scholarly journals Efficient Neighbour Feedback Based Trusted Multi Authenticated Node Routing Model for Secure Data Transmission

2021 ◽  
Vol 13 (23) ◽  
pp. 13296
Author(s):  
Praveen Bondada ◽  
Debabrata Samanta ◽  
Shehzad Ashraf Chaudhry ◽  
Yousaf Bin Zikria ◽  
Farruh Ishmanov

The Mobile Ad Hoc Network (MANET) is a network that does not have a fixed infrastructure. Migratory routes and related hosts that are connected via wireless networks self-configure it. Routers and hosts are free to wander, and nodes can change the topology fast and unexpectedly. In emergencies, such as natural/human disasters, armed conflicts, and emergencies, the lowest configuration will ensure ad hoc network applicability. Due to the rapidly rising cellular service requirements and deployment demands, mobile ad-hoc networks have been established in numerous places in recent decades. These applications include topics such as environmental surveillance and others. The underlying routing protocol in a given context has a significant impact on the ad hoc network deployment power. To satisfy the needs of the service level and efficiently meet the deployment requirements, developing a practical and secure MANET routing protocol is a critical task. However, owing to the intrinsic characteristics of ad hoc networks, such as frequent topology changes, open wireless media and limited resources, developing a safe routing protocol is difficult. Therefore, it is vital to develop stable and dependable routing protocols for MANET to provide a better packet delivery relationship, fewer delays, and lower overheads. Because the stability of nodes along this trail is variable, the route discovered cannot be trusted. This paper proposes an efficient Neighbour Feedback-based Trusted Multi Authenticated Node (NFbTMAN) Routing Model. The proposed model is compared to traditional models, and the findings reveal that the proposed model is superior in terms of data security.

Author(s):  
Rajesh Shrivastava ◽  
Rashween Kaur Saluja

The mobile Ad Hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. Routing protocol election in MANET (Mobile Ad Hoc Network) is a great challenge, because of its frequent topology changes and routing overhead. In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. For this reason, constructing simulation models closer to the real circumstances is very significant. For widening the coverage area of the MANET there is a growing need to integrate these ad hoc networks to the Internet. For this purpose we need gateways which act as bridges between these two different protocol architectures. The gateway discovery in hybrid network is considered as a critical and challenging task. In this paper the AODV reactive routing protocol is extended to support the communication between the MANET and the Internet. We have carried out a systematic simulation based performance evaluation of the different gateway discovery approaches using NS2 under different network scenarios. The performance differentials are analyzed on the basis of three metrics – packet delivery fraction, average end to-end delay and normalized routing load.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2021 ◽  
Vol 9 (1) ◽  
pp. 191-197
Author(s):  
Omar Faruque, Tadiwa Elisha Nyamasvisva, Abdullahi Mujaheed Saleh, Hasliza Binti Hashim

Wireless technology has brought a very advanced change in the field of the internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) which makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network that consists of a collection of wireless mobile nodes, and the communication between these nodes has been carried out without any centralized authority. There are several network performance metrics, Packet Loss and End-to-End Delay which can be taken into account, for getting a general idea about the performance of the Geographical Routing Protocol in Mobile Ad-Hoc Networks. The proposed research will evaluate the parameters which affect the communication in the Geographical Routing Protocol in Mobile Ad-Hoc Networks.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Author(s):  
Zhiyan A. Younis ◽  
Adnan Mohsin Abdulazeez ◽  
Subhi R. M. Zeebaree ◽  
Rizgar Ramadhan Zebari ◽  
Diyar Qader Zeebaree

Disasters could cause communication systems partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily maintainable to provide better services. Wireless ad-hoc networks could be the choice of establishing communication with the aid of existing infrastructure in a post-disaster case. In order to optimize mobile ad-hoc network performance, address the challenges that could lead to unreliable performance is required. One and most crucial key challenge is routing information from a sender to receiver. Due to the characteristics of a disaster environment such as signal attenuation, communication links exist between rescue crew is short-lived, suffer from frequent route breakage, and may result in unreliable end-to-end services. Many routing protocols have been proposed and evaluated in different network environments. This paper presents the basic taxonomy of Mobile Ad Hoc Networks and the state of the art in routing categorizes (Proactive, Reactive, Geographic-aware and Delay tolerant Networks (DTN)). The comparison of existing routing protocols in Mobile Ad-Hoc Networks indicates that overhead in Proactive and Geographic is competitive with delay in Reactive and DTN routing.


Author(s):  
Pawitar Dulari

Security is an essential requirement in wireless ad hoc network. The type of ad hoc networks makes them vulnerable to distinct forms of attack. The random nature of these networks makes invoke of security a challenging issue. The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks. Then it presents the main attack categories that exist in it. Finally presents the current security solutions for the mobile ad hoc network.


2013 ◽  
Vol 11 (9) ◽  
pp. 2994-3003
Author(s):  
Reeta Mishra

Now a day, security in Mobile Ad hoc Network is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Therefore attacks in this are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping.This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behaviour during the process of route discovery. For any received REQ, the black hole claims having a route and propagates a faked REP. The source node responds to these faked REPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination.The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; REP is overloaded with an extra field to indicate the reliability of the replying node. 


Author(s):  
Revathi Venkataraman ◽  
T. Rama Rao

This chapter covers issues related to security in mobile ad hoc networks. It acts as a comprehensive survey material covering the cryptographic schemes and trust modeling techniques traditionally found in mobile ad hoc network (MANET) survey articles. The need for hybrid security techniques, involving both cryptographic approach and trust based model, in a resource constrained ad hoc network, is also emphasized in this work. Additionally, the lack of realism in the research works related to ad hoc network security is also pointed out. The state of the art in ad hoc security should employ hybrid techniques that can be easily implemented in an ad hoc network. This will lead to the large scale deployment of mobile ad hoc networks in various context-aware applications.


Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


Sign in / Sign up

Export Citation Format

Share Document