• Title/Summary/Keyword: Adhoc Network

Search Result 31, Processing Time 0.023 seconds

A Study and Performance Analysis of TORA Routing Protocol in Vehicular Adhoc Networks

  • R.Jeevitha;K.Thilakavalli;D.Rajagopal
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.195-201
    • /
    • 2024
  • Vehicular Ad-hoc Networks (VANETs) became very popular in few years and it has been widely used in research and industry communities. VANET is a collection of wireless vehicle nodes forming a temporary network without using any centralized Road Side Unit (RSU). VANET is a subset of Mobile Adhoc Networks (MANET). It improves the safety of vehicles. It also supports Intelligent Transportation Systems.Routing is the major component of communication protocols in VANETs. Packets are to be routed from the source node to destination node. Because of frequent topology changes and routing overhead, selection of routing protocol in VANET is a great challenge. There are various routing protocols available for VANET. This paper involves study of Temporally Ordered Routing protocol (TORA) and performance metrics are analyzed with the help of NS2 Simulator.

Jxta-based SmartPhone Collaboration Application Supporting Group Workspace (Jxta 기반의 그룹 작업공간을 지원하는 스마트폰 협업 어플리케이션)

  • Park, Jong-Eun;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.511-521
    • /
    • 2012
  • JXTA technology is a set of open protocols that enable any connected device on the internet or MANET(Mobile Adhoc NETwork) to communicate in a P2P manner. In this paper, we present a JXTA-based smartphone collaborative application. For this, we define the core services and collaborative services necessary for a P2P network, and design proper protocols to support the services. The developed application provides the effective environment for group works in smartphones, supporting the various virtual workspaces. Since application supports the group works among users in close-range without relying on the mobile network, it could be very useful in various situations such as the disaster area.

Implementation of QoS Provisioning Model in VANET (VANET에서 QoS Provisioning모델의 구현)

  • Huh, Jee-Wan;Song, Wang-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.884-888
    • /
    • 2009
  • Vehicular Adhoc Networks (VANET), a Vehicle-to-Infrastucture or Vehicle-to-Vehicle communication technology, is an area that makes more specific use of Mobile Adhoc Networks(MANET). VANET's Quality of Service(QoS) focuses on preventing possible emergencies like car crash from happening by immediately transmitting information to the cars around, while MANET's QoS is being studied for the quality of multimedia data such as Video on Demand(VoD), Video streaming, Voice over IP(VoIP), etc. In this paper, I structure the actual network configuration using Link State Routing(LSR), implement QoS Provisioning Model using Common Open Policy Service(COPS), and suggest more effective k-hop Cluster and inter-domain policy negotiation which fit better to the characteristics of VANET.

  • PDF

Collision Avoidance Method Based-on Directional Antenna in Vehicular Ad Hoc Networks (Vehicular Ad Hoc Networks에서 방향성 안테나기반 충돌 회피 기법)

  • Kim, Kyung-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.627-633
    • /
    • 2008
  • In the case of traffic accidents, the broadcasting methods used in the mobile ad hoc network (MANET) cannot applied to transmit reliable message since moving high-speed in vehicular ad hoc networks (VANET) environments. In this paper, in order to guarantee transmitting reliable messages, we propose a collision avoidance method based-on directional antenna in VANET. In order to reduce interference from omni-broadcasting and to avoid hidden node problem from moving high-speed, we employed a forward-handed and backward directional antenna. The authors simulated the proposed method based on directional antenna and showed that the proposed method has been improved in respect to network utilization compared to existing VANET protocols.

  • PDF

Classification and Analysis of Mobility Patterns in Nested NEMO Network (중첩 NEMO 환경에서 이동 패턴 분류 및 분석에 대한 연구)

  • Lim, Hyung-Jin;Chung, Tai-Myoung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.29-41
    • /
    • 2008
  • Currently, IETF MANEMO(Mobile Adhoc for NEMO) working group is working on standardization supporting internal routing in nested NEMO networks. Nested NEMO has a independent topology feature that Mobile IP and basic NEMO protocol did not caused. This is the reason that causes exceptional mobility pattern. Such mobility patterns also trigger each other reconfiguration requirements. This paper classified and analyzed probable new mobility patterns in nested NEMO network. In concludion, we derived configuration problem from the new mobility patterns and suggested differential reconfiguration requirements through analytical approach.

  • PDF

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

Bio-Adhoc Sensor Network for Disaster Emergency Management Systems (재난 관리용 시스템을 위한 센서 탑재 바이오 Ad hoc 네트워크 구축방안 연구)

  • Lee, Dong-Eun;Lee, Goo-Yeon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.775-776
    • /
    • 2006
  • Ad hoc network does not need any preexisting network infrastructure, and it has been developed as temporal networks in the various fields. Infostation is an efficient system to transfer information which does not have delay sensitive characteristics. In this paper, we propose a disaster emergency management system using sensor attached animals' mobility combined with infostation system. We also analyze the performance of the proposed system. From the performance analysis results, we expect that the proposed system will be very useful to early detect big forest fires which occurs frequently in Korea mountain areas.

  • PDF

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.