• 제목/요약/키워드: MANETs (Mobile ad hoc networks)

Search Result 116, Processing Time 0.02 seconds

Self-Organized Authentication in Mobile Ad-Hoc Networks

  • Caballero-Gil, Pino;Hernandez-Goya, Candelaria
    • Journal of Communications and Networks
    • /
    • v.11 no.5
    • /
    • pp.509-517
    • /
    • 2009
  • This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 이동 노드에 대한 효율적인 인증 메커니즘)

  • Lee Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.27-34
    • /
    • 2005
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.

A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks

  • Oh, Ro-An
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2009
  • We propose a tree-based integration of infrastructure networks and MANETs (TUM) to efficiently extend the scope of mobile Internet protocol to mobile ad hoc networks and devise a tree-based routing protocol (TBRP) that is suitable for the TUM architecture. Infrastructure networks have a number of fixed Internet Gateways that connect two heterogeneous networks. Mobile nodes form a number of small trees named pMANETs, each of them growing from anchor node which can communicate directly with an Internet Gateway. A new node registers with foreign agent and home agent along the tree path without resorting to an inefficient flooding. Furthermore, the TBRP sets up a routing path efficiently by exploiting the tree information without relying on flooding. We show by resorting to simulation that our approach is competitive against the conventional AODV based approach.

Associativity-Based On-Demand Multi-Path Routing In Mobile Ad Hoc Networks

  • Rehman, Shafqat Ur;Song, Wang-Cheol;Park, Gyung-Leen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.475-491
    • /
    • 2009
  • This paper is primarily concerned with multi-path routing in Mobile Ad hoc Networks (MANETs). We propose a novel associativity-based on-demand source routing protocol for MANETs that attempts to establish relatively stable path(s) between the source and the destination. We introduce a new notion for gauging the temporal and spatial stability of nodes, and hence the paths interconnecting them. The proposed protocol is compared with other unipath (DSDV and AODV) and multi-path (AOMDV) routing protocols. We investigate the performance in terms of throughput, normalized routing overhead, packet delivery ratio etc. All on-demand protocols show good performance in mobile environments with less traffic overhead compared to proactive approaches, but they are prone to longer end-to-end delays due to route discovery and maintenance.

A Cluster-based Address Allocation Protocol in MANET Environment (MANET 환경에서 클러스터 기반 주소 할당 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9A
    • /
    • pp.898-904
    • /
    • 2007
  • I must receive node discernment address for communication between node that participate to network in MANETs(Mobile Ad-hoc Networks). Address is created by node confidence or different node. I achieve address redundancy check (Duplicate Address Detection) to examine whether this address is available unique address. However, this method happens problem that MANETs' extensity drops. This paper can manage by group unit binding transfer nodes to group in MANETs. I suggest method that apply special quality of cluster that exchange subordinate decrease and mobility government official of control message are easy in address assignment protocol minimize time required in redundancy check and solves extensity problem. Method that propose in this paper shows excellent performance according to node number increase than wave and MANETConf [2] through simulation.

A Self-Healing Routing Technique for Mobile Ad Hoc Networks (이동 애드 혹 네트워크를 위한 자가치유 라우팅기법에 관한 연구)

  • Park, Seong-Ho;Yoon, Won-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.167-168
    • /
    • 2006
  • Mobile Ad Hoc Networks (MANETs) has the characteristics such as dynamic network topology, constrained power capacity, constrained wireless bandwidth and quality, etc. For MANETs AODV (Ad-Hoc On-Demand Distance Vector) routing protocol has been proposed. However AODV routing protocol has some inefficiency related to re-routing path establishment corresponding to node's failure. In this paper, we propose a Self-Healing Routing Technique for MANETs that uses the one-hop nodes from the failed node to set up the routing path efficiently. We also include simulation results to show the performance of our method.

  • PDF

The Performance Analysis of the Mobile Ad-Hoc Network Considering the Mobility of Nodes (이동성을 고려한 이동 애드혹 네트워크 성능분석)

  • Jeong, Seo-Kyun;Hur, Sun;Nam, Jin-Gyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.1
    • /
    • pp.18-25
    • /
    • 2006
  • In mobile ad-hoc networks(MANETs), nodes are mobile and network topology changes very frequently. The mobility of nodes does affect the system performance. There has been considerable attention on the mobility models, however, most work is confined to the simulation or test-bed. In this paper, we propose an analytical method to evaluate the performances of MANETs such as the average radio range dwell time of mobile nodes, link holding time, and transmission failure probability considering the node's mobility. In the proposed model, MANETs consist of the multi-hop and multicasting routing paths. A simulation is done to validate our proposed analytical model.

Active PDP Discovery for PBNM in MANETs (MANETs에서 정책기반 망 관리를 위한 Active PDP Discovery)

  • Lee Kyung-Jin;Song Wang-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.390-396
    • /
    • 2006
  • Policy-based Network Management(PBNM) in the Mobile Ad-hoc network(MANETs) requires additional, reliable and efficient mechanism over PBNM in wired network. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In this thesis, I propose a mechanism for the policy-based management in ad hoc networks in which I consider several methods to discover the Policy Decision Point(PDP), set the management area, and manage the movements of Policy Enforcement Point(PEP) nodes in the PBNM system. Moreover, COPS-PR is extended for the mechanism. Finally, I analyze and validate the results through simulations.

Impacts of Radio Propagation Model on Mobile Ad-hoc Network (MANET) Performance in Group Mobility Environments

  • Yeo, In-ho;Yang, Hyo-sik;Rhee, JongMyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.62-72
    • /
    • 2010
  • As the applications for Mobile Ad-hoc NETworks (MANETs) have varied, performance analysis has become one of the main research areas. They commonly offer only simple radio propagation models that neglect obstacles of a propagation environment. The radio wave propagation model has a strong impact on the results of the simulation run. In this paper we present the new experimental results of the impacts of the various propagation models on MANETs' performance. Intensive simulations have been presented using the group mobility which models typical ad-hoc situations such as military movements or disaster recovery activities under the supervision of a group leader. Comparisons of conventional simple models with more complicated models, i.e., shadowing, Raleigh, and Ricean models, show that, in spite of the models' popularity, the free space and two-ray ground models are too optimistic in describing real ad-hoc group mobility situations.

  • PDF

An Algorithm to Detect Bogus Nodes for a Cooperative Intrusion Detection Architecture in MANETs

  • Hieu Cao Trong;Dai Tran Thanh;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1117-1120
    • /
    • 2006
  • Wide applications because of their flexibilities and conveniences of Wireless Mobile Ad-hoc Networks (MANETs) also make them more interesting to adversaries. Currently, there is no applied architecture efficient enough to protect them against many types of attacks. Some preventive mechanisms are deployed to protect MANETs but they are not enough. Thus, MANETs need an Intrusion Detection System (IDS) as the second layer to detect intrusion of adversaries to response and diminish the damage. In this paper, we propose an algorithm for detecting bogus nodes when they attempt to intrude into network by attack routing protocol. In addition, we propose a procedure to find the most optimize path between two nodes when they want to communicate with each other. We also show that our algorithm is very easy to implement in current proposed architectures.

  • PDF