Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark.

Size: px
Start display at page:

Download "Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark."

Transcription

1 Design and Development of Secure Data Cache Framework

2 CHAPTER 6 DESIGN AND DEVELOPMENT OF A SECURE DATA CACHE FRAMEWORK The nodes of the MANETs act as host and a router without trustworthy gateways. An Ad Hoc network could be subjected to user misbehaviour or malicious attacks and hardware or software failures. These aspects make the security issues more challenging in a MANET than the Internet, since a wide variety of attacks might exploit its weaknesses. Although security is an important issue in Ad Hoc networks, information access is also very important since the aim of using ad hoc networks is to offer information access to mobile nodes. Dynamic network connections and restricted energy supplies in MANETs make the data accessibility in data access applications a challenging task. Caching frequently accessed information at the clients is an effective strategy to enhance the performance in mobile environments. When caching is used, information available in the server is duplicated on the caching nodes. As the mobile node has the responsibility to return the cached data, or alter the route and forward a data request to a caching node, it is very important that mobile nodes do not maliciously amend the data, drop or forward the data request to the wrong destination. The proposed work concentrates on improving the cooperative caching mechanism by incorporating security. 6.1 INTRUSION DETECTION SYSTEM (IDS) AND CACHING ARCHITECTURE Intrusion detection is achieved by comparing the actual behaviour of the system with the normal behaviour of the system in the absence of any intrusions. The normal and abnormal behaviours of the system could be initialized during the design of IDS. 76

3 The intrusion detection techniques are classified into two categories as anomaly detection and misuse detection or signature detection. Misuse based detection detects the occurrence of known attacks. Anomaly based technique detects misbehaviour by measuring variation from a normal behaviour (D. E. Denning, 1987; F.Anjum et al., 2003). Caching diminishes the information access latency since information access requests might be served from the local cache, thereby avoiding the need for data transmission over the limited wireless links. As mobile nodes in Ad Hoc networks may have similar tasks and share common interest, cooperative caching, which permits the sharing and coordination of cached data among multiple nodes, could be utilized to decrease the transfer speed and power utilization. The mobile devices don t need to send requests to the information source as they share the information among the neighbouring nodes. Caching the data item (CacheData) and the data path (CachePath) and both (HybridCache) are proposed in (L. Yin et al., 2003). A cluster based approach has been proposed that divides the MANET into equivalent clusters based on the proximity (N. Chand et al., 2006). In another scheme the queries are cached along with the data path (H. Artail et al., 2008). When the data items are cached, there may be a high storage requirement. A prefetch based cooperative caching has been done with the data mining rules which sense the future needs of the mobile nodes (Naveen Chauhan et al., 2012). Mieso K.Denko et al. (2009) proposed a cluster based cooperative caching scheme to improve cross-layer optimization by reducing query delay. It improves network performance by reducing the client query delay, reducing traffic congestion, improving client capacity by adopting clustering and also provides the quick retrieval of required 77

4 data by using cooperative caching and cross-layer design approach. In all the caching schemes, the security of the data packets has not been addressed. A data communication mechanism which combines the concept of Artificial Immune System (AIS) along with Ant Colony Optimization (ACO) has been proposed which provides better performance than immune system with AODV protocol (S.Umamaheswari et al., 2012). Node mobility in MANET causes node failure which leads to path distraction that raises end-to-end delay. Security not only means giving protection against known and unknown attacks but also involves injecting immunity into data packets or mobile nodes. Message from source may not reach the destination because of many reasons such as node mobility, paucity of traffic monitoring, scarcity of battery power and bandwidth, lack of security etc. A malicious node can easily decline to forward routing message (misbehaviour node) inject the wrong routing packets, changing routing information, which disturb the proper functioning of the routing scheme. Due to the limited resources in MANET, there may be a delay in forwarding the data packets. Hence the design of secured routing algorithm and an improved caching architecture is a major issue in MANETs. 6.2 SECURE DATA CACHE FRAMEWORK - ANTSEC ANTSEC (AntHocNet + Security) framework has been proposed by the author that contains an Enhanced Cooperative Caching Scheme (ECOCA) embedded with Artificial Immune System (AIS). This framework improves security by injecting immunity to the data packets, improves the packet delivery ratio and reduces end to end delay using Cross layer design. The issues of node failure and the malfunction of nodes have been addressed during the cache management. 78

5 ANTSEC framework combines the features of Anthocnet protocol, Artificial Immune System, Cross layer design and Clustering. The main components of the proposed framework are ECOCA middleware and the Stack Profile (Cross Layer). The COCA middleware proposed by Mieso K.Denko et al. (2009) has been added with Artificial Immune System Packet (AISp) and Cross Layer Control (CLCp) and the Stack Profile is added with Routing Table, Detector Set and Cross Layer Control (CLC) for the design of the ANTSEC framework. AISp and CLCp are embedded with each Data Packet (DP) which is received from the Application Layer. AISp or CLCp gets activated when there is a malfunction in the nodes or node failure. The system architecture is depicted in Figure 6.1. Application Layer Cache Consistency Cache Replacement Prefetching Stack Profile (Cross Layer Information) Cached Item IDS Cache Admission Control Information Search Network Traffic Routing Table Clustering Detector Set CLCp AISp CLC ECOCA Middleware Transport Layer Network Layer Data Link Layer Figure 6.1 System Architecture of ANTSEC Framework 79

6 ECOCA is a middleware which stays below the Application Layer and provide the functionalities such as caching, data management and security. Functional components of ECOCA agent include information search, caching/prefetching, clustering, Stack profile, and User interface which works in similar way as specified by Mieso K.Denko et al. (2009). Two control packets named AIS control packet (AISp) and Cross Layer Control Packet (CLCp) have been added to the middleware. A cross-layer design approach improves the performance. There are several schemes proposed for implementing the cross-layer approach in mobile wireless networks. The functionality of existing internal protocols, such as the Internet Control Message Protocol (ICMP) is extended or the packet headers are modified to carry cross- layer information (N.Yang et al., 2005). Cross-Layer Signaling Shortcuts (CLASS) scheme creates shortcuts between adjacent or nonadjacent layers, which need to exchange and share information. Any two protocol layers can communicate with each other directly using the shortcuts (Q.Wang et al., 2003). A new component is created as an independent vertical layer, in addition to the traditional layered protocol stack for cross-layer information exchange. This architecture could be used for full cross-layer design. As the shared data is kept in the vertical layer, data duplication could be avoided (M.Conti et al., 2004). The Stack Profile module of the ANTSEC framework is independent of the protocol stack that bridges the main network layer and the cross layer and provides information exchange buffer for protocol layers in the protocol stack. Cached Item IDs, Network Traffic, Routing table, Detector set, and member function CLC (Cross Layer Control) are the components of the proposed Stack profile. Network Traffic Status 80

7 information is provided by the data link layer. The middleware layer needs it for the prefetching process. Cached Item IDs is provided by the ECOCA middleware layer and is used by the network layer. Stack profile is defined as a class in ECOCA agent. When it is initialized, it gets pointers pointed to ECOCA agent. Agent mainly monitors all the data packets and propagation path. It maintains up to date information about the network. Routing table contains routing information and pheromone value between two nodes. CLC function takes care of identifying the failure nodes and does the process of rerouting. Earlier, wired networks mainly used proactive scheme routing protocols which periodically generates ant-like agents for all possible destinations. In reactive scheme routing information is gathered when an event triggers for new route or in case of failure of existing route. In proactive scheme routing information is gathered earlier before the start of new event. ACO algorithm uses a control packet called ant agent to sample possible paths towards destination. In ECOCA, Routing information obtained by ant agents can be updated in Stack profile. Routing table holds pheromone variables that are continually updated according to path quality values calculated by the ant agents. When ant agents move on the same path repeatedly and concurrently, then generation of path-sampling results in the availability of a bundle of paths at each node with an estimated measure of quality. Functions of ECOCA Agent Table 6.1 depicts the assumptions used to define the procedures AIS and CLC. 81

8 Table 6.1. Assumptions for the procedures AIS and CLC Definition Data Packet Severity Base line path Cluster head Current behaviour/event Detect or set behaviour/event Pheromone Value Symbols DP S BP CH Cb Db phvalue MANET is a collection of mobile nodes that involves well behaving node and misbehaving node. Initially, the behaviour of the MANET is learnt and the sequence of events of the routing protocol is assigned to a label. Detector set contains sequence of labels at different time period for the events such as data packet sent, data packet received, etc. It is based on the negative selection part of the self-nonself model. Upon receiving the data request, the cache management related functions are invoked and the data is received from the application layer. The control packets AISp and CLCp are embedded into the received data packets. AISp adds immunity into the data packets to identify the node malfunction and CLCp detects the failure nodes during the path discovery and provide a new path for routing. Generally, destination node alone could open the data packets. AISp control packet gets activated and checks whether this behaviour is normal or abnormal by comparing it with detector set when intermediate 82

9 node tries to open the data packet or if a node tries to add extra information into the data packet. If the match is found then AIS won t allow the node to open the data packet. AIS make use of Negative Selection algorithm to find the detector set. This set contains the abnormal behaviour that is completely different from normal behaviour. Hamming distance is used to find the match between normal and abnormal behaviour. Commonly, Negative Selection algorithms are applied to anomaly detection or novelty detection problems. ECOCA Function Step 1: Receives DP from Application layer Step 2: Embed AISp (Artificial immune system packet) and CLCp (Cross layer control packet) along with DP Step 3: During route discovery phase, AnthocNet protocol propagates and finds the shortest path. Ant selects Best path based on the quality of pheromone value between nodes. After propagation mode the ants move to transition mode. Once first DP reaches the destination, BP is stored in source cache. Step 4: Detector set is obtained from Negative Selection Algorithm. It contains abnormal behaviour. Step 5: Severity is based on the quantity of pheromone value. Step 6: AISp gets activated when an intermediate node tries to open the data. Step 7:CLCp gets activated when there is less quantity of pheromone value in a particular node. It passes the control to CLC. 83

10 Procedure AIS (Cb, Detector set) Begin If the Cb = = Db then Discard current behaviour Else Propagate End Since it is the mobile node, dynamic change in network topology leads to node failure, traffic, etc. Node failure occurs when a node moves out of its cluster which is the major cause for ACO route distraction. In the ACO system pheromone values are significant to find the path. If an ant traversal reduces on specific node the pheromone value get evaporated. Therefore, strength of the node or path can be determined by the pheromone value. In this framework the pheromone value is mapped with sensitivity of the node or path. The sensitivity is referred in terms of percentage and classified through the following conditions high sensitive (ph<30%), moderate sensitive (30%<ph<60%) and low sensitive (ph>60%). The classification interval is an assumption, thus it can be altered if required. By classifying the pheromone value helps to decide the weak nodes among the path between source and destination. All the nodes with failure node as intermediate would update current phvalue which would be very less. Low phvalue makes the ant to propagate in different route. If the phvalue of all next hop nodes is low then in this case CLCp gets activated and passes the control to CLC in cross layer. It fetches the BP from the source node cache and 84

11 passes it to node with less phvalue. If phvalue is between 30 to 60% then ant propagates till time T after which it gets the routing path with large pheromone value from cluster head and reroute in that path. If phvalue in a node is more than 60% then ant propagates in that route for reaching the destination in short time. When there is distraction in path then CLCp gets activated similarly to find the malicious activity within network AISp has been proposed. It gets activated when a node performs unexpected event which would collapse the normal behaviour. Initially, the detector set is framed using Negative Selection algorithm. AIS compares current behaviour with list of behaviours in detector set. If a match found, it realize current behaviour is malicious and current event is discarded, else current event takes place. Procedure CLC (Datagram) Begin Get pheromone value from Routing table then If phvalue < 30% then S is more 1. Get BP from Source cache 2. Send BP directly to intermediate node where path distraction occurred. 3. Intermediate node Reroute to destination through BP Else if phvalue >30% and phvalue <60% then S is moderate Propagate till time T 85

12 If T expire then Get Correct Path from CH Reroute to Correct Path End if Else phvalue > 60% S is low Routing protocol propagates and find a path with high phvalue Data gets transmitted in that path End if End if End 6.3 PERFORMANCE EVALUATION The proposed ANTSEC framework was evaluated in an NS-2 simulation environment. Different simulation scenarios have been performed. The performance of the proposed framework is measured with packet delivery ratio and end to end delay. In the simulation, each mobile host moves in the simulation area following the random waypoint mobility model. The random waypoint model is used for simulating the movement pattern of mobile host in a MANET. For 100 and 150 nodes simulation was carried out in 1500*1000m. In Table 6.2, the simulation parameters are listed. 86

13 Table 6.2. ns-2 Simulation Parameters Parameter Value Transmission Range(M) 250 Bandwidth(Mbps) 3 Node Speed(M/s) 0-10 Routing Protocol AntHocNet Pause Time(S) 100 Cache size (KB) 300 Average TTL (S) Zipf-like Parameter ( ) Number of Data items 1000 No. of nodes 100,150 Request Interval(S) 10 Simulation Time 2000 sec. To evaluate the performance of the proposed ANTSEC framework, two scenarios based on number of mobile nodes have been considered. In scenario 1 and 2, five Tcl simulations run have been conducted in 100 and 150 nodes, based on which average end to end delay and packet delivery ratio has been obtained. Generally, misbehaving node may cause raise in delays, packet drop and reduce throughput of the network. To reduce this factor AISp has been embedded within the data packet. This prevents the network from nodes that cause abnormal behaviour. 87

14 Table 6.3. Network Performance on 100 nodes (100 Nodes) Scenario1 Packet Delivery Ratio Delay ANTSEC AODV+COCA ANTSEC AODV+COCA Mean SD The mean value of packet delivery ratio and end to end delay of ANTSEC framework presented in Table 6.3 shows good performance than AODV+COCA as it contains cross layer control CLC. This CLC manages path distraction due to node failure which certainly reduces end to end delay. As there is decrease in delay, packet delivery ratio gets increased. But there is no control for managing Path distraction in case of AODV+COCA. The delivery ratio was 93.25% in the ANTSEC framework where it was 88.7% in case of AODV+COCA. ANTSEC framework has 15.27% efficient in reducing the delay and 5.13% efficient in improving the packet delivery ratio than AODV+COCA while transmitting the packets. 88

15 Table 6.4. Statistical Analysis for 100 Nodes 100-nodes Mean SD t-value df p-value PDR-ANTSEC vs. PDR-AODV+COCA DELAY-ANTSEC vs. DELAY-AODV+COCA Table 6.5. Network Performance on 150 nodes (150 Nodes) Scenario2 Packet Delivery Ratio Delay ANTSEC AODV+COCA ANTSEC AODV+COCA Mean SD ANTSEC framework shows good performance in the Tcl simulation runs as specified in Table 6.5. The delivery ratio was 92.26% in the ANTSEC framework where it was 88.79% in case of AODV+COCA. In case of delay, ANTSEC transmits the packet within ms where as AODV+COCA takes around ms. The proposed framework has 12.42% efficient in reducing the delay and 3.9% efficient in improving the packet delivery ratio than AODV+COCA while transmitting the packets. 89

16 Packet Delivery Ratio (%) Table 6.6. Statistical Analysis for 150 Nodes 150-nodes Mean SD t-value df p-value PDR-ANTSEC vs. PDR-AODV+COCA DELAY-ANTSEC vs. DELAY-AODV+COCA PACKET DELIVERY RATIO with 150 NODES ANTSEC AODV+COCA SCENARIO WITH 150 NODES Figure 6.2 Packet Delivery Ratio with 150 Nodes 90

17 Packet Delivery Ratio (%) Delay (in Sec) 400 DELAY with 150 NODES ANTSEC AODV+COCA SCENARIO WITH 150 NODES Figure 6.3 Delay with 150 Nodes 96 PACKET DELIVERY RATIO with 100 NODES ANTSEC AODV+COCA SCENARIO WITH 100 NODES Figure 6.4 Packet Delivery Ratio with 100 Nodes 91

18 Delay (in Sec) 350 DELAY with 100 NODES ANTSEC AODV+COCA SCENARIO WITH 100 NODES Figure 6.5 Delay with 100 Nodes The packet delivery ratio of the network with 150 nodes and 100 nodes is depicted in the figure 6.2 and figure 6.4 respectively. The delay of the network with 150 nodes and 100 nodes is depicted in figure 6.3 and figure 6.5 respectively. The statistical analysis of the performance is depicted in Table 6.4 and Table 6.6. Statistical paired t-test has been proposed to evaluate the significant difference between proposed model and existing model with respect to Packet Delivery Ratio (PDR) and Packet Delay. The 100-nodes evaluation shows that the paired value of PDR is , Delay is , and both p-values are less than the level of significance Similarly 150-nodes also evaluated, which shows that the paired value of PDR is , Delay is , and both p-values are less than the level of significance Hence, the 92

19 proposed model has found significant effect on existing model with respect to PDR and Delay in both the scenarios with 100 nodes and 150 nodes. The ANTSEC framework always outperforms AODV+COCA as it embeds AIS and ECOCA; both factors make the proposed framework more efficient with higher PDR (Packet Delivery Ratio). As the framework uses AntHocNet protocol and the misbehaving nodes are identified by the AIS packets (AISp) which are embedded into the Data Packets (DP) the end-to-end delay is lowered. From the above results, it is proved that the proposed ANTSEC framework works well in large network size including malicious nodes. 6.4 SUMMARY The design of secure data cache framework ANTSEC that is capable of improving self-immunity of data packets and decreases delay caused by node failure is presented in this chapter. The successful delivery of data packets with the ability to protect itself from mild attacks makes the framework more efficient than ordinary secure data transmission mechanism using AODV. ANTSEC framework contains AIS and ECOCA, which is a unique blend of data security and cache management. As the data packets are embedded with the immunity packet AISp, it can be guaranteed to provide far more effective protection against hacker incidents during data transmission. The cache management is handled through cluster based co-operative caching. ANTSEC has performed well in most of the scenarios compared with AODV-COCA method that is evaluated with the parameters end-to-end delay and packet delivery ratio. 93

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Cross-Layer System for Cluster Based Data Access in MANET S

Cross-Layer System for Cluster Based Data Access in MANET S Cross-Layer System for Cluster Based Data Access in MANET S Anand Nayyar Department of Computer Applications & IT, KCL Institute of Management and Technology, Jalandhar E-mail : anand_nayyar@yahoo.co.in

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching

Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching B.S.V.N.L.GAYATRI,Dr M.H.M. KRISHNA PRASAD Dept of Information Technology, UCEV JNTUK, Vizianagaram,

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS Melvin John Supervised By Dr. Cheryl Pope & Dr. Cruz Izu Submitted to the School of Computer Science The University

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Energy Efficient Cooperative Caching in Mobile Ad Hoc Networks Naveen Chauhan 1, Lalit K. Awasthi 1, Narottam Chand 1, R.C. Joshi 2 and Manoj Misra 2 1 Department of Computer Science and Engineering, National

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio Analysis of TCP and UDP Traffic in MANETs Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio MANET Routing Protocols Proactive protocols Maintain routes to all nodes Distance vector, link

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks * Naveen Chauhan 1, Lalit K. Awasthi 1, Narottam Chand 1, R.C. Joshi 2 and Manoj Misra 2 1 Department of Computer Science and Engineering National

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Cross Layer Detection of Wormhole In MANET Using FIS

Cross Layer Detection of Wormhole In MANET Using FIS Cross Layer Detection of Wormhole In MANET Using FIS P. Revathi, M. M. Sahana & Vydeki Dharmar Department of ECE, Easwari Engineering College, Chennai, India. E-mail : revathipancha@yahoo.com, sahanapandian@yahoo.com

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE ISSN : 0973-7391 Vol. 3, No. 1, January-June 2012, pp. 97-101 ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE Praveen Biradar 1, and Sowmya K.S 2 1,2 Dept. Of Computer Science and Engineering, Dayananda

More information

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network International Journal of Computer Science and Telecommunications [Volume 4, Issue 10, October 2013] 41 ISSN 2047-3338 Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

MANET routing protocols based on swarm intelligence

MANET routing protocols based on swarm intelligence MSC SEMINAR - PERVASIVE AND ARTIFICIAL INTELLIGENCE RESEARCH GROUP, DEPARTMENT OF INFORMATICS, UNIVERSITY OF FRIBOURG. JUNE 20111 MANET routing protocols based on swarm intelligence Iliya Enchev Pervasive

More information

Chapter-2 Routing Protocols of MANET

Chapter-2 Routing Protocols of MANET Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Ant-DYMO: A Bio-Inspired Algorithm for MANETS

Ant-DYMO: A Bio-Inspired Algorithm for MANETS 21 17th International Conference on Telecommunications Ant-: A Bio-Inspired Algorithm for MANETS José Alex Pontes Martins Universidade Vale do Acaraú (UVA) Sobral, Brazil 62.4 37 Email: alexmartins@larces.uece.br

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS Department of computer science Thadomal Shahani engineering college Mumbai-400051, ABSTRACT: In this era of mobile devices, mobile ad-hoc network (MANET)

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Security Enhancement

More information

Routing and Security Enhancement in Mobile Ad-hoc network using Optimized Authenticated Routing Protocol (OA-AODV)

Routing and Security Enhancement in Mobile Ad-hoc network using Optimized Authenticated Routing Protocol (OA-AODV) Routing and Security Enhancement in Mobile Ad-hoc network using Optimized Authenticated Routing Protocol (OA-AODV) Gurbinder Singh Brar 1, Kirti Gupta 2 1 Associate Professor, Computer Science Department,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET

Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET Saurav Ghosh & Chinmoy Ghorai A.K Choudhury School of Information Technology, University of

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Security in DOA routing protocol for Mobile Adhoc Networks

Security in DOA routing protocol for Mobile Adhoc Networks Security in DOA routing protocol for Mobile Adhoc Networks Vanitha.M 1, Deepak.S 2, Ayesha.N 3 1,2,3 Department of Electronics and Communication Engineering, Sriram Engineering College Abstract One of

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in

CHAPTER 4. The main aim of this chapter is to discuss the simulation procedure followed in CHAPTER 4 4. Simulation procedure 4.1 Introduction The main aim of this chapter is to discuss the simulation procedure followed in evaluating the performance of AODV under black hole attacks. As discussed

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ISSN 2277 8322 Simulation and Performance Analysis of and on Varying and Number of Nodes in MANET Arun Jain 1, Ramesh Bharti

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile

More information

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks Journal of Computer Science 3 (9): 700-707, 2007 ISSN 1549-3636 2007 Science Publications A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

More information

Re-Clustering Approach using WCA in DSR and OLSR Routing Protocols in MANET

Re-Clustering Approach using WCA in DSR and OLSR Routing Protocols in MANET Bonfring International Journal of Networking Technologies and Applications, Vol. 3, No. 2, June 2016 4 Re-Clustering Approach using WCA in DSR and OLSR Routing Protocols in MANET Harshit Prakash Patidar

More information

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information