scispace - formally typeset
Search or ask a question

Showing papers on "Ad hoc On-Demand Distance Vector Routing published in 2016"


Book ChapterDOI
Sunil Kumar1, Kamlesh Dutta1
01 Jan 2016
TL;DR: The main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network, are analyzed.
Abstract: In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current security solutions for the mobile ad hoc network.

99 citations


Proceedings ArticleDOI
01 Jan 2016
TL;DR: These routing protocols are studied in depth and simulated using NS-2 and the impact of network size, packet delivery ratio, average delay and average throughput will be presented.
Abstract: Communication among the wireless links between mobile nodes is become popular research area because of its simplicity of deployment and mobility. Collection of all mobile nodes through which all wireless links are connected called as Mobile Ad hoc Network (MANET). MANET network gets too much attraction of researchers due to its mobility, reliability, self-repairing, dynamic infrastructure and independent with the help of center administration. Despite of numerous advantages it has many problems like synchronization, routing protocol, delay and shortest path. Many routing protocols have been proposed like OLSR, DSDV, DSR, AODV and TORA so far to improve the routing performance therefore these routing protocols are studied in depth and simulated using NS-2. The simulation and comparison results will briefly present the impact of network size, packet delivery ratio, average delay and average throughput.

74 citations


Journal ArticleDOI
TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
Abstract: In recent years, Mobile Ad hoc NETworks MANETs have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. In order to provide adequate security against multi-level attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques because prevention-based techniques cannot prevent the attacks from compromised internal nodes. Intrusion detection system is an effective defense mechanism that detects and prevents the security attacks at various levels. This paper tries to provide a structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms. These detection techniques are broadly classified into nine categories based on their primary detection engine/s. Further, an attempt has been made to compare different intrusion detection techniques with their operational strengths and limitations. Finally, the paper concludes with a number of future research directions in the design and implementation of intrusion detection systems for MANETs. Copyright © 2016 John Wiley & Sons, Ltd.

72 citations


Book ChapterDOI
19 Apr 2016

65 citations


Journal ArticleDOI
TL;DR: AODV and DSDV protocols are analyzed in terms of routing overhead, packet delivery ratio, throughput and end to end delay and the modification in A ODV is given which helps to improve the performance of AODV in presence of black hole attack.

57 citations



Journal ArticleDOI
TL;DR: A new algorithm is suggested which enhances the security of AODV routing protocol to encounter the black hole attacks and tries to identify malicious nodes according to nodes’ behaviours in an Ad Hoc network and delete them from routing.
Abstract: Ad Hoc network is a temporal network which is managed by autonomous nodes which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes' behaviours and loss of specific offensive lines, this type of networks is not supportive against malicious nodes' attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This article suggests a new algorithm which enhances the security of AODV routing protocol to encounter the black hole attacks. This algorithm tries to identify malicious nodes according to nodes' behaviours in an Ad Hoc network and delete them from routing. The suggested algorithm is simulated by NS2. The simulation results show some improvements in end-to-end delay and packet delivery rate in the suggested algorithm.

49 citations


Journal ArticleDOI
TL;DR: This paper presents a formal specification of the Ad hoc On-demand Distance Vector routing protocol using AWN (Algebra for Wireless Networks), a recent process algebra which has been tailored for the modelling of mobile ad hoc networks and wireless mesh network protocols.
Abstract: This paper presents a formal specification of the Ad hoc On-demand Distance Vector (AODV) routing protocol using AWN (Algebra for Wireless Networks), a recent process algebra which has been tailored for the modelling of mobile ad hoc networks and wireless mesh network protocols. Our formalisation models the exact details of the core functionality of AODV, such as route discovery, route maintenance and error handling. We demonstrate how AWN can be used to reason about critical protocol properties by providing detailed proofs of loop freedom and route correctness.

49 citations


Journal ArticleDOI
TL;DR: The Cuckoo Search Optimization AODV (CSO-AODV) protocol gives better QoS routing metrics, satisfying QoS constraint, and the simulation results of the proposed algorithm is superior compared to ACO, PSO, and A ODV algorithms.

45 citations


Journal ArticleDOI
01 Jan 2016
TL;DR: A dynamic fuzzy energy state based AODV (DFES-AODV) routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented and it is confirmed that using a dynamic fuzzy system ensures more energy efficiency in comparison to its static counterpart.
Abstract: To ensure good network performance, a routing protocol for MANETs must change its routing policy online to account for changes in network conditions and to deal with routing information imprecision.The main focus of this paper is on the use of fuzzy logic and reinforcement learning.A dynamic membership function is defined to enhance the adaptivity of legacy fuzzy logic systems.A fuzzy extension of a reinforcement learning based routing protocol for MANETs is presented.Dynamic fuzzy logic is more appropriate than reinforcement learning for adaptive energy aware routing in MANETs. In this paper, a dynamic fuzzy energy state based AODV (DFES-AODV) routing protocol for Mobile Ad-hoc NETworks (MANETs) is presented. In DFES-AODV route discovery phase, each node uses a Mamdani fuzzy logic system (FLS) to decide its Route REQuests (RREQs) forwarding probability. The FLS inputs are residual battery level and energy drain rate of mobile node. Unlike previous related-works, membership function of residual energy input is made dynamic. Also, a zero-order Takagi Sugeno FLS with the same inputs is used as a means of generalization for state-space in SARSA-AODV a reinforcement learning based energy-aware routing protocol. The simulation study confirms that using a dynamic fuzzy system ensures more energy efficiency in comparison to its static counterpart. Moreover, DFES-AODV exhibits similar performance to SARSA-AODV and its fuzzy extension FSARSA-AODV. Therefore, the use of dynamic fuzzy logic for adaptive routing in MANETs is recommended.

44 citations


Journal ArticleDOI
TL;DR: The principles of 3D geographic routing are illustrated, current research work based on different criteria are categorized, and the 3DGR protocols under study through comprehensive analysis are compared.
Abstract: Geographic routing has been considered as an attractive approach for wireless mobile ad hoc and sensor networks due to its effectiveness and scalability. Over the past few decades, numerous geographic routing protocols have been proposed extensively in 2D space. However, these protocols are no longer valid if ad hoc or sensor networks are distributed in 3D environments, such as space, atmosphere, and ocean. Because of the surprisingly difficulty of designing geographic routing protocols for 3D networks compared to 2D networks, only a few prior studies have focused on 3D geographic routing specifically designed for ad hoc and sensor networks. In this article, we first illustrate the principles of 3D geographic routing, and categorize current research work based on different criteria. Then we compare the 3DGR protocols under study through comprehensive analysis. Finally, we point out the open issues and opportunities for further research.

Journal ArticleDOI
TL;DR: A novel routing protocol, neighbor-based Dynamic Connectivity Factor routing Protocol (DCFP), that is able to dynamically probe the status of the underlying network without the intervention of a system administrator based on a novel connectivity metric, while reducing the RREQ overhead using a new connectivity factor is proposed.
Abstract: Recently, Mobile Ad hoc Networks (MANETs) have witnessed rapid development due to the low cost, diversity, and simplicity of mobile devices. Such devices can form a reliable network in a short time for use as a rescue information system after a natural disaster, where the communication infrastructure may no longer be available or accessible. Because the nodes in such a network are free to move at any time in the absence of centralized control, routing is considered to be the most challenging issue. Moreover, some routing protocols, such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR), completely rely on preset variables, which are required to be set by the system administrator based on the scenario. Unfortunately, the setting that is proper for a specific scenario is not suitable for another scenario. In addition, some other routing protocols, such as Ad hoc On-demand Distance Vector (AODV), employ the Route REQuest message (RREQ) flooding scheme to find a path to a particular destination in the route discovery stage. Although the flooding scheme guarantees better reachability, it introduces undesirable routing overhead, which in turn leads to system performance degradation. Thus, this paper proposes a novel routing protocol, neighbor-based Dynamic Connectivity Factor routing Protocol (DCFP), that is able to dynamically probe the status of the underlying network without the intervention of a system administrator based on a novel connectivity metric, while reducing the RREQ overhead using a new connectivity factor. Furthermore, extensive simulation experiments are conducted to evaluate the performance of the proposed DCFP, where the NCPR and AODV are used as a benchmark. The proposed DCFP manages to address the need for preset variables in NCPR. Simulation results show that DCFP outperforms both NCPR and AODV in terms of end-to-end delay, normalized routing overhead, MAC collision, energy consumption, network connectivity, and packet delivery ratio due to its novel mechanism for reducing redundant RREQ.

04 Jul 2016
TL;DR: The Lightweight Ad hoc On-Demand - Next Generation (LOADng) distance vector routing protocol as discussed by the authors is a reactive reactive routing protocol intended for use in MANETs, which is based on the Loadng protocol.
Abstract: This document describes the Lightweight Ad hoc On-Demand - Next Generation (LOADng) distance vector routing protocol, a reactive routing protocol intended for use in Mobile Ad hoc NETworks (MANETs).

Journal ArticleDOI
01 Feb 2016
TL;DR: The main aim of proposed ESTR Extended STR is to present new ZigBee network routing protocol with goal of improving the performance of ESTR in terms of PDR and delay against STR and AODV.
Abstract: Energy efficiency and network lifetime are main concerns in WSN In order to improve these factors ZigBee plays an important role Low cost, low data rate features of ZigBee results in low power consumption and makes it useful in wireless sensor networks, increasing life of small batteries of nodes in the network Since tree routing in ZigBee does not require any routing tables to send the packet to the destination, it can be used in ZigBee end devices that have limited resources Routing protocols such as AODV (Ad-hoc on demand distance vector routing), ZTR (ZigBee tree routing), and STR (Shortcut tree routing) are compared on the basis of different performance metrics (End to end delay, routing overload, throughput, packet delivery ratio) An extensive simulation in NS2 is carried out The performance evaluation shows that STR achieves better performance as compared to other two routing protocols But there are some limitations of the STR method Performance of packet delivery ratio of STR is less as compared to AODV Performance of end to end delay of STR is poor as compared to AODV Hence ESTR is proposed The main aim of proposed ESTR Extended STR is to present new ZigBee network routing protocol with goal of improving the performance of ESTR in terms of PDR and delay against STR and AODV

Proceedings ArticleDOI
01 Feb 2016
TL;DR: Simulation result shows the A ODVDR is perform better than AODV and ZRP routing protocol, and the AODvDR is performing better than a host as well as router in this thesis work.
Abstract: MANET is a collection of computational devices that creates random topology for communication. The beauty of MANET is that it not required any central controller or base station. The devices used in MANET may be fixed or mobile. MANET is only a network in which devices worked as a host as well as router. The routing protocol used in mobile ad hoc network is broadly classified in three category-proactive, reactive and hybrid routing protocol. In this thesis work performance of AODV, AODVDR and ZRP is compared in the presence of different number of connection, different pause time and different number of communicating devices. In this work, network simulator tool NS2.35 is used for simulation. Simulation result shows the AODVDR is perform better than AODV and ZRP routing protocol.

Journal ArticleDOI
TL;DR: Multipath Load Balancing Routing is developed to substitute Zigbee’s AODV routing and achieves better load balance, lower packet loss rate, and better routing connectivity ratio in both grid and random uniform topologies.
Abstract: In the next-generation technology, Internet of Things (IoT), billions of smart objects will communicate with one another to make human lives more convenient. IoT is based on wireless sensor network (WSN), and Zigbee is one of the most popular WSN protocols. A mature IoT environment involves heavy WSN data transmission causing bottleneck problems. However, Zigbee’s AODV routing stack does not have load balance mechanism to handle bursty traffic. Therefore, we develop Multipath Load Balancing (MLB) Routing to substitute Zigbee’s AODV routing. Our proposed MLB consists of two main designs: LAYER_DESIGN and LOAD_BALANCE. LAYER_DESIGN assigns nodes into different layers based on node distance to IoT gateway. Nodes can have multiple next-hops delivering IoT data. All neighboring layer nodes exchange flow information containing current load, used by LOAD_BALANCE to estimate future load of next-hops. With MLB, nodes can choose the neighbors with the least load as the next-hops and thus can achieve load balance and avoid bottlenecks. Compared with Zigbee’s AODV and multipath version AODV (AOMDV), experiment results demonstrate that MLB achieves better load balance, lower packet loss rate, and better routing connectivity ratio in both grid and random uniform topologies. MLB provides a more convincing routing solution for IoT applications.

Journal Article
TL;DR: A novel routing algorithm for mobile ad hoc networks is presented that employs both reactive and proactive schemes in its design and can outperform AODV, AOMDV and DSDV protocols in terms of, packet delivery ratio, packet loss and throughput.
Abstract: Mobile-Ad-Hoc-Networks (MANETs) are self-configuring networks of mobile nodes, which communicate through wireless links. The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. The main issues in MANETs include the mobility of the network nodes, the scarcity of computational, bandwidth and energy resources. The routing is particularly a challenging task in MANETs that selecting paths in a network along which to send network traffic. Thus, Mobile Ad hoc Network (MANET) routing protocols should explicitly consider network changes and node changes in their operations. In this paper we present a novel routing algorithm for mobile ad hoc networks.It employs both reactive and proactiveschemes in its design. Simulation results show that our protocol can outperform AODV, AOMDV and DSDV protocols in terms of, packet delivery ratio, packet loss and throughput.

Proceedings ArticleDOI
01 May 2016
TL;DR: An AODV-based secure routing mechanism to detect and eliminate black hole attack and affected routes in the early phase of route discovery and a validity value is attached with RREP which ensures that there is no attack along the path.
Abstract: Utilization of mobile devices are burgeoning rapidly and consequently mobile ad-hoc networks (MANETs). The self configuring and infrastructure less property of MANETs makes them easily deployable anywhere and extremely dynamic in nature. Lack of centralized administration and coordinator are the reasons for MANET to be vulnerable to active attack like black hole. Black hole attack is ubiquitous in mobile ad hoc as well as wireless sensor networks. Black hole affected node, without knowing actual route to destination, spuriously replies to have shortest route to destination and entice the traffic towards itself to drop it. Network containing such node may not work according to the protocol being used for routing. Commonly used protocols like ADOV, DSR, and so forth in MANET are not designed to tackle black hole attack or black hole affected routes. Hence this paper proposes an AODV-based secure routing mechanism to detect and eliminate black hole attack and affected routes in the early phase of route discovery. A validity value is attached with RREP which ensures that there is no attack along the path. The proposed method is simulated in NS2 and performance analysis is carried out.

Journal ArticleDOI
TL;DR: This paper proposes a novel strategy to detect single and collaborative black hole attacks, with reduced routing and computational overhead, using the proposed D-MBH algorithm.

Proceedings ArticleDOI
04 May 2016
TL;DR: This paper simulates black hole, flooding and rushing attacks which are threats in Ad hoc On-demand Distance Vector routing protocol to analyze their impacts on this protocol using NS-2 network simulator and uses packet delivery ratio, average end-to-end delay and throughput as performance evaluation metric.
Abstract: In the recent years, lots of research are going on in the area of Mobile Ad hoc NETworks (MANETs). This network is infrastructure-less network where nodes communicate with each other without any aid of centralized administration. Unfortunately, this feature causes the network vulnerable to various types of attacks. Hence, it is a challenging task in front of researcher to find out the suitable remedy to conciliate attacks in routing protocols. In this paper, we simulate black hole, flooding and rushing attacks which are threats in Ad hoc On-demand Distance Vector (AODV) routing protocol to analyze their impacts on this protocol using NS-2 network simulator. Previous researches take only one attacker or just the network size or the mobility to test their performance analysis, however, in this security analysis, we take into consideration the network size, the mobility, the traffic load and finally the number of the attackers. We use packet delivery ratio, average end-to-end delay and throughput as performance evaluation metric. Our simulation results show that the black hole attack have a severe impact on the network performance while the flooding and rushing attacks have less significant effect on the network performance.

Patent
27 Jul 2016
TL;DR: In this article, an outdoor wireless communication system based on a LoRa ad-hoc network is proposed, which is used for solving technical problems of poor mobile network signals in severe environment, short transmission distance and absence of an interactive interface for information sharing of the existing outdoor wireless communications system.
Abstract: The invention provides an outdoor wireless communication system based on a LoRa ad-hoc network, which is used for solving technical problems of poor mobile network signals in severe environment, short transmission distance and absence of an interactive interface for information sharing of the existing outdoor wireless communication system. The outdoor wireless communication system based on the LoRa ad-hoc network comprises a central processing unit, a positioning module, a Bluetooth module, a peripheral interface, a power supply module, a LoRa communication module and a mobile phone APP terminal; the central processing unit is respectively connected with the positioning module, the Bluetooth module, the peripheral interface, the power supply module and the LoRa communication module; the LoRa communication module constructs a wireless Mesh network with the LoRa communication modules of other systems, and performs reliable data communication through a CSMA/CA protocol and an AODV routing algorithm; and the mobile phone APP terminal and the Bluetooth module perform data exchange through the Bluetooth. The outdoor wireless communication system based on the LoRa ad-hoc network performs communication without the mobile network, has long transmission distance, has the interactive interface for information sharing, and can be applied to the fields, such as the Internet of Vehicles and the Internet of Things.

Journal ArticleDOI
TL;DR: A load balancing (LB) multipath routing protocol based on maximal minimal nodal residual energy (MMRE) in the ad hoc on-demand multipath distance vector (AOMDV) protocol that can increase packet delivery and decrease the number of dead nodes, thus reducing the probability of network portioning.
Abstract: Mobile ad hoc multipath routing protocols have attracted considerable research attention over the past decade, but the limited battery life of nodes remains a significant obstacle. Many researchers have designed multipath routing protocols that balance the data load between the generated paths, but there is always some tradeoff between conserving the nodes' energy and delivering data. In this paper, I introduce a load balancing (LB) multipath routing protocol based on maximal minimal nodal residual energy (MMRE) in the ad hoc on-demand multipath distance vector (AOMDV) protocol. The proposed LBMMRE-AOMDV protocol evaluates the generated paths based on the maximal nodal residual energy and the actual number of packets that could be transmitted over that path without depleting the nodes' energy. The performance of the proposed protocol was tested and evaluated using different scenarios and performance metrics, and achieved good results compared with MMRE-AOMDV and AOMDV. In particular, the proposed method can increase packet delivery and decrease the number of dead nodes, thus reducing the probability of network portioning.

Journal ArticleDOI
TL;DR: A trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET and the comparative analysis between the proposed T2AR with the existing methods regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T1AR in the secure MANET environment design.
Abstract: Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

Journal ArticleDOI
TL;DR: A new QoS routing protocol based on AODV (named AQA-AODV), which creates routes according to application QoS requirements and introduces link and path available bandwidth estimation mechanisms and an adaptive scheme that can provide feedback to the source node about the current network state to allow the application to appropriately adjust the transmission rate.

Journal ArticleDOI
TL;DR: Several enhancements to the reference implementations of the VNLayer and the adaptation of AODV to work with VNs are presented, proving by means of mathematical analysis and simulation experiments that the solutions achieve better performance in terms of overhead, packet delivery fraction, and latencies in VANET scenarios.
Abstract: The virtual node layer (VNLayer) is a cluster-based approach to handle communications in mobile ad hoc networks (MANETs), furnishing an abstraction of fixed geographical regions served by virtual nodes (VNs) as a means to tackle the challenges raised by the mobility of the physical nodes (PNs). Several studies have proved that the VNLayer constructs can be applied to improve the performance of existing routing algorithms, i.e., most notably Ad hoc On-Demand Distance Vector Routing (AODV) in general MANET scenarios. In this paper, however, we show that the same mechanisms do not work well in the more specific and demanding realm of vehicular ad hoc networks (VANETs). In response to this, we present several enhancements to the reference implementations of the VNLayer and the adaptation of AODV to work with VNs, proving by means of mathematical analysis and simulation experiments that our solutions achieve better performance in terms of overhead, packet delivery fraction, and latencies in VANET scenarios.

Proceedings ArticleDOI
01 Mar 2016
TL;DR: The aspect of energy consumption in MANET's routing protocols is discussed and a performance comparison of four routing protocols Dynamic Source Routing, Ad hoc On-Demand Distance Vector, Destination-Sequenced Distance Vector and Optimized Link State Routing with respect to average energy consumption is explained thoroughly.
Abstract: In Mobile Ad-hoc NETwork (MANET) each node has the possibility to move freely in the space and communicate with each other over wireless link without any centralized controller or base station These characteristics makes MANET useful and practical in several fields like military scenarios, sensor networks, Rescue operations, students on campus, etc but this kind of network still suffers from a number of problems, power consumption is one of the most crucial design concerns in Mobile Ad-hoc networks as the nodes in MANET have battery limited In this paper, we will discuss about the aspect of energy consumption in MANET's routing protocols A performance comparison of four routing protocols Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), Destination-Sequenced Distance Vector (DSDV) and Optimized Link State Routing (OLSR) with respect to average energy consumption are explained thoroughly Then, an evaluation of how the varying parameters of network in diverse scenarios affect the power consumption in these four protocols is discussed A detailed simulation model using Network Simulator 2 (NS2) with different mobility and traffic models is used to study their energy consumption

Proceedings ArticleDOI
22 May 2016
TL;DR: EQ-AODV aims to improve AODV protocol and make it effective for multimedia data in WMSNs and improves important QoS parameters namely the network load and the end to end delay.
Abstract: Our contribution in this paper is to propose a new solution called EQ-AODV (Energy and QoS supported AODV) for better performance in WMSNs (Wireless Multimedia Sensor Networks). EQ-AODV aims to improve AODV protocol and make it effective for multimedia data in WMSNs. This improvement is based on the adaptation of the routing process of AODV according to two parameters. The first one is the energy of sensors belonging to the routing roads and the second parameter is the nature of the packets received by these sensors. The considered data are text data, audio and video streaming data. After the evaluation of the performance and based on the obtained results, EQ-AODV showed a better performance compared to AODV. EQ-AODV improves important QoS parameters namely the network load and the end to end delay. Important improvement in terms of the life time of sensors and the consumed energy is recorded too.

Proceedings ArticleDOI
18 Mar 2016
TL;DR: This paper introduces trusted AODV routing protocol which trust value calculate using tangent hyperbolic function and shows performance improvement as compared to standard A ODV protocol.
Abstract: A mobile ad-hoc network (MANET) is a wireless network such that nodes are move dynamically in network. In network layer so many attacks but introduce only collaborative black hole attack a group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. In this paper we introduce trusted AODV routing protocol which trust value calculate using tangent hyperbolic function. The result shows performance improvement as compared to standard AODV protocol.

Proceedings ArticleDOI
01 Sep 2016
TL;DR: This work focuses on creating a vehicular ad hoc network scenario for telemedicine, where an attempt is made to identify an optimal solution using 802.11 networking standard.
Abstract: Advancement in wireless technologies to improve telemedicine is one of the major goals in recent times. Wireless telemedicine for emergency primary healthcare is a technology which provides mobile healthcare and exchange of medical data from ambulances or rural healthcare centers to hospitals. This helps the hospitals to understand patients' medical condition before they arrive. The idea is to be prepared in advance for hospitals to respond to such cases. This work focuses on creating a vehicular ad hoc network scenario for telemedicine, where an attempt is made to identify an optimal solution using 802.11 networking standard. A vehicle-to-vehicle connection is created which has been evaluated using various node densities by choosing 802.11n, 802.11p and 802.11b with AODV (Ad-Hoc On demand Distance Vector) routing protocol. Constant bit-rate traffic is used between the ambulance and hospital. Validations for the standards are carried out for the parameters PLR (Packet Loss Ratio), delay and throughput considering blood pressure, video and audio transmission. The performance results are analyzed for all three standards based on mobility and varying vehicular speeds. We have compared the results of various parameters for each scenario and attempted to identify the better performing standard. NS3 has been used for simulation in networks, whereas for traffic simulation SUMO (Simulation of Urban Mobility) is used.

Proceedings ArticleDOI
01 Nov 2016
TL;DR: The results show that the reactive protocols outperform the proactive ones and especially AODV presents the best performance in the random as well as the real map with different mobility models characteristics (speed and area size).
Abstract: Vehicular ad-hoc networks (VANETs) have received great attention lately with promises of increasing automobile safety and convenience. However, VANET's unique properties and characteristics made the design of routing protocols a very challenging task. Nevertheless, a wide spectrum of routing protocols where proposed in the literature. In this work, we opt to analyze the performance of topology-based routing protocols in different city environments. We used MOVE and SUMO to generate a random map. Then, we increased the area of the map to test its effect on the performance of three topology-based protocols: AODV, DSDV and DSR. Thus, we have performed a test of the speed influence on these protocols' performance with a real map topology. The results show that the reactive protocols outperform the proactive ones and especially AODV presents the best performance in the random as well as the real map with different mobility models characteristics (speed and area size).