Search results

1 – 10 of 113
Article
Publication date: 16 August 2018

Rama Rao A., Satyananda Reddy and Valli Kumari V.

Multimedia applications such as digital audio and video have stringent quality of service (QoS) requirement in mobile ad hoc network. To support wide range of QoS, complex routing…

Abstract

Purpose

Multimedia applications such as digital audio and video have stringent quality of service (QoS) requirement in mobile ad hoc network. To support wide range of QoS, complex routing protocols with multiple QoS constraints are necessary. In QoS routing, the basic problem is to find a path that satisfies multiple QoS constraints. Moreover, mobility, congestion and packet loss in dynamic topology of network also leads to QoS performance degradation of protocol.

Design/methodology/approach

In this paper, the authors proposed a multi-path selection scheme for QoS aware routing in mobile ad hoc network based on fractional cuckoo search algorithm (FCS-MQARP). Here, multiple QoS constraints energy, link life time, distance and delay are considered for path selection.

Findings

The experimentation of proposed FCS-MQARP is performed over existing QoS aware routing protocols AOMDV, MMQARP, CS-MQARP using measures such as normalized delay, energy and throughput. The extensive simulation study of the proposed FCS-based multipath selection shows that the proposed QoS aware routing protocol performs better than the existing routing protocol with maximal energy of 99.1501 and minimal delay of 0.0554.

Originality/value

This paper presents a hybrid optimization algorithm called the FCS algorithm for the multi-path selection. Also, a new fitness function is developed by considering the QoS constraints such as energy, link life time, distance and delay.

Details

Sensor Review, vol. 39 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 26 May 2020

Anupama Sharma, Abhay Bansal and Vinay Rishiwal

Quality communication is a big challenge in mobile ad hoc networks because of a restricted environment for mobile devices, bandwidth-constrained radio connections, random mobility…

Abstract

Purpose

Quality communication is a big challenge in mobile ad hoc networks because of a restricted environment for mobile devices, bandwidth-constrained radio connections, random mobility of connected devices, etc. High-quality communication through wireless links mainly depends on available bandwidth, link stability, energy of nodes, etc. Many researchers proposed stability and link quality methods to improve these issues, but they still require optimization. This study aims to contribute towards better quality communication in temporarily formed networks. The authors propose the stable and bandwidth aware dynamic routing (SBADR) protocol with the aim to provide an efficient, stable path with sufficient bandwidth and enough energy hold nodes for all types of quality of service (QoS) data communication.

Design/methodology/approach

The proposal made in this work used received signal strength from the media access control (MAC) layer to estimate the stability of the radio connection. The proposed path stability model combines the stability of the individual link to compute path stability. The amount of bandwidth available for communication at a specific time on a link is defined as the available link bandwidth that is understood as the maximum throughput of that link. Bandwidth as a QoS parameter ensures high-quality communication for every application in such a network. One other improvement, towards quality data transmission, is made by incorporating residual energies of communicating and receiving nodes in the calculation of available link bandwidth.

Findings

Communication quality in mobile ad hoc network (MANET) does not depend on a single parameter such as bandwidth, energy, path stability, etc. To address and enhance quality communication, this paper focused on high impact factors, such as path stability, available link bandwidth and energy of nodes. The performance of SBADR is evaluated on the network simulator and compared with that of other routing protocols, i.e. route stability based QoS routing (RSQR), route stability based ad-hoc on-demand distance vector (RSAODV) and Ad-hoc on-demand distance vector (AODV). Experimental outcomes show that SBADR significantly enhanced network performance in terms of throughput, packet delivery ratio (PDR) and normalized control overhead (NCO). Performance shows that SBADR is suitable for any application of MANET having random and high mobility.

Research limitations/implications

QoS in MANET is a challenging task. To achieve high-quality communication, the authors worked on multiple network parameters, i.e. path stability, available link bandwidth and energy of mobile nodes. The performance of the proposed routing protocol named SBADR is evaluated by a network simulator and compared with that of other routing protocols. Statistical analysis done on results proves significant enhancement in network performance. SBADR is suitable for applications of MANET having random and high mobility. It is also efficient for applications having a requirement of high throughput.

Practical implications

SBADR shows a significant enhancement in received data bytes, which are 1,709, 788 and 326 more in comparison of AODV, RSAODV and RSQR, respectively. PDR increased by 21.27%, 12.1%, 4.15%, and NCO decreased by 9.67%, 5.93%, 2.8% in comparison of AODV, RSAODV and RSQR, respectively.

Social implications

Outcomes show SBADR will perform better with applications of MANET such as disaster recovery, city tours, university or hospital networks, etc. SBADR is suitable for every application of MANET having random and high mobility.

Originality/value

This is to certify that the reported work in the paper entitled “SBADR: stable and bandwidth aware dynamic routing protocol for mobile ad hoc network” is an original one and has not been submitted for publication elsewhere. The authors further certify that proper citations to the previously reported work have been given and no data/tables/figures have been quoted verbatim from the other publications without giving due acknowledgment and without permission of the author(s).

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 June 2009

Quan Le‐Trung, Paal E. Engelstad, Vinh Pham, Tor Skeie, Amirhosein Taherkordi and Frank Eliassen

The purpose of this paper is to describe the required functionalities on providing internet connectivity and mobility management for mobile ad hoc networks (MANETs), present…

Abstract

Purpose

The purpose of this paper is to describe the required functionalities on providing internet connectivity and mobility management for mobile ad hoc networks (MANETs), present discovered problems such as inconsistent contexts, and provide the corresponding solutions. It also provides a hybrid metric for the load‐balance of intra/inter‐MANET traffic over multiple internet gateways (IGWs).

Design/methodology/approach

The paper uses both mathematical analyses and simulations to discover the required functionalities and problems on providing internet connectivity and mobility management for MANETs. The proposed hybrid metric for IGW selection is a replacement of the shortest hop‐count (HC) metric, and consider three factors: HC distance, intra‐MANET traffic, and inter‐MANET traffic.

Findings

Simulation results show that ad hoc routing protocols, using the proposed metric, get better performance in terms of packet delivery ratio and transmission delay, at the cost of slightly increased signalling overhead.

Research limitations/implications

In the assessment, simulation results are taken from two mobility scenarios, and the hybrid metric is integrated into only reactive ad hoc routing. Thus, more case studies need to be carried out to demonstrate the outcomes of the proposed metric compared with others.

Practical implications

This paper provides the needed functionalities for broadening the richness of MANET applications to internet users, and vice verse.

Originality/value

This paper contributes to the research on internetworking and mobility management between MANETs and the internet.

Details

International Journal of Web Information Systems, vol. 5 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 14 October 2019

Rajendran N., Jawahar P.K. and Priyadarshini R.

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…

Abstract

Purpose

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.

Design/methodology/approach

It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.

Findings

The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.

Research limitations/implications

In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).

Practical implications

It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.

Social implications

When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.

Originality/value

The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 11 June 2018

Abdesselem Beghriche and Azeddine Bilami

Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of…

Abstract

Purpose

Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.

Design/methodology/approach

The proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’ trust level, these trust levels are then used in the routing decision-making process.

Findings

In order to prove the applicability of the proposed solution, extensive experiments were conducted to evaluate the efficiency of the proposed model, aiming at improving the network interaction quality, malicious node mitigation and enhancements of the system’s security.

Originality/value

The proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory, where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics. Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 11 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 18 October 2019

A. Abdollahi Nami and L. Rajabion

A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and…

Abstract

Purpose

A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed.

Design/methodology/approach

The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms.

Findings

High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced.

Research limitations/implications

Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability.

Originality/value

The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 3/4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 July 2006

Olli E. Martikainen

Internet and GSM have become the dominant designs for information and communication technology (ICT) industries in the late 1990s. Internet protocol (IP) is the dominant standard

1701

Abstract

Purpose

Internet and GSM have become the dominant designs for information and communication technology (ICT) industries in the late 1990s. Internet protocol (IP) is the dominant standard for cost effective networking and new interactive broadband services. GSM (2G) is currently the dominant cellular technology and it is the basis of GSM, GPRS (2.5G) and UMTS (3G), the GSM‐continuum of standards. The marriage of broadband internet and mobile has created open questions on which are the future winning wireless standards. Will mobile internet be based on the GSM‐continuum or on US wireless developments such as WLAN and WiMAX? In longer time‐scale the Mobile Adhoc Network (MANET) which does not use any preinstalled communications infrastructure may also become a cost‐effective challenger to infrastructure based networks. The paper seeks to address these issues.

Design/methodology/approach

The paper elaborates these questions with the aim to provide an analytically clarifying conceptualisation of the competitive relationships between 3G, WLAN/WiMAX and the emerging MANET opportunities both in network and application perspectives. By considering the interaction of the possible competitive regimes we analyze the disruptive capabilities of new solutions to become substitutes to the existing ones.

Findings

There are a number of open issues in the WLAN/WiMAX and MANET architectures, which require further work and global standardization. For the while, the integration of the personal applications to the GSM continuum seems to be the most potential approach to import internet to the mobile world. However, there is no winner yet, and the author strongly believes that a new wave of innovations may come around these lines and that these developments will also change the mobile technology and services landscape.

Originality/value

The paper contributes with a systemantic analysis of the competition between 3G, WLAN/WiMAX and ad hoc network technologies. A novelty in the analysis is that it incorporates both network access technologies and applications.

Details

info, vol. 8 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 November 2005

Apostolos Malatras, George Pavlou, Petros Belsis, Stefanos Gritzalis, Christos Skourlas and Ioannis Chalaris

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artifacts. In these inherently unstable…

Abstract

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artifacts. In these inherently unstable conditions and bearing in mind the resource’s limitations that are attributed to participating devices, the deployment of Knowledge Management techniques is considered complicated due to the particular requirements. Security considerations are also very important since the distribution of knowledge information to multiple locations over a network, poses inherent problems and calls for advanced methods in order to mitigate node misbehaviour and in order to enforce authorized and authenticated access to this information. This paper addresses the issue of secure and distributed knowledge management applications in pervasive environments. We present a prototype implementation after having discussed detailed design principles as far as the communications and the application itself is regarded. Robustness and lightweight implementation are the cornerstones of the proposed solution. The approach we have undertaken makes use of overlay networks to achieve efficiency and performance optimization, exploiting ontologies. The work presented in this paper extends our initial work to tackle this problem, as this was described in (28).

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 2021

R. Srilakshmi and Jayabhaskar Muthukuru

The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc

Abstract

Purpose

The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.

Design/methodology/approach

A wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish information exchange among any pair of hubs, without any centralized structure. The security issue is a major difficulty while employing MANETs.

Findings

Consequently, the attacks due to the malicious node activity are detected using Hybrid Reactive Search and Bat (HRSB) mechanism to prevent the mischievous nodes from entering the network beneath the untruthful information. Moreover, the attack detection rate and node energy are predicted for determining the lifetime of the node.

Originality/value

The simulation outcomes of the proposed HRSB technique are evaluated with the prevailing methods. The comparison studies have proven the efficacy of the current research model by attaining high attack detection rate and achieving more network lifetime.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 November 2005

Roberto Baldoni, Roberto Beraldi, Leonardo Querzoni, Gianpaolo Cugola and Matteo Migliavacca

The decoupling and asynchrony properties of the content‐based publish‐subscribe paradigm makes it very appealing for dynamic wireless networks, like those that often occur in…

Abstract

The decoupling and asynchrony properties of the content‐based publish‐subscribe paradigm makes it very appealing for dynamic wireless networks, like those that often occur in pervasive computing scenarios. Unfortunately, most of the currently available content‐based publish‐subscribe middleware do not fit the requirements of such extreme scenarios, in which the network is subject to very frequent topological reconfigurations due to mobility of nodes. In this paper we propose a protocol for content‐based message dissemination tailored to Mobile Ad Hoc Networks (MANETs) showing frequent topological changes. Message routing occurs without the support of any network‐wide dispatching infrastructure thus eliminating the need of maintaining such infrastructure on top of a physical network continuously changing its topology. The paper reports an extensive simulation study that confirms the suitability of the proposed approach along with a stochastic analysis of the central mechanism adopted by the protocol.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 113