Improving Probability Expectation Definition in Subjective Logic

Size: px
Start display at page:

Download "Improving Probability Expectation Definition in Subjective Logic"

Transcription

1 Improving Probability Expectation Definition in Subjective Logic Mehdi Seyrafi 1, Nasrollah Moghadam Charkari 2 1, 2 Electrical and Computer Engineering Department, Tarbiat Modares University,Tehran, Iran m.seyrafi, moghadam}@modares.ac.ir Abstract: Subjective logic extends probabilistic logic by also expressing uncertainty about the probability themselves. This makes reasoning in presence of uncertain or incomplete evidence conceivable. It has useful applications in trust management and reputation systems. Probability expectation is one of the subjective logic operators and definitions. It has an important effect on performance of systems based on subjective logic. In this paper we propose an enhanced definition for expectation in subjective logic. We applied it on a reputation system in MANET. Simulation results show better performance for the system when using enhanced expectation definition. Keywords: subjective logic, expectation, reputation, MANET. 1. Introduction 1.1. Subjective Logic Backed in Dempster-Shafer theory of evidence [1], Josang introduced subjective logic [2, 3], as an uncertainty favoring probabilistic logic. To enable reasoning with argument models in presence of uncertain or incomplete evidence, subjective logic extends probabilistic logic by augmenting the probability values with uncertainty about themselves. Arguments in subjective logic are called opinions. An opinion denoted by ω y:x = ( b y:x, d y:x, u y:x, a y:x ), expresses the relying party y s belief in the truth of statement x. Here b, d, and u and a represent belief, disbelief, uncertainty, and base rate respectively. They meet the following conditions: (1) The base rate is the a priori probability in the absence of committed belief mass. In other words, it is the default willingness of part y to believe truthfulness of statement x when y has no evidence of x. Therefore it determines how uncertainty is viewed as belief. Uncertainty is considered as disbelief for a base rate of 0.0, while it is regarded as belief for a base rate of 1.0. When coming to comparison of opinions or decision making based on them, the opinion should be transmuted into a single value. It is the probability expectation value, which in subjective logic is calculated by: E y:x = b y:x + u y:x a y:x (2) The more evidence about x is gathered by y, the more pise expectation it can compute. Therefore probability expectation E expresses the a posteriori probability, when there is some evidence of the statement x. For example, if the opinion of y about x is ω y:x = (0.8, 0.0, 0.2, 0.5), then its expectation is E y:x = b y:x + u y:x a y:x = = 0.9. Also a completely uncertain opinion (0.0, 0.0, 1.0, a y:x ) always has an expectation equal to the base rate, i.e. E y:x = b y:x + u y:x a y:x = a y:x = a y:x. Base rate then becomes the default expectation for unknown entities (nodes of MANETs, hereon) Subjective Logic in Reputation Systems Multi-hop communication is the basis of connectivity in mobile ad hoc networks (MANETs), wireless mesh networks (WMNs) and some other types of networks. It relies on the cooperation of intermediate nodes in forwarding packets toward destination. However, some nodes may seek benefits in refraining from cooperation. Such selfish behavior of nodes may degrade overall performance of a network or even paralyze it. Thus preventing this type of behavior in such networks is an important issue to deal with. Various reputation systems [4-6] have been suggested and evaluated to incentivize nodes to cooperate. These systems generally involve some mechanisms to detect selfish nodes and carry some punishments for them. Isolating selfish nodes will restore network performance for remaining cooperative nodes. In such systems, initially, all nodes are completely uncertain about selfishness of each other. Every node has a kind of default positive reputation to have the chance to start interactions and gather more positive reputation. The past interactions of a node with its neighbors should be gathered as the evidences to discover selfish behavior of the node. The evidence may be obtained from dit interactions with the desired node, or captured ommendations from other neighboring nodes. To aggregate the collected evidence into a single value, handle contradictions and decide whether a node is selfish or not, a logic or framework is required. Subjective logic is an attractive candidate. It has ently been popular in reputation systems. In reputation system proposed in [7], every node collects evidences of its neighboring nodes. The evidences are merged into a subjective logic opinion and the opinion is saved in a reputation table. Upon facing a new evidence (having an interaction with a specific node), it is combined in the current opinion about that node. The new opinion then replaces the old one. This helps avoiding the need to save evidences one by one, and thus decreases memory usage. When a cooperative node eives a request from another node, it checks its reputation table to find out whether the requester is selfish or not. If there is not enough evidence about the requester, it calls neighbors whether they have any 107

2 useful opinion about the requester. After collecting all ommendations, they are merged into a single opinion using subjective logic cumulative fusion operator [3], to form the final opinion. Different kinds of weighting average operators have been applied to merge the eived ommendations [7-10]. Expectation of not being selfish for the requester node is computed by applying subjective logic expectation operation in equation (2) to the final opinion. If it falls below a predefined threshold, it will be considered as selfish and therefore its service request is rejected; otherwise its request is accepted and service is granted. We enhanced standard subjective logic expectation formula to facilitate rapid detection of selfish nodes. Simulations show using our definition expectation results in considerable improvement in decreasing success rate of selfish nodes compared to former related works. 2. Deficiencies of Current Expectation Definition As stated in section 1, the base rate a is the a priori probability in the absence of any evidence. In the field of MANETs, this means if there is no evidence of the behaviors of a node, its probability expectation to cooperate in forwarding packets from others, is equal to the base rate. Therefore setting a proper value as the base rate is very important. Setting a proper value for base rate requires good knowledge about nodes in the MANET. This is not normally feasible, as administration of nodes may be independent and with different requirements. Therefore base rate is usually set to 0.5. This leads to a value of 0.5 for expectation E, at the startup of operation of MANET. If a node is completely selfish, it does not forward any requested packets. Then its real expectation to forward packets is 0. To hide the selfishness and have some chance to get service from others, selfish nodes may cooperate with a probability γ ϵ [0, 1). In this case, the real expectation for selfish nodes is γ. The cooperation rate of selfish nodes (γ) is not known by others when the network starts up or when a new node joins the network. While gathering more evidence, uncertainty decreases, and computations result in more pise values for expectation. So computed expectation converges to cort value, which is γ. Consider a node y and its neighbor x in the reputation system used in [9]. After node y interacts with node x, it updates its opinion about node x using the following algorithm: If node x accepts the request from node y, the interaction is positive. Then y adds the value δ to its belief about node x (b y:x ), and decreases the uncertainty about x (u y:x ) by δ. If node x drops request from node y, the interaction is negative. Then y adds the value δ to its disbelief about node x (d y:x ), and decreases the uncertainty about x (u y:x ) by δ. The peding algorithm is followed until u y:x reaches zero. Then for upcoming interaction: for positive interactions: (3) for negative interactions: (4) Figure 1 shows how expectation E of selfish node x changes in the view of node y, while interactions are performed. Here we have γ=0.3 and δ=0.01. Figure 1. Expectation (E1) of a selfish node to cooperate using standard subjective logic definition, where cooperation rate γ = 0.2, step size δ = and base rate ɑ = 0.5. As can be seen in Figure 1, it takes a period of time to come to true expectation. E changes from the value a at startup, to γ after 1/δ steps, in which δ is the change value applied to opinion parameters after each interaction. In that period, the incort expectation considered for node x, is greater than the real value. It causes node y to accept service requests from selfish node x. This means that it takes some time for node y, to ognize node x as a selfish node. Convergence time is the average value of the time for all cooperative nodes to detect selfish nodes. We seek smaller convergence time to have a better performance of the reputation system. 3. Proposed Improvement In order to decrease the convergence time, we should decrease the effect of a on calculation of E, while more evidence is being collected. To yield this, we replace base rate a in equation (2) with a weighted average of base rate and the proportion of positive interactions amongst total number of interactions: (5) In equation (5), ω 1 and ω 2 are the weighting factors. At startup, when there is no evidence, b and d are zero. So ω 1 108

3 should be zero and ω 2 (weight of base rate) should be 1 (the maximum value). When enough evidence is collected, b+d becomes 1. At this time the weight of evidences should have reached to its maximum value, while base rate should have lost its effect on expectation. Therefore at this time ω 1 is 1 and ω 2 is 0. To meet the aforesaid criteria for ω 1 and ω 2, we choose ω 1 = 1-u and ω 2 = u. Substituting ω 1 and ω 2 in equation (5), we have: [ ] Despite linear relation of E and u in equation (2), we come to a nonlinear relation in equation (6). Now we consider equation (6) from a different perspective. If we factor out u, we have: Equation (7), suggests that E 2 can be calculated by replacing a with E 1 in equation (2). We can further replace a in equation (6) with E 1 to come to the equation of E 3 with degree 3: The same way we can have E 4 : We use the same scenario described in section 2 for all E 1 to E 4 to create Figure 2. (6) (7) (8) (9) MANETs to find and isolate selfish nodes. It is based on the system defined in [7] and [9] Preliminaries Any request from a node such as forwarding a packet, declaring a route, etc. can be simulated by sending a generic service request, and then eiving a request acceptance reply, request rejection reply or not eiving any reply from the target. When a packet is sent to a neighbor expecting it to forward, if the neighbor does forward it, the originator node can hear that too. The original packet can be regarded as a service request and the forwarded packet can be regarded as a service acceptance reply. If the neighbor selfishly drops that packet, no packet can be heard by originator and it can be regarded as not having any response to service request. We assume there are two types of nodes in network: Selfish nodes, which do not accept service requests from other nodes. However they may try to hide their selfishness by accepting requests with a probability of γ ϵ [0, 1). If a request is not to be accepted, it will be silently dropped; no reply is sent back. Cooperative nodes, which always accept requests from other nodes known to be cooperative. Interactions between nodes fall into three categories: If a request acceptance reply is eived, it is considered a positive interaction. If a request rejection reply is eived, it is considered an uncertain interaction. If no reply is eived within a defined timeout, it is considered a negative interaction Dit Opinion Each node saves an opinion about every one of its dit neighbors in its reputation table. At startup, each node assigns an uncertain opinion ω uncertain =(0,0,1,0.5) to every neighbor. Any positive or negative interaction alters node s knowledge about the neighbor and reduces uncertainty about it. δ ϵ [0, 1] is defined to determine how much change should be applied to opinion after an interaction. Opinions on reputation table are updated using the following algorithm: If the interaction is positive, If u δ, then Figure 2. Expectation of a selfish node to cooperate, using different definitions of expectations, where E1 is the standard subjective logic definition, cooperation rate γ = 0.2, step size δ = and base rate ɑ = 0.5. Else, As Figure 2 shows, all expectations converge to final value (γ). But it converges more rapidly for a greater degree of equation E. So we expect less total convergence time in a MANET to find selfish nodes when using E 2 or E 3 instead of standard expectation (E 1 ). We also expect less average success rate for the selfish nodes in the network. If the interaction is negative, If u δ, then Else, 4. A Reputation System as Test-bed We define a subjective logic based reputation system for 109

4 In case of an uncertain interaction there would be four cases: If b,d δ/2, then Else if b< δ/2 and d δ/2, then Else if b δ/2 and d < δ/2, then Else if b,d< δ/2, then Obviously as number of interactions increases, the uncertainty value decreases to zero, resulting in more accurate opinion Recommendations When cooperative node y eives a service request from node x, it retrieves opinion ω y x from its reputation table. If u y x, information is enough for decision about node x. So node y assumes ω y x as final reputation ω final y x. If u y x > β, node y decides that there is not enough information about node x. So it broadcasts a reputation query packet to its dit neighbors and waits for ommendations from them. Upon eiving a reputation query, each neighbor checks its reputation table for node x. If it has already interacted with node x, its uncertainty about node x is smaller than 1. So it responds node y with its reputation about node x. Node y waits for a period of T seconds to accumulate all ommendations. Then it merges ommendations to build up a single ommended opinion ω y x b y x y x u y x a y x. The merge process is actually a weighted average of ommendations belief, disbelief and uncertainty as follows: b y x d y x u y x (10) Where R denotes the set of ommenders, and V i is the weight factor computed as: E y i (11) E y In equation (11) E y:i is the expectation of y about i, and C i:x is the familiarity value introduced in [9]. It is proportional to how node i is certain about node x, and is calculated as: C i:x = b i:x +d i:x = 1 - u i:x (12) 4.4. Final Opinion As mentioned in previous section, if uncertainty about service requester node is less than the threshold β ( u y x ), information is enough for decision about node x. So final node y assumes ω y x as the final reputation (ω y x ω y x ), otherwise node y calculates the ommended opinion ω y x using ommendations eived from other nodes. In this case, subjective logic cumulative fusion operator is applied to ommended and opinions to compute final opinion: final ω y x ω y x ω y x b y x d y x u y x 4.5. Decision About Selfishness b y x u y x b y x u y x u y x u y x u y x u y x d y x u y x d y x u y x u y x u y x u y x u y x u y x u y x u y x u y x u y x u y x y x (13) After computing final opinion ω final y x, it is time to decide whether node x is selfish or not. This is done by comparing its expectation with the minimum required expectation α. If final E y x, node x is considered as cooperative by node y, its request is accepted and a request acceptance reply packet is sent back to it. Otherwise it is considered selfish and a request rejection reply is sent back. 5. Evaluation We evaluate our definition of expectation by incorporating it on a MANET reputation system in a simulation environment. The reputation system is detailed in section 4. The scenario is run 2 times, first applying standard subjective logic expectation defined in equation (2), and then applying our enhanced expectation definition (E 2 ) in equation (6). We then compare the performance results of the reputation system to find the influence of expectation definitions Simulation Environment OMNET is used as the platform for simulation. To simulate MANETs, inetmanet framework is used in OMNET++. We use AODV routing protocol on an IEEE g MAC protocol. For simplicity, the MAC is changed to work ideally. No signal attenuation and conflict is considered. Transmission range for all nodes is set to 100 meters. 110

5 (a) (b) (c) (d) Figure 3. Average success rate of selfish nodes (10 out of total 50 nodes are selfish) (a) γ=0, speed=0m/s (b) γ=0, speed=2m/s (c) γ=0.2, speed=0m/s (d) γ=0.2, speed=2m/s 50 nodes are randomly deployed in an area of Table 1. Simulation Parameters meters. 10 nodes are selected to act selfishly. Each node selects a random neighbor every 5 seconds and sends it a service request. Packets are UDP based with 512 bytes fixed data size. To mitigate the effect of random seed selection in software, all experiments in our simulations are repeated 16 times with different random seeds, and the resulted values are averaged. Parameters details are listed in Table 1. Parameter Simulation area Number of mobile nodes Value m Performance Metric We consider success rate of selfish nodes to evaluate the model. Success rate is defined as proportion of service requests accepted by cooperative nodes per total number of requests sent to them by a specific node, at a given period. The more selfish nodes are detected, the less success rate selfish nodes would have. Detection process of selfish nodes causes this rate to decrease more and more for selfish nodes. We average this value from all selfish nodes. The more rapidly it decreases for all selfish nodes, the more efficient is selfishness detection scheme Simulation Results Figure 3 shows average success rate of selfish nodes in the network. As can be seen in all cases, when using enhanced expectation definition (E 2 ), success rate of selfish nodes drops more rapidly compared to using standard subjective logic expectation (E 1 ). When there is no mobility (a) and (c), selfish nodes are detected more rapidly and their success rate will soon drop to value γ. While selfish node moves around, it faces new nodes, which have no evidence of its past behavior. They provide service to the selfish node until they ognize it as a selfish one. Therefore mobility of selfish nodes makes it more difficult for the whole network to detect them. So, as can be seen in (b) and (d), success rate of selfish nodes needs more time to reach the final value. As shown in Figure 3 (b) and (d), the performance is even more improved in the face of mobility. 111 Simulation time 1600 s Media Access Control (MAC) Protocol IEEE g Transmission range Routing protocol Traffic type Packet rate Packet size Maximum node velocity Mobility model 100 m AODV CBR 1 every 5 sec. 512 bytes 0, 2 m/s Random WP Cooperation rate of selfish nodes γ 0.0, 0.2 Uncertainty threshold β 0.1 Minimum required expectation α 0.3 Reputation query period T Service request timeout (detect negative interaction) 4.5 s 4 s Base rate a 0.5

6 6. Conclusion In this paper we have defined an enhanced method to compute probability expectation for subjective logic opinions. Our new definition decreases the effect of base rate more rapidly than the standard one, when there is some evidence about the truth of the statement. Simulations on a MANET reputation system show better performance when using this enhanced definition instead of the standard one. Acknowledgement The work reported in this paper has been supported in part by the Informatics Services Corporation (ISC) 1. References [1] G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, [2] A. Josang, "A Logic for Uncertain Probabilities," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), pp , [3] Audun Jøsang. Subjective Logic. Draft book, January ( July 10, 2012) [4] Malamati Louta, Stylianos Kraounakis, Angelos Michalas, "A SURVEY ON REPUTATION-BASED COOPERATION ENFORCEMENT SCHEMES IN WIRELESS AD HOC NETWORKS," International Conference on Wireless Information Networks and Systems, July , Athens, Greece, pp [5] Chengqi, S. and Z. Qian, "Protocols for stimulating packet forwarding in wireless ad hoc networks," Wireless Communications, IEEE, vol. 17(5), pp , [6] A. M. Raafat, M. Fathy, A. Yehia, M. A. Azer, "Cooperation incentives in wireless Ad hoc networks," 2nd International Conference on Education Technology and Computer - ICETC'10, 2010 [7] P. Kane, P.C. Browne, "Using uncertainty in reputation methods to enforcecooperation in ad-hoc networks," Proceedings of the 5th ACM Workshopon Wireless Security, September 2006, pp [8] Venkat Balakrishnan, Vijay Varadharajan, and Uday Tupakula, "Subjective Logic Based Trust Model for Mobile Ad-hoc Networks,"Proceedings of the 4th ACM International Conference on Security and Privacy in Communication Networks(SecureComm 2008), Istanbul, Turkey, September [9] Yining Liu, Keqiu Li, Yingwei Jin, Yong Zhang, Wenyu Qu, A novel reputation computation model based on subjective logic for mobile ad hoc networks, Future Generation Computer Systems, vol. 27,pp , [10] Hui Lin, Li Xu, Jianliang Gao and Kai Yang, "A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)," Scientific Research and Essays, vol. 6(18), pp , 1September,

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks 1 Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks Tiranuch Anantvalee and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca

More information

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs International Journal of Mathematics and Computational Science Vol. 1, No. 4, 2015, pp. 206-213 http://www.aiscience.org/journal/ijmcs Kuder Richardson Reputation Coefficient Based Reputation Mechanism

More information

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks Heng Chuan Tan School of Electrical and Electronic Engineering Nanyang Technological University Singapore htan005@e.ntu.edu.sg

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:  Volume 4, Issue VI, June 2016 ISSN SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

{vsiris,athanas}j(ics.forth.gr

{vsiris,athanas}j(ics.forth.gr 2005 International Conference on Wireless Networks, Communications and Mobile Computing Creating Motives for Cooperation to Achieve High Throughput in Wireless Ad Hoc Networks Vasilios A. Siris and Chariklia

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs Page 19 Oeconomics of Knowledge, Volume 3, Issue 2, 2Q, Spring 2011 Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs M.L. SHARMA Professor & Head (ECE Department) BGIET

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

A METHOD TO DETECT PACKET DROP ATTACK IN MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Integrating Dirichlet Reputation into Usage Control

Integrating Dirichlet Reputation into Usage Control Integrating Dirichlet Reputation into Usage Control Li Yang and Alma Cemerlic University of Tennessee at Chattanooga Cyber Security and Information Intelligence Research Workshop 2009 Motivation of the

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3 International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi

More information

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L International Journal of Scientific & Engineering Research, Volume 1, Issue 3, December-2010 1 Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 8 (August 2017), PP.46-51 A Novel Approach To Detect Trustworthy Nodes

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets

Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42

More information

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT AN ENHANCED CROSS LAYER SCHEME FOR BACK OFF ATTACK AND NETWORK LAYER MISBEHAVIOR DETECTION IN MANET R. Kumaran* 1 & K P K Devan 2 Department of Computer Science and Engineering, Easwari engineering college

More information

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Security Enhancement of AODV Protocol for Mobile Ad hoc Network Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel 1, Ms Vandana Verma 2 1,2 RCEW, Jaipur, Rajasthan, India. ABSTRACT Here, authors presents a smart encryption algorithm

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks

Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks Christoforos Panos 1, Chirstoforos Ntantogian 2, Stefanos Malliaros 2, Christos Xenakis 2 1 Department of Informatics

More information

COOPERATION-AWARE TOPOLOGY CONTROL

COOPERATION-AWARE TOPOLOGY CONTROL COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Decision Fusion using Dempster-Schaffer Theory

Decision Fusion using Dempster-Schaffer Theory Decision Fusion using Dempster-Schaffer Theory Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview Introduction

More information

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Copyright 2018 Tech Science Press CMC, vol.57, no.2, pp.297-306, 2018 Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Chak Fong Cheang 1, *, Yiqin Wang 1, Zhiping Cai 2 and

More information

ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK

ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK Pankaj Kumar, Vinod Kumar Mishra, Poonam Rautela Department of Computer Science & Engineering, B. T. Kumaon Institute of Technology, Dwarahat,

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks

TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks Abstract In this paper, we design and formulate a novel trust-based routing protocol for secure transactions, such as military and disaster

More information

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004 Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with

More information

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

More information

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);

More information

Effective Bandwidth Allocation for WiMAX Mesh Network

Effective Bandwidth Allocation for WiMAX Mesh Network Effective Bandwidth Allocation for WiMAX Mesh Network Hung-Chin JANG and Wei-Ching LIN Department of Computer Science National Chengchi University Taipei 11605 Taiwan R.O.C. ABSTRACT The aim of this paper

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models

Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models ICACSIS 2012 ISBN: 978-979-1421-15-7 Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models Harris Simaremare*, Abdusy Syarif**, Abdelhafid

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai Bloom Filter for Network Security Alex X. Liu & Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University Bloom Filters Given a set S = {x 1,x 2,x

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks

SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks Wenjia Li Department of Computer Science New York Institute of Technology New York, New York 123 Email: wli2@nyit.edu

More information

Opportunistic routing to forgo flooding attacks in MANET

Opportunistic routing to forgo flooding attacks in MANET Opportunistic routing to forgo flooding attacks in MANET 1 Elakkiya.M, 2 Dr.Edna Elizabeth.N, 1 PG Student, 2 Professor 1 Dept of ECE, SSN college of Engineering, Chennai, India 2 Dept of ECE, SSN college

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information