scholarly journals Time Synchronization Techniques in Wireless Network : A Survey

2016 ◽  
Vol 2 (9) ◽  
Author(s):  
Ravi Prakash Malviya ◽  
Achint Chugh

The time synchronization procedure is very important for power saving in wireless ad hoc network and  method used by the synchronization that method chooses a particular node and gives priority for transmitting a signal to that node. All the Other nodes synchronize to the selected node according to Time Synchronization Function. Here increasing research focus on designing synchronization algorithms specifically for sensor networks. This paper look for reviews of  time synchronization problem and the need for synchronization in sensor networks, then presents in detail time synchronization methods explicitly designed and proposed for sensor networks and AD-HOC networks.

Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


Author(s):  
Shahin Vakilinia ◽  
Mohammadhossein Alvandi ◽  
Mohammadreza Khalili Shoja ◽  
Iman Vakilinia

In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.


Author(s):  
Pawitar Dulari

Security is an essential requirement in wireless ad hoc network. The type of ad hoc networks makes them vulnerable to distinct forms of attack. The random nature of these networks makes invoke of security a challenging issue. The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks. Then it presents the main attack categories that exist in it. Finally presents the current security solutions for the mobile ad hoc network.


Telecom ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 32-47
Author(s):  
Kento Takabayashi ◽  
Shuhei Harada ◽  
Takumi Kobayashi ◽  
Katsumi Sakakibara ◽  
Ryuji Kohno

This research provides a novel extended orthogonal matched filter (EOMF) structure that supports multiuser detection. In addition, this structure is designed to suppress increases in computational complexity and circuit scale. In coming years, the number of Internet of Things (IoT) applications that use wireless ad hoc networks is expected to increase. To realize a highly reliable wireless ad hoc network, it is essential to introduce a method for cancelling the interference from other users. This research adopts a method based on code division multiple access (CDMA). However, a CDMA-based method has difficulty with deteriorating performance due to the near-far problem and the increase in the amount of interference as the number of users increases. Another problem is that the spreading sequence of each user is unknown in a wireless ad hoc network. The EOMF effectively removes interference while solving the above problems by combining an OMF and an adaptive array antenna. In this research, an EOMF structure with multiuser detection and lower computational complexity than the conventional EOMF is proposed. By the derived formulas and numerical examples, the proposed structure reduces the computational complexity by approximately 75% compared to the conventional EOMF and obtains sufficient bit error ratio (BER) performance.


Author(s):  
R. MADHUMATHI ◽  
J. JENNO RICHI BENAT

In Wireless Ad hoc network Stealthy packet dropping is a suite of four attacks—misrouting, power control, identity delegation, and colluding collision—that can be easily launched against multi hop wireless ad hoc network. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. In the same way Mobile ad hoc network also having the different types of attacks in network layer such as flooding attacks,rushing attacks, black hole attacks, gray hole attacks, wormhole attacks, sinkhole attacks, and Sybil attacks. We analyses different routing protocols and its route discovery technology.


2011 ◽  
Vol 1 (1) ◽  
Author(s):  
Mohit Jain ◽  
VISHNU K

Mobile Ad hoc networks are often used in places with little or no infrastructure. However its very nature of being dynamic and infrastructure less makes it vulnerable to many of the security related issues. In this paper we make use of the vulnerability present in the AODV protocol to present a new kind of Man in the Middle attack for MANETs namely, “The Paris Attack”.


2017 ◽  
Vol 7 (1.2) ◽  
pp. 181
Author(s):  
Ugendhar Addagatla ◽  
V. Janaki

In the wireless networks, the routing technique is the one of the highest concern and it is the important procedure in the ad hoc networks. To aid this effort, we proposed a new valuation of backpressure appliances for wireless networks. By this proposed system, we will address numerous preparation and routing difficulties and also recover the throughput and delay that are essentially produced by the packets at the node transmission. The Backpressure routing is a dense and enlarged throughput for wireless networks, but endures improved delays. In routing, the backpressure algorithm is known to afford throughput optimality with active traffic. The significant supposition in the backpressure algorithm is that all nodes are kind and detect the algorithm rules leading the information conversation and principal optimization necessities. In the proposed system, we validate that how the node is steady at the backpressure algorithm routing and also by together easing the virtual trust line and the real package queue. The backpressure algorithm not only achieves flexibility, but also stands the throughput performance under safety attacks. This scheme is mostly enhances the node performance at the time of announcement and also it recovers the node security at the time of numerous threats in the wireless requests.


Sign in / Sign up

Export Citation Format

Share Document