy of all Nodes and average end to end delay for different network scenarios. The results show that the new energy aware algorithm makes the network active for longer interval of time once it is established and fairly distribute energy consumption across nodes on the network.

Journal ArticleDOI
01 Oct 2014
TL;DR: The experimental result reveals that the proposed power-saving technique can be applied to economically and effectively elongate the operational lifetime of MANETs under flooding attack.
Abstract: Without the management of centralized unit, mobile ad hoc networks (MANETs) are vulnerable to security threats from flooding attacks launched through compromised nodes or intruders. When a source node needs a data session with a destination node, it disseminates a route request (RREQ) message to its neighbors in a hop-by-hop manner. One crucial type of flooding attacks called RREQ flooding appears to be inevitably proliferated in wireless networks. In the RREQ flooding attack, attackers would launch massive RREQ packets with out-of-domain IP address as its destination node. The forwarding services conducted by all intermediate nodes exhaust their energy and processing resources. The proposed approach can suppress redundant RREQ packets using the co-operation of destination node and neighbor nodes within one-hop range of the attacking node. A Petri Net design was developed to model the proposed approach and configure all relevant system aspects in a concise fashion for qualitative analysis. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator. The experimental result reveals that the proposed power-saving technique can be applied to economically and effectively elongate the operational lifetime of MANETs under flooding attack.

02 May 2014
TL;DR: Simulation results show that the lifetime of network has been increased in EE-AODV as compared to AODV, and the routing algorithm adopted by Energy Efficient Ad Hoc Distance Vector protocol has enhanced the RREQ and RREP handling process.
Abstract: Statistics shows that wireless technology is gaining popularity day by day. Today, people sitting at either ends of the country can communicate with each other with the help of wireless technology. But energy efficiency is a critical issue for battery-powered mobile devices in ad hoc networks and routing based on energy relate parameters is used to extend the network lifetime. This paper proposes an EE-AODV routing protocol which is an enhancement in the existing AODV routing protocol. The routing algorithm which is adopted by Energy Efficient Ad Hoc Distance Vector protocol (EE-AODV) has enhanced the RREQ and RREP handling process to save the energy in mobile devices. EE-AODV considers some level of energy as the minimum energy which should be available in the node to be used as an intermediary node (or hop). When the energy of a node reaches to or below that level, the node should not be considered as an intermediary node, until and unless no alternative path is available. Simulation results show that lifetime of network increased in EE-AODV as compared to AODV.

Proceedings ArticleDOI
03 Apr 2014
TL;DR: The connectivity tests have shown that it is a realistic option to use ad hoc networks for vehicular communication, and for unicasting DSR and in case of multicasting ADMR perform better as compared to other protocols.
Abstract: Vehicular Ad hoc Network provides a technology for communicating in between different vehicles. In this paper the performance of vehicular ad hoc network is evaluated using various QOS metrics, which affects the performance of network communication, also analyze the QoS performance with metrics routing overhead, packet delivery ratio and average delay with 1024 bytes packets for unicast routing protocols(Dynamic Source Routing, Ad hoc On demand Distance Vector routing) and multicast routing protocols (Adaptive Demand driven Multicast Routing, On Demand Multicast Routing Protocol) in urban environment. After evaluation results are compared with 512 bytes packets [3] to see the difference in performance of vehicles with different packet size. For investigation it uses the network simulator i.e. ns-2 with a car traffic movement tracing simulator SUMO.VANET simulation is implemented in a 50 × 50 meters grid model of city environment. The connectivity tests have shown that it is a realistic option to use ad hoc networks for vehicular communication. For unicasting DSR and in case of multicasting ADMR perform better as compared to other protocols.