This website uses cookies to ensure you have the best experience. Learn more

Wireless Mobile Ad Hoc Mobile Networks Help Security

1502 words - 7 pages

Energy awareness for computation and protocol management is becoming a crucial factor in the design of MANET protocols and algorithms. Because of mobility, we need the support of scalable routing strategies and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce fake neighbor position for route discovery. Often energy saving and path duration and stability can be two contrasting efforts and trying to satisfy both of them can be very difficult because such a process can be easily abused or disrupted by adversarial nodes. Neighbor discovery is an important part of many protocols for mobile ad hoc networks, including localization and routing. Communications and protocols performance will depreciate, when neighbor discovery fails. In this paper, we address this open issue by proposing secure and efficient neighbor discovery with respect to select the most stable path so as to reduce the overhead due to route reconstruction and link failures, which offers a measure of protection against fake positions by allowing participating mobile nodes to securely determine if they are neighbors.We prove the security properties of our protocol, and demonstrate the effectiveness of our protocol through GLOMOSIM simulations.

IndexTerms: MANET,Neighbor discovery, position verification, path stability.

Wireless Mobile Ad Hoc Networks (MANETs) have emerged as an advanced networking concept based on collaborative efforts among numerous self-organized wireless devices. MANET is a network where no fixed infrastructure exists. Such networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable and movement of communicating parties is possible. The topology of MANETs is dynamic, because the link among the nodes may vary with time due to device mobility, new device arrivals, and the possibility of having mobile devices. Hence, any routing protocol design must consider the physical limitations and constraints imposed by the ad hoc environment so that the resulting routing protocol does not degrade system performances. Since in MANET, there is no fixed-infrastructure such as base stations, mobile devices need to operate as routers in order to maintain the information about the network connectivity, as a result the conventional routing protocols cannot be supported easily by ad hoc networks. Several research studies have been launched to study this issue, those defined by the IETF MANET group can be classified into two categories: proactive protocols and reactive protocols. MANET’s technology offers both new challenges and opportunities for many applications. The major challenges for ad hoc technology is secure and efficient routing, due essentially to MANET features (e.g., open medium, lack of centralized management, nodes...

Find Another Essay On Wireless Mobile Ad Hoc Mobile Networks Help Security

Mobile Ad Hoc Network Temporarily Forms a Network without Support

1538 words - 7 pages . QUALITATIVE PROPERTIES. 2. QUANTITATIVE PROPERTIES. 1.Qualitative properties involves: • Distributed operation • Loop freedom • Demand based routing • Security 2.Quantitative properties involves: • End to end throughput. • Delay • Route discovery time • Memory byte requirement • Network recovery time 2. RELATED STUDY: A Mobile Ad-hoc Network (MANET) is a temporary wireless network composed of mobile nodes, in which an infrastructure is absent

Wireless Sensors Networks Security Essay

2213 words - 9 pages emerging technologies currently being deployed in seismic monitoring, wild life studies, manufacturing and performance monitoring. These sensor nodes are densely deployed in a predetermined geographical area to self-organise into ad hoc wireless networks to gather and aggregate data [8]. The ad hoc nature of sensor networks poses unique challenges with their security and reliability. Resource constrained sensor nodes in terms of limited memory, low

Network infrastructure focusing on Wireless Networks: Bluetooth, Wi-Fi and Mobile Phone networks

4377 words - 18 pages network. 802.11 is the standard for WLAN and formally approved by the Institute of Electrical and Electronics Engineers. 802.11 has two operating modes, Infrastructure and Ad hoc mode. In both modes the wireless network needs a name. This name is known as a Service Set Identifier (SSID). The SSID name is created by the wireless Access Point (AP) for the infrastructure mode and by the initial wireless client when using ad hoc mode. [7] Every

Mobile Code Security

1376 words - 6 pages innocent. This seemingly useful tool raises a number of obvious security issues. While mobile code can be used to benefit and improve a network environment, it can easily be used to attack and damage that same network. It can easily be employed as a vehicle for security compromise. Some of the most sensitive areas of concerns when it comes to the question of network security issues that are associated with mobile code technology are Access

Mobile Movement En route for Software-Defined Mobile Networks

864 words - 4 pages standards to portable transporter systems. We detail the advancement and utilization of a proof-of-notion model to approve the key parts of the structural engineering, accompanying the SDN convention of usage turned experimentation. Portable BROADBAND TODAY EPC is an exceptional reason, level, all-IP structural engineering institutionalized by 3gpp [11–13]. EPC, which in addition to the developed Universal Mobile

Wirelenss Mobile Networks: Design and Performance

754 words - 4 pages access points are deployed to the zones to compose wireless mesh networks. A wireless mesh network is a type of wireless ad hoc network which consists of mesh routers and mesh clients. Mesh routers are usually stationary and they form the backbone of the WMNs, while serving as access points for mesh clients, which can be stationary or mobile. Some of the routers act as Internet gateways to provide Internet access to the clients in the WMN

Information Security in Mobile Databases

2068 words - 8 pages have access to database form anywhere anytime. This brings up a whole new security issues in the computing industry. There is always a physical threat to such devices being stolen, lost or damaged. It is a high risk to take putting private and valuable data on such devices since there is so much physical threat. These mobile devices need to connect using wireless technology, which is very volatile and prone to security threat. Since there is no

Improving Remote User Authentication on Mobile Networks

3628 words - 15 pages on internet or wireless networks. Therefore, secure communications in such wireless environments are more and more important because they protect transactions between users and servers. Especially, users are people vulnerable to attacks and there are many authentication systems proposed to guarantee them. Islam and Biswas have proposed a more efficient and secure ID-based system for mobile devices on ECC to enhance security for authentication

SHARP: A Joint Spectrum Allocation, Handover and Routing Protocol for Cognitive Radio Ad Hoc Networks

794 words - 4 pages , this process is called spectrum decision. In addition to this, in CR networks with multi-hop communication and no predefined structure, (i.e., multi-hop cognitive radio ad hoc networks), requires smart and adaptive routing interference between PU and secondary users (SUs) also interference between SUs and SUs, signal to noise ratio (SNR) for SUs algorithms obviously due to the uncertainty and dynamic nature of the radio channel. In fact, in such

SHARP: A Joint Spectrum Allocation, Handover and Routing Protocol for Cognitive Radio Ad Hoc Networks

1647 words - 7 pages • Mobility • Agility In the reactive routing algorithms proposed for adhoc multi-hop networks, hop-count and ETX are key measures for route selection in DSR and AODV algorithms [??]. The expected number of transmissions (ETX) required for achieving success is a commonly used metric for routing in wireless multi-hop, ad¬hoc networks, especially when they suffer from instability in link quality [9, 38, 4, 15]. The ETX is based on measuring the loss

An Approach of Energy Efficient and Secure Data Transfer Using Multicast Routing Protocol in Ad Hoc Networks

585 words - 3 pages of wireless networks called ad-hoc networks. An ad-hoc networks have become increasingly relevant in recent year due to their potential applications in battlefield, military, and emergency disaster relief etc.,. It is a self-configuring network. And it consists of collection of autonomous mobile nodes formed by topology without use of any existing infrastructure. Each mobile node serve as router or hosts in network. The mobile nodes communicate

Similar Essays

Mobile And Wireless Communication: Mobile Ad Hoc Networks

2437 words - 10 pages the wireless links. It is a new technique of wireless paradigm for the mobile hosts. These Ad Hoc networks are not like the traditional wireless networks that rely on a fixed infrastructure but these hosts are dependent on each other so that the network is connected always(Advanced Network Technologies Divisionn.d.). This represent a complex distribution system which have available wireless nodes of mobile that can self-organize into temporary

Routing Protocols For Ad Hoc Mobile Networks

2227 words - 9 pages Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Communications, vol. 99, pp 46-55, April 1999. Available: [2] G. He, “Destination-Sequenced Distance Vector (DSDV) Protocol,” Networking Laboratory, Helsinki University of Technology. Available: [3] T.D. Hollerung, “The

Energy Efficient Mobile Ad Hoc Network (Manet)

2553 words - 10 pages 1. INTRODUCTION A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. In a MANET each and every node is free to move in any direction, and hence change its links to other nodes frequently. All the nodes cooperatively maintain network connectivity without the aid of any fixed infrastructure units. Each node has a routing function whereby it communicates by forwarding packets

Stable And Self Adaptive Routing For Mobile Ad Hoc Networks Using Cross Layer Design

2857 words - 12 pages Amiri, Hamid R. Sadjadpour1 and Jose Joaquin Garcia-Luna-Aceves, “Cross-layer design of outage optimum routing metric for wireless ad hoc networks”, Wireless Communications And Mobile Computing, 2011. [4] Chao GU, Qi Zhu, “A Cross-Layer Routing Protocol for Mobile Ad Hoc Networks Based On Minimum Interference Duration”, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) [5] Edward Y. Hua