Skip to main content

2020 | OriginalPaper | Buchkapitel

Impact of Mobility and Density on Performance of MANET

verfasst von : Vaishali V. Sarbhukan, Ragha Lata

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Mobile ad hoc Networks (MANETs), discovering the stable, reliable and secure routes is a difficult analysis downside because of the open medium and dynamic topology. Most of the recent ways didn’t solve the entire downside of data loss in MANETs as they targeted on distinguishing the malicious nodes and forestall them from electronic communication method solely. There are many different reasons corresponding to mobility and congestion of mobile nodes due to which the data could loss in MANETS. Thus planned theme ETSR is meant by considering these parameters so as to provide a more stable, reliable and secure routes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat IEEE Std 802.11-2007. IEEE standard for information technology- Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications, June 2007 IEEE Std 802.11-2007. IEEE standard for information technology- Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications, June 2007
2.
Zurück zum Zitat Loo, J., Mauri, J.L., Ortiz, J.H. (eds.): Mobile Ad Hoc Networks: Current Status and Future Trends. CRC, Boca Raton (2011) Loo, J., Mauri, J.L., Ortiz, J.H. (eds.): Mobile Ad Hoc Networks: Current Status and Future Trends. CRC, Boca Raton (2011)
3.
Zurück zum Zitat Guan, Q., Yu, F.R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Tech. 61(6), 2674–2685 (2012)CrossRef Guan, Q., Yu, F.R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Tech. 61(6), 2674–2685 (2012)CrossRef
4.
Zurück zum Zitat Yu, F.R., Tang, H., Bu, S., Zheng, D.: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2013, 188–190 (2013)CrossRef Yu, F.R., Tang, H., Bu, S., Zheng, D.: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2013, 188–190 (2013)CrossRef
5.
Zurück zum Zitat Wang, Y., Yu, F.R., Tang, H., Huang, M.: A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 13(3), 1616–1627 (2014)CrossRef Wang, Y., Yu, F.R., Tang, H., Huang, M.: A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 13(3), 1616–1627 (2014)CrossRef
6.
Zurück zum Zitat Chapin, J., Chan V.W.: The next 10 years of DoD wireless networking research. In: Proceedings IEEE MILCOM, pp. 2155–2245, November 2011 Chapin, J., Chan V.W.: The next 10 years of DoD wireless networking research. In: Proceedings IEEE MILCOM, pp. 2155–2245, November 2011
7.
Zurück zum Zitat Bu, S., Yu, F.R., Liu, P., Manson, P., Tang, H.: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Technol. 60(3), 1025–1036 (2011)CrossRef Bu, S., Yu, F.R., Liu, P., Manson, P., Tang, H.: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Technol. 60(3), 1025–1036 (2011)CrossRef
8.
Zurück zum Zitat Bu, S., Yu, F.R., Liu, X.P., Tang, H.: Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans. Wireless Commun. 10(9), 3064–3073 (2011)CrossRef Bu, S., Yu, F.R., Liu, X.P., Tang, H.: Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans. Wireless Commun. 10(9), 3064–3073 (2011)CrossRef
9.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secure Comput. 3(4), 386–399 (2006)CrossRef Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secure Comput. 3(4), 386–399 (2006)CrossRef
10.
Zurück zum Zitat Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wireless Commun. 16(2), 24–30 (2009)CrossRef Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wireless Commun. 16(2), 24–30 (2009)CrossRef
11.
Zurück zum Zitat Yu, F.R., Tang, H., Mason, P., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manag. 7(4), 258–267 (2010)CrossRef Yu, F.R., Tang, H., Mason, P., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manag. 7(4), 258–267 (2010)CrossRef
12.
Zurück zum Zitat Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETS. In: IEEE Transactions on Industrial Electronics, vol. 60, no. 3, March 2013CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETS. In: IEEE Transactions on Industrial Electronics, vol. 60, no. 3, March 2013CrossRef
13.
Zurück zum Zitat Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for P2P and mobile ad-hoc networks. In: 2nd Proceedings Workshop Economics of Peer-to-Peer Systems, pp. 1–6, November 2004 Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for P2P and mobile ad-hoc networks. In: 2nd Proceedings Workshop Economics of Peer-to-Peer Systems, pp. 1–6, November 2004
14.
Zurück zum Zitat Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.C.: Security enhancements for mobile Ad Hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRef Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.C.: Security enhancements for mobile Ad Hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRef
15.
Zurück zum Zitat Mahmoud, M.M., Lin, X., Shen, X.S.: Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1140–1153 (2013)CrossRef Mahmoud, M.M., Lin, X., Shen, X.S.: Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1140–1153 (2013)CrossRef
16.
Zurück zum Zitat Dahshan, H., Irvine, J.: A trust based threshold cryptography key management for mobile ad hoc networks. In: IEEE, pp. 1–5 (2009) Dahshan, H., Irvine, J.: A trust based threshold cryptography key management for mobile ad hoc networks. In: IEEE, pp. 1–5 (2009)
17.
Zurück zum Zitat Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)CrossRef Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)CrossRef
Metadaten
Titel
Impact of Mobility and Density on Performance of MANET
verfasst von
Vaishali V. Sarbhukan
Ragha Lata
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_15