Search results

1 – 10 of 175
To view the access options for this content please click here
Article
Publication date: 16 August 2018

Rama Rao A., Satyananda Reddy and Valli Kumari V.

Multimedia applications such as digital audio and video have stringent quality of service (QoS) requirement in mobile ad hoc network. To support wide range of QoS, complex…

Abstract

Purpose

Multimedia applications such as digital audio and video have stringent quality of service (QoS) requirement in mobile ad hoc network. To support wide range of QoS, complex routing protocols with multiple QoS constraints are necessary. In QoS routing, the basic problem is to find a path that satisfies multiple QoS constraints. Moreover, mobility, congestion and packet loss in dynamic topology of network also leads to QoS performance degradation of protocol.

Design/methodology/approach

In this paper, the authors proposed a multi-path selection scheme for QoS aware routing in mobile ad hoc network based on fractional cuckoo search algorithm (FCS-MQARP). Here, multiple QoS constraints energy, link life time, distance and delay are considered for path selection.

Findings

The experimentation of proposed FCS-MQARP is performed over existing QoS aware routing protocols AOMDV, MMQARP, CS-MQARP using measures such as normalized delay, energy and throughput. The extensive simulation study of the proposed FCS-based multipath selection shows that the proposed QoS aware routing protocol performs better than the existing routing protocol with maximal energy of 99.1501 and minimal delay of 0.0554.

Originality/value

This paper presents a hybrid optimization algorithm called the FCS algorithm for the multi-path selection. Also, a new fitness function is developed by considering the QoS constraints such as energy, link life time, distance and delay.

Details

Sensor Review, vol. 39 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article
Publication date: 19 June 2009

Quan Le‐Trung, Paal E. Engelstad, Vinh Pham, Tor Skeie, Amirhosein Taherkordi and Frank Eliassen

The purpose of this paper is to describe the required functionalities on providing internet connectivity and mobility management for mobile ad hoc networks (MANETs)…

Abstract

Purpose

The purpose of this paper is to describe the required functionalities on providing internet connectivity and mobility management for mobile ad hoc networks (MANETs), present discovered problems such as inconsistent contexts, and provide the corresponding solutions. It also provides a hybrid metric for the load‐balance of intra/inter‐MANET traffic over multiple internet gateways (IGWs).

Design/methodology/approach

The paper uses both mathematical analyses and simulations to discover the required functionalities and problems on providing internet connectivity and mobility management for MANETs. The proposed hybrid metric for IGW selection is a replacement of the shortest hop‐count (HC) metric, and consider three factors: HC distance, intra‐MANET traffic, and inter‐MANET traffic.

Findings

Simulation results show that ad hoc routing protocols, using the proposed metric, get better performance in terms of packet delivery ratio and transmission delay, at the cost of slightly increased signalling overhead.

Research limitations/implications

In the assessment, simulation results are taken from two mobility scenarios, and the hybrid metric is integrated into only reactive ad hoc routing. Thus, more case studies need to be carried out to demonstrate the outcomes of the proposed metric compared with others.

Practical implications

This paper provides the needed functionalities for broadening the richness of MANET applications to internet users, and vice verse.

Originality/value

This paper contributes to the research on internetworking and mobility management between MANETs and the internet.

Details

International Journal of Web Information Systems, vol. 5 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 18 October 2019

A. Abdollahi Nami and L. Rajabion

A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access…

Abstract

Purpose

A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed.

Design/methodology/approach

The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms.

Findings

High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced.

Research limitations/implications

Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability.

Originality/value

The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 3/4
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 26 November 2020

N.V. Brindha and V.S. Meenakshi

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is…

Abstract

Purpose

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.

Design/methodology/approach

A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.

Findings

So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.

Research limitations/implications

The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.

Practical implications

As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.

Social implications

This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.

Originality/value

The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 17 July 2019

Prasad A.Y. and Balakrishna Rayanki

In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible…

Abstract

Purpose

In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for greater energy usage, thereby affecting the parameter metrics network performance, throughput, packet overhead, energy consumption in addition to end-to-end delay. The effective parameter metric measures are implemented and made to enhance the network lifetime and energy efficiency. The transmission of data for at any node should be more efficient and also the battery of sensor node battery usage should be proficiently applied to increase the network lifetime. The paper aims to discuss these issues.

Design/methodology/approach

In this research work for the MANETs, the improvement of energy-efficient algorithms in MANETs is necessary. The main aim of this research is to develop an efficient and accurate routing protocol for MANET that consumes less energy, with an increased network lifetime.

Findings

In this paper, the author has made an attempt to improve the genetic algorithm with simulated annealing (GASA) for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.

Originality/value

In this paper, the author has made an attempt to improve the GASA for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 1 April 2014

Abdelhak Bentaleb, Saad Harous and Abdelhak Boubetra

Scalability is a fundamental problem in mobile ad hoc networks (MANETs), where network topology includes large number of nodes and demands a large number of packets in…

Abstract

Purpose

Scalability is a fundamental problem in mobile ad hoc networks (MANETs), where network topology includes large number of nodes and demands a large number of packets in network that characterized by dynamic topologies, existence of bandwidth constrained, variable capacity links, energy constraint and nodes are highly prone to security threats. The key purpose of this paper is to overview the efficiency of the proposed clustering scheme for large-scale MANETs and its performance evaluation and especially in the case of a large number of nodes in the network.

Design/methodology/approach

Designing clustering schemes for MANETs, which are efficient and scalable in the case of large number of mobile nodes, has received a great attention in the last few years. It is widely used to improve resources management, hierarchical routing protocol design, quality of service, network performance parameters such as routing delay, bandwidth consumption, throughput and security. MANETs are characterized by limited wireless bandwidth, nodes mobility that results in a high frequency of failure regarding wireless links, energy constraint and nodes are highly prone to security threats. Due to all these features, the design of a scalable and efficient clustering scheme is quite complex. Many clustering schemes have been proposed to divide nodes into clusters, focusing on different metrics and purposes.

Findings

To the best of the author's knowledge, the different proposed clustering schemes are not scalable when the network size increases to a very large number. The paper presents the clustering scheme in detail and its performance evaluation by simulating MANETs composed of a large number of mobile nodes. The authors compare the performance of the scheme with a number of existing clustering schemes such as lowest-ID, highest degree, and weighted clustering algorithm, based on a number of performance metrics. Simulation results show that the scheme performs better than other clustering schemes, based on the performance metrics considered, for large-scale MANETs.

Originality/value

This paper addresses the problem of scalability in MANETs when there are high numbers of node in the network. The paper analyses the performance of the proposed clustering scheme for large-scale MANETs. The obtained results show that the different proposed clustering schemes do not allow the scalability when the network size is very large. The scheme supports scalability efficiently when the number of nodes increases in the network (more than 2,000 nodes).

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 23 October 2007

B. McCarthy, C. Edwards and M. Dunmore

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the…

Abstract

Purpose

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the mountain rescue IP network model developed at Lancaster University.

Design/methodology/approach

An analysis of IP mobility techniques that have been designed for use in the Internet today is provided as background, as well as an overview of the whole MANEMO domain. Highlights the importance of the MANEMO concept by working with real scenarios and developing practical implementations (as opposed to simulation).

Findings

During the research it was found that combining the localised multi‐hop behaviour of MANET techniques and the global reachability of NEMO can be a mutually beneficial process. The benefits afforded by using MANET techniques can bring advantages to NEMO scenarios and vice‐versa. Identifying this fact has given rise to the development of two distinct MANEMO scenarios, MANET‐Centric and NEMO‐Centric MANEMO. Finally, the Unified MANEMO Architecture (UMA) implementation, which attempts to support both of these scenarios in an efficient and feasible manner.

Research limitations/implications

Regarding UMA, research continues into addressing the security implications of this approach and the benefits that multi‐homing can provide.

Originality/value

The paper illustrates how MANEMO can conceivably provide powerful solutions to many important scenarios.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to…

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2021

R. Srilakshmi and Jayabhaskar Muthukuru

The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the…

Abstract

Purpose

The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.

Design/methodology/approach

A wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish information exchange among any pair of hubs, without any centralized structure. The security issue is a major difficulty while employing MANETs.

Findings

Consequently, the attacks due to the malicious node activity are detected using Hybrid Reactive Search and Bat (HRSB) mechanism to prevent the mischievous nodes from entering the network beneath the untruthful information. Moreover, the attack detection rate and node energy are predicted for determining the lifetime of the node.

Originality/value

The simulation outcomes of the proposed HRSB technique are evaluated with the prevailing methods. The comparison studies have proven the efficacy of the current research model by attaining high attack detection rate and achieving more network lifetime.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 23 January 2020

Degan Zhang, Changle Gong, Kaiwen Jiang, Xiaodan Zhang and Ting Zhang

This paper aims to put forward a kind of new method of intelligent trust engineering metrics for application of mobile ad hoc network (MANET).

Abstract

Purpose

This paper aims to put forward a kind of new method of intelligent trust engineering metrics for application of mobile ad hoc network (MANET).

Design/methodology/approach

The new method calculates the communication trust by using the number of data packets among the nodes of MANET, predicts intelligently the trust and calculates the comprehensive trust based on the historical trust; then calculates the energy trust based on the residual energy of the nodes of MANET, calculates the direct trust based on the communication trust and energy trust. The new method calculates the recommendation trust based on the recommendation reliability; adopts the adaptive weighting to calculate the integrated direct trust by considering the direct trust with recommendation trust.

Findings

Based on the integrated direct trust and the factor of trust propagation distance, the indirect trust among the nodes of MANET is calculated. The above process can be optimized based on the dynamic machine learning presented in this study. The advantage of the new method is its intelligent ability to discover malicious nodes.

Originality/value

The advantage of the new method is its intelligent ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and proceeds to protect the network. The authors have done the experiments based on the tool kits such as NS3, QualNet, OMNET++ and MATLAB. The experimental results show that this study’s approach can effectively avoid the attacks of malicious nodes, and more conformable to the actual engineering application of MANET.

Details

Engineering Computations, vol. 37 no. 5
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of 175