scholarly journals Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks

2017 ◽  
Vol 28 (1) ◽  
pp. 31-46
Author(s):  
A.A. Adas A.A. Adas

This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


Respuestas ◽  
2015 ◽  
Vol 20 (1) ◽  
pp. 38
Author(s):  
Henry Zárate-Ceballos ◽  
Jorge Eduardo Ortiz-Triviño

Antecedentes: Las redes Ad hoc son un nuevo paradigma dentro de las redes inalámbricas debido a sus características dinámicas y de auto configuración, aparecen como respuesta de conectividad para diferentes situaciones donde se requieren características adicionales a las ofrecidas por las redes convencionales, como protocolos de enrutamiento eficientes, interoperabilidad entre los dispositivos móviles y propiedades como el cambio de rol de los nodos dentro de la red. Objetivo: El objetivo del presente trabajo es generar diferentes entornos simulados en el software Network Simulator 2, variando los protocolos de enrutamiento, los servicios prestados y el tráfico en general para validar el rendimiento de una red Ad hoc. Métodos: Se presenta una detallada descripción de las características del simulador y de las abstracciones usadas para modelar cada uno de los elementos de red, resaltando la abstracción del nodo móvil quien hace las veces de terminal o enrutador con atributos de movilidad, consumo energético, manejo de protocolos de enrutamiento y cobertura, simulando todas las capas de red de un sistema real, se usan protocolos de enrutamiento reactivos y proactivos como lo son el AODV y el DSR, de la misma manera el protocolo FEBA en redes Mesh. Resultados: Al validar el rendimiento de los escenarios se utilizó una estructura Mesh para evaluar el efecto de redundancia multicanal, respecto a las arquitecturas tradicionales en redes Ad hoc y el número de saltos requeridos para la transmisión es mayor a las Mesh, lo cual genera latencia en las comunicaciones, las métricas mejoran con protocolos reactivos y aumentan con redundancia. Generando canales dedicados para el tráfico producido por los servicios, mejorando notablemente en más de 5 veces el rendimiento de una red ad hoc convencional. Conclusión El simulador NS-2 de código abierto es una herramienta vital, para modelar y simular redes de cualquier tipo, con la ventaja de poder modificar y crear las librerías existentes para crear ambientes simulados, más reales y que respondan a una necesidad de comunicaciones como lo es en situaciones de emergencia.Abstract Background: The Ad hoc networks are a new paradigm in wireless networks due to its dynamic characteristics and autoconFiguration, appear in response connectivity to different situations where additional to those offered by conventional networks such as protocols for efficient routing features are required, interoperability between mobile devices and properties as the changing role of the nodes within the network. Objective: The objective of this work is to generate different environments simulated in the Network Simulator 2 software, varying routing protocols, service and overall traffic to validate the performance of an Ad hoc network. Methods: A detailed description of the characteristics of the simulator ISSN 0122-820X and abstractions used to model each of the network elements is presented, highlighting the mobile node abstraction who acts as a router or terminal mobility attributes, energy consumption management protocols routing and coverage, simulating all network layers of a real system, reactive and proactive protocols routing are used as AODV and DSR, in the same way the FEBA protocol in Mesh networks. Result: To validate the performance of the scenarios one Mesh structure was used to evaluate the effect of multichannel redundancy, compared to traditional architectures in Ad hoc networks and the number of hops required for transmission is greater than the Mesh, which generates latency in communications, metrics improve with reactive protocols and increase redundancy. Generating dedicated for traffic produced by the services, improving considerably more than 5 times the performance of a conventional Ad hoc network channels. Conclusion: The NS-2 simulator open source is a vital tool for modeling and simulating networks of any type, with the advantage of being able to modify and create existing libraries to create simulated environments more realistic and responsive to a need for communications as it is in emergency situations.Palabras Clave: Redes Ad Hoc, Redes Mesh, Simulador de Redes 2(NS-2), Simulación


2009 ◽  
pp. 952-960 ◽  
Author(s):  
Subhankar Dhar

A mobile ad hoc network (MANET) is a temporary, self-organizing network of wireless mobile nodes without the support of any existing infrastructure that may be readily available on conventional networks. It allows various devices to form a network in areas where no communication infrastructure exists. Although there are many problems and challenges that need to be solved before the large-scale deployment of an MANET, small and medium-sized MANETs can be easily deployed. The motivation and development of MANET was mainly triggered by Department of Defense (DoD)-sponsored research work for military applications (Freebersyser and Leiner, 2002). In addition, ad hoc applications for mobile and dynamic environments are also driving the growth of these networks (Illyas, 2003; Perkins, 2002; Toh, 2002). As the number of applications of wireless ad hoc networks grows, the size of the network varies greatly from a network of several mobile computers in a classroom to a network of hundreds of mobile units deployed in a battlefield, for example. The variability in the network size is also true for a particular network over the course of time; a network of a thousand nodes may be split into a number of smaller networks of a few hundred nodes or vice versa as the nodes dynamically move around a deployed area. Ad hoc networks not only have the traditional problems of wireless communications like power management, security, and bandwidth optimization, but also the lack of any fixed infrastructure, and their multihop nature poses new research problems. For example, routing, topology maintenance, location management, and device discovery, to name a few, are important problems and are still active areas of research (Wu & Stojmenovic, 2004).


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
U Kumaran ◽  
A Ramachandran ◽  
J Jegan ◽  
E.K. Subramanian

<p>A self-configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network).  Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms to understand the strengths &amp; threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks. The methodology of honeypot detects and isolates the attacks of the black hole. The results prove better delivery of packets with decreased load of the network.</p>


Author(s):  
Subhankar Dhar

This chapter presents the current state of the art of mobile ad hoc network and some important problems and challenges related to routing, power management, location management, security as well as multimedia over ad hoc networks. A mobile ad hoc network (MANET) is a temporary, self-organizing network of wireless mobile nodes without the support of any existing infrastructure that may be readily available on the conventional networks. Since there is no fixed infrastructure available for MANET with nodes being mobile, routing becomes a very important issue. In addition, we also explain the various emerging applications and future trends of MANET.


2018 ◽  
Vol 7 (2.27) ◽  
pp. 150
Author(s):  
Rupinder Kaur ◽  
Sandeep Singh Kang

The mobile ad-hoc network is the decentralized type of network in which mobile nodes can move from one location to another. Due to random mobility of the mobile nodes route establishment, route maintenance is the major issues of mobile ad-hoc networks. This research paper, focus on the route establishment and route maintenance properties of mobile ad-hoc network. The DCFR protocol is the route establishment and route maintenance protocol in which broker route will be recovered on the basis of node connectivity. The node, which has maximum connectivity, is selected as the best node for route recovery in DCFR Protocol. In this research work, the DCFR protocol is further improved by adding buffer size parameter for route recovery which also maintains quality of service in the network. The proposed DCFR protocol simulation results perform well as compared to existing DCFR protocol in terms of certain parameters  


2011 ◽  
Vol 403-408 ◽  
pp. 994-1001 ◽  
Author(s):  
Mohd. Umar Farooq ◽  
Mohammad Pasha ◽  
Khaleel Ur Rahman Khan ◽  
Mahboob Ul Haq Atif

MANETS is a kind of ad-hoc network which is continuously changing and not predictable. The nodes in this kind of network are mobile and reorganize themselves randomly. Mobility of these nodes keeps changing from time to time. These nodes are connected using wireless connections to form an ad-hoc network called VANETS. In VANETS (vehicular ad-hoc network) the mobile nodes are vehicles which are equipped with their own resources to carry out the communication (like power, software etc). This paper deals with analyzing the vulnerabilities of VANETS and achieving data integrity and security by providing some authentic means of communication and standards. It describes a protocol which provides prevention against malicious node and how the network reacts in the presence of the malicious node. Using the concept of reliability tables, the paper describes a methodology to dynamically re-create a new route whenever a malicious node is interfaced thus achieving data integrity and security.


Author(s):  
Animesh K. Trivedi ◽  
Rajan Arora ◽  
Rishi Kapoor ◽  
Sudip Sanyal

Mobile ad hoc networks inherently have very different properties from conventional networks. A mobile ad hoc network (MANET) is a collection of mobile nodes that are self configuring (network can be run solely by the operation of the end-users), capable of communicating with each other, establishing and maintaining connections as needed. Nodes in MANET are both routers and terminals. These networks are dynamic in the sense that each node is free to join and leave the network in a nondeterministic way. These networks do not have a clearly defined physical boundary, and therefore, have no specific entry or exit point. Although MANET is a very promising technology, challenges are slowing its development and deployment. Nodes in ad hoc networks are in general limited in battery power, CPU and capacity. Hence, the transmission ranges of these devices are also limited and nodes have to rely on the neighboring nodes in the network to route the packet to its destination node. Ad hoc networks are sometimes referred to as multi-hop networks, where a hop is a direct link between two nodes. MANET has many important applications, including battlefield operations, emergency rescues, mobile conferencing, home and community networking, sensor dust and so forth.


Sign in / Sign up

Export Citation Format

Share Document