scholarly journals Recent Advances in Mobile Ad Hoc Networks

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1446
Author(s):  
Michel Kadoch

Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort [...]

Author(s):  
N. Chand

Mobile wireless networks allow a more flexible communication structure than traditional networks. Wireless communication enables information transfer among a network of disconnected, and often mobile, users. Popular wireless networks such as mobile phone networks and wireless local area networks (LANs), are traditionally infrastructure based—that is, base stations (BSs), access points (APs), and servers are deployed before the network can be used. A mobile ad hoc network (MANET) consists of a group of mobile hosts that may communicate with each other without fixed wireless infrastructure. In contrast to conventional cellular systems, there is no master-slave relationship between nodes, such as base station to mobile users in ad-hoc networks. Communication between nodes can be supported by direct connection or multi-hop relays. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment. All of these guarantee anywhere and anytime communication. Recently, mobile ad-hoc networks have been receiving increasing attention in both commercial and military applications.


2010 ◽  
Vol 20 (1) ◽  
pp. 9-16 ◽  
Author(s):  
Nenad Kojic ◽  
Marija Zajeganovic-Ivancic ◽  
Irini Reljin ◽  
Branimir Reljin

Mobile ad-hoc networks (MANET) are one of wireless networks implementation. MANET is very popular technology initially based on military purposes. Specific modifications of MANET created a possibility to implement several new wireless networks. One of them is a wireless mesh network (WMN). Over the last ten years, WMNs have gained more and more attention and are now considered as a convincing solution for providing better Internet access services for end users. WMN is an emerging technology that offers a cost-effective and scalable method to connect wireless devices. The main problem in WMNs is a routing protocol, especially because it has to enable the access to network for both mesh and conventional clients. Most of the existing ad hoc routing protocols use minimum hop-count as a metric for identifying the best packet routes. This paper presents neural network based approach to routing protocol for WMN. Neural networks are capable to analyze very complex network environments and solve routing problems on optimal (or almost optimal) way.


Author(s):  
SK. JASMINE ◽  
CH. SUBBARAO ◽  
P. BABU

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naı¨ve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naı¨ve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics


2005 ◽  
Vol 06 (02) ◽  
pp. 63-84
Author(s):  
PETRA BERENBRINK ◽  
THOMAS FRIEDETZKY ◽  
JÁN MAŇUCH ◽  
LADISLAV STACHO

We introduce a notion of t-quasi-spanner as an alternative to classical t-spanners. Our motivation for quasi-spanner comes from a problem of computing a sparse backbone for ad hoc wireless networks with fixed transmission ranges. We study computational complexity of the problem of computing sparsest quasi-spanner. Then we concentrate on the case t = 2 and give a distributed algorithm for computing a 2-quasi-spanner with linear number of edges. Finally, we give a modification of our algorithm which performs well on a class of random ad hoc networks.


Author(s):  
Ahmed Elkabour ◽  
Dr. Rahma Teirab Abaker Haroun

Abstract - Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry. Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.


Author(s):  
Winston K.G. Seah ◽  
Hwee-Xian Tan

Mobile ad hoc networks (MANETs) form a class of multi-hop wireless networks that can easily be deployed on-the-fly. These are autonomous systems that do not require existing infrastructure; each participating node in the network acts as a host as well as a packet-forwarding router. In addition to the difficulties experienced by conventional wireless networks, such as wireless interference, noise and obstructions from the environment, hidden/exposed terminal problems, and limited physical security, MANETs are also characterized by dynamically changing network topology and energy constraints.


Author(s):  
Lei Zhang ◽  
Chih-Cheng Chang ◽  
Danfeng Yao

This chapter presents the technical challenges and solutions in securing wireless networks, in particular infrastructure-less wireless networks such as mobile ad hoc networks and wireless sensor networks. Communications in infrastructure-less wireless networks are challenging, as there are no trusted base stations to coordinate the activities of mobile hosts. Applied cryptographic tools, in particular threshold cryptography, play an important role in the trust establishment, message security, and key management in such networks. We describe several technical approaches that integrate applied cryptography techniques into mobile ad hoc networks and wireless sensor networks. We also outline several research directions in these areas.


2017 ◽  
Vol 15 (43) ◽  
pp. 45-63
Author(s):  
María Alejandra Bernal ◽  
Wilfer Sneyder Cortés ◽  
Miguel Ángel Leguizamón

Presently, telecommunications are key for several human activities. However, there are some places where their use is not possible because of the absence of the required infrastructure: antennas, routers and switches. The Mobile Ad-Hoc Networks [MANET] has become a key tool for wireless networks because of its two major advantages: they do not depending on infrastructure and offers complete mobility. This paper aims to show their development; introduce their basic concepts, features, advantages, challenges and operation modes; and present how it can be useful, emphasizing in day to day activities, as education.


Sign in / Sign up

Export Citation Format

Share Document