On the Effect of Radio Channel Propagation Models to the Ad Hoc Network Performance

Author(s):  
J. Prokkola ◽  
T. Braysy ◽  
T. Vanninen
2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


2021 ◽  
Vol 17 (1) ◽  
pp. 60-70
Author(s):  
Vinoth Kumar V. ◽  
Ramamoorthy S. ◽  
Dhilip Kumar V. ◽  
Prabu M. ◽  
Balajee J. M.

In recent years, WiFi offloading provides a potential solution for improving ad hoc network performance along with cellular network. This paper reviews the different offloading techniques that are implemented in various applications. In disaster management applications, the cellular network is not optimal for existing case studies because the lack of infrastructure. MANET Wi-Fi offloading (MWO) is one of the potential solutions for offloading cellular traffic. This word combines the cellular network with mobile ad hoc network by implementing the technique of Wi-Fi offloading. Based on the applications requirements the offloading techniques implemented into mobile-to-mobile (M-M), mobile-to-cellular (M-C), mobile-to-AP (M-AP). It serves more reliability, congestion eliminated, increasing data rate, and high network performance. The authors also identified the issue while implementing the offloading techniques in network. Finally, this paper achieved the better performance results compared to existing approaches implemented in disaster management.


2008 ◽  
Vol 4 (3) ◽  
pp. 219-235 ◽  
Author(s):  
Arta Doci ◽  
Fatos Xhafa

Simulation is a common approach for designing ad hoc network applications, due to the slow deployment of these networks. The main building blocks of ad hoc network applications are the routing protocols, mobility, and traffic models. Several studies, which use synthetic models, show that mobility and traffic have a significant effect on protocol performance. Synthetic models do not realistically reflect the environment where the ad hoc networks will be deployed. In addition, mobility and traffic tools are designed independently of each other, however real trace data challenge that assumption. Indeed, recent protocol performance evaluation using real testbeds show that performance evaluations under real testbeds and simulations that use synthetic models differ significantly. In this paper we consider jointly both real mobility and traffic for protocol performance evaluation. The contributions of this work are as follows: (1) demonstrates that real mobility and traffic are interconnected; (2) announces the design and implementation of WIT –Wireless Integrated Traffic–, which includes the design of a real traffic generator; (3) shows that under real mobility and integrated traffic the performance metrics need to be re-thought, thus we propose availability as a new ad hoc network protocol performance metric; and, finally, (4) evaluates protocol performance under synthetic and real mobility models with integrated traffic. We believe that the results of our work constitute a step forward toward benchmarking of ad hoc network performance evaluations.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


2021 ◽  

Abstract The full text of this preprint has been withdrawn by the authors while they make corrections to the work. Therefore, the authors do not wish this work to be cited as a reference. Questions should be directed to the corresponding author.


Wireless devices utilization had increased drastically, which has shown an impact on over-all demand and utilization Mobile Ad-Hoc Network (MANET). Routing protocol is the fundamental and vital performance factor in the Mobile Ad-hoc Network (MANET). The routing protocols in MANET are accomplished to handle a lot number of nodes with restricted resources. Multiple routing protocols exist in MANETs. Once of the main challenges in routing protocols is its generation of adverse influence on network performance. Accordingly, this paper plans to implement an obstacle-ware MANET routing model using improved meta-heuristic-based A* algorithm. The algorithm efficiently plots a path between multiple nodes avoiding obstacles, or points, on the graph that results in producing a shortest path without any obstacles. The improved meta-heuristic algorithm termed as Fitness and Position Ratiobased Chicken Swarm Optimization (FPR-CSO) is used to improvise the A* algorithm. The comparative analysis of different optimized A* over Ad hoc On-Demand Distance Vector (AODV) confirms the consistent performance of the proposed model


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lishui Chen ◽  
Jing Wang ◽  
Xing Chen ◽  
Yifu Zhang

Effective message forwarding between vehicles can reduce the occurrence of traffic accidents and improve the driving experience. Vehicle clustering can improve message utilization, but attackers in the network pose a serious threat to message forwarding. Based on vehicle clustering, we propose a message forwarding strategy for Vehicular Ad hoc Network. Specifically, the vehicles are clustered based on their directions and speeds. Besides, the friendship of vehicles is evaluated in terms of the interaction friendship and reference friendship. Based on the friendship of vehicles, the optimal vehicle can be selected as the cluster head. Thereafter, the double key technology is designed to encrypt vehicular messages such that the messages can be forwarded more safely and efficiently. The analysis results show that the proposed strategy can effectively improve the message delivery rate, reduce the message leakage rate, and improve the network performance.


2013 ◽  
Vol 846-847 ◽  
pp. 1697-1700
Author(s):  
Yuan Ming Ding ◽  
Hao Qu ◽  
Xue Wang

Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.


Sign in / Sign up

Export Citation Format

Share Document