Filters








2,867 Hits in 4.2 sec

Security Architecture for Cluster based Ad Hoc Networks [article]

Preetida Vinayakray-Jani, Sugata Sanyal
2012 arXiv   pre-print
Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks.  ...  Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device.  ...  INTRODUCTION Mobile Ad hoc Networks (MANETs) allow mobile nodes to form a self-organized network without need for a permanent infrastructure.  ... 
arXiv:1207.1701v1 fatcat:gn4afxsawna2pgvcgu6n6qxrue

Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter

Anuradha T.Thakre, Sandeep Kadam
2014 International Journal of Computer Applications  
In Mobile Ad Hoc network (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor's position for effective and  ...  This new protocol fundamentally deals with Mobile Ad Hoc network where a persistent infrastructure is unavailable and the location identification is necessarily learnt via.  ...  Packet leashes are known example of this approach. [10] Secure Neighbourhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking", P. P. Papadimitratos, M. Poturalski, P. Schaller, P.  ... 
doi:10.5120/17413-7997 fatcat:ylkgw35esjf6di75a7x7oewa6y

Securing AODV against Wormhole Attack using Token based Approach

Mohit Kumar, Nidhi Shalya
2012 International Journal of Applied Information Systems  
In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research.  ...  As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network.  ...  Many basic ad hoc network functions and operations rely on accurate neighbourhood discovery, hence it is extremely important to defend ad hoc networks from wormhole attacks and ensure secure neighbourhood  ... 
doi:10.5120/ijais12-450807 fatcat:27ipin5ovjecziboglzlxwnpsy

Routing Protocols for WMNs: A Survey

Amar Singh, Shakti Kumar, Sukhbir Singh Walia
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In this paper we have reviewed wide range of existing routing protocols which are being applied for wireless mesh networks.  ...  Routing is one of the most challenging issues encountered in the Wireless Mesh Networks (WMNs) due to the dynamic nature of WMNs.  ...  The Secure Link State Protocol (SLSP) [51] for mobile ad hoc networks is responsible for securing the discovery and distribution of link state information.  ... 
doi:10.23956/ijarcsse.v7i7.87 fatcat:yol77msslnbwxnk4mfw7jf5cjy

BeFriend: A Context-Aware Ad-hoc Social Networking Platform

Vanja Smailović, Vedran Podobnik
2016 Automatika  
This paper describes the BeFriend, a contextaware ad-hoc social networking platform based on Facebook and Google+ social graphs.  ...  Original scientific paper Ad-hoc social networks, focused on managing user social relationships in a novel fashion based on establishment of temporary social connections among users with mutual interests  ...  that ad-hoc social networks assume.  ... 
doi:10.7305/automatika.2016.03.1037 fatcat:7ugxtkdqlrgqrbrspzhqwifysm

Faith based Routing in Mobile Ad Hoc Network

Rohini Jatana, Rajesh Kumar
2016 International Journal of Computer Applications  
Secure routing protocols are a crucial area towards security of MANET. The routing solutions for conventional networks are not sufficient to work efficiently in Ad Hoc environment.  ...  MANET is a collection of wireless mobile nodes that work together by forwarding packets for each other to let them to communicate outside the range of direct wireless transmission or with each other.  ...  INTRODUCTION 1.1 Mobile Ad Hoc Network Mobile Ad Hoc network is a set of wireless mobile nodes: that work together by forwarding packets for each other to let them to communicate outside the range of direct  ... 
doi:10.5120/ijca2016910012 fatcat:nz47jn7csber3i5fpu655hnzju

Security Enhancements of AODV Protocol: A Comparative Study
English

A.Rani chitra, V.Lakshmi Praba
2014 International Journal of Innovative Research in Computer and Communication Engineering  
Ad hoc networks are a new-fangled wireless networking paradigm for mobile nodes. Unlike traditional wireless networks, ad-hoc networks do not rely on any fixed infrastructure.  ...  The overall goal of the security solutions for ad-hoc networks is to provide security services to the users.  ...  AODV is best suited for public mobile ad-hoc networks as it consumes less bandwidth and lower overhead.  ... 
doi:10.15680/ijircce.2014.0212020 fatcat:tz3rmtxqdfbylb4b52wacd27na

A Key Exchange Approach for Proficient and Secure Routing in Mobile Adhoc Networks

L Raghavendar Raju, C R K Reddy Reddy
2017 International Journal of Interactive Mobile Technologies  
<p>Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources.  ...  In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks.  ...  We proposed a new Key Exchange Approach for proficient and secure routing protocol for mobile ad hoc networks.  ... 
doi:10.3991/ijim.v11i4.6440 fatcat:52xydv7vkbcutnolw4dtocrv5e

Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Dilpreet Kaur, Naresh Kumar
2012 International Journal of Computer Network and Information Security  
Mobile Ad-Hoc Networks (MANETs) are autonomous and decentralized wireless systems.  ...  Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure.  ...  Computer Network and Information Security, 2013, 3, 39-46 in Mobile Ad-Hoc Networks Copyright © 2013 MECS I.J. Computer Network and Information Security, 2013, 3, 39-46 VII.  ... 
doi:10.5815/ijcnis.2013.03.05 fatcat:ciekivh6lzcnhl5uzyjeq2xtji

Existing MANET routing protocols and metrics used towards the efficiency and reliability- an overview

Shafinaz Buruhanudeen, Mohamed Othman, Mazliza Othman, Borhanuddin Mohd Ali
2007 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications  
Each node in a MANET (Mobile Ad Hoc Network) functions as both a host and a router.  ...  A wireless ad hoc network is a collection of two or more devices/ nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralised  ...  Efforts have been taken for achieving efficient and reliable routing in mobile ad hoc networks.  ... 
doi:10.1109/ictmicc.2007.4448632 fatcat:rnwszxmsabaapgmq6rhypxxmtq

Comparative Analysis of Proactive, Reactive and Hybrid Routing Protocols for Improving Quality of Service in Mobile Ad-Hoc Networks
English

Divya Bandral, Reena Aggarwal
2015 International Journal of Engineering Trends and Technoloy  
This paper aims to analyse and compare the performance of well-known On-demand routing protocols Ad hoc On demand Distance Vector (AODV), Table- -2).  ...  Each mobile node act as a router which forwards the packets to destination by first sending the packet to the nearest hop, various routing protocol are designed for this purpose.  ...  ACKNOWLEDGEMENT We are highly indebted to Lovely Professional University for providing us necessary resources i.e. library, internet facility, research lab etc. for pursuing the research work.  ... 
doi:10.14445/22315381/ijett-v30p237 fatcat:lmhxp3776jerhgwbo5kuwfdwce

DESIGNING AN OPPORTUNISTIC ROUTING SCHEME FOR ADAPTIVE CLUSTERING IN MOBILE AD-HOC NETWORKS

M. Viswanathan .
2013 International Journal of Research in Engineering and Technology  
We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering (ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm  ...  for cluster based communication.  ...  INTRODUCTION A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices interconnected by wireless network.  ... 
doi:10.15623/ijret.2013.0203026 fatcat:sauhjricmzdubp5jhcn44hejfi

Implementation of Routing Security Aspects in AODV

Suman Deswal, Sukhbir Singh
2010 Journal of clean energy technologies  
Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless  ...  This paper proposes a security solution for manets using a pre-existing routing protocol, ad hoc on-demand vector routing (aodv), using password security for each routing node and timeliness to update  ...  INTRODUCTION A mobile ad hoc network (MANET) is a collection of mobile nodes that can instantly establish a network, whenever they coexist in the same neighbourhood without the need of any fixed infrastructure  ... 
doi:10.7763/ijcte.2010.v2.129 fatcat:ye5odnfgdndcvmdkd5lfoqctzy

A Survey on Routing Protocols and QoS in Mobile Ad Hoc Networks (MANETs)

L. Raghavendar Raju, C. R. K. Reddy
2017 Indian Journal of Science and Technology  
Applications: The designing of these routing protocols is an interesting task because of mobility, the dynamic behavior of the Mobile Ad-hoc Networks.  ...  The purpose of any ad-hoc network routing protocol is to meet these challenges. Therefore, it becomes an essential parameter for MANETs to develop a proficient routing and QoS procedures.  ...  So, it is a challenging task to design a scalable and reliable routing protocol for mobile Ad-hoc networks because of frequent change in network topology.  ... 
doi:10.17485/ijst/2017/v10i8/106593 fatcat:35ocyrqswvfdtna5abeybnufzu

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks

Busola S. Olagbegi, Natarajan Meghanathan
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).  ...  There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks.  ...  Secure Ad hoc On-Demand Distance Vector (SAODV) Routing Protocol The Secure Ad hoc On-Demand Distance Vector (SAODV) [55] routing protocol is an efficient secure routing protocol for mobile ad hoc networks  ... 
doi:10.5121/jgraphoc.2010.2201 fatcat:iuvltpmdh5ek5n2trvwwudqa2y
« Previous Showing results 1 — 15 out of 2,867 results