Refine your search
Collections
Journals
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Immanuel John Raja, J.
- An Approach for Internet Connectivity for MANET
Abstract Views :165 |
PDF Views:1
Authors
Affiliations
1 Karunya University, Coimbatore-641114, IN
2 Karunya University, Coimbatore, IN
1 Karunya University, Coimbatore-641114, IN
2 Karunya University, Coimbatore, IN
Source
Wireless Communication, Vol 3, No 4 (2011), Pagination: 246-249Abstract
A prerequisite for a widespread and successful deployment of ad-hoc networking technology is its ability to provide easy access to the Internet. In this paper, we review the existing solutions to interconnect MANETs with the Internet, but find them lacking in robustness and flexibility. Many methods undergoes with the problem of indirection (i.e., a way to enforce routing through a certain gateway on the path toward a destination in the Internet) and gateway tracking. We analyze the above problems and suggest a solution that provides robust and flexible Internet connectivity. This paper overcomes the problem by using a forwarding strategy, tunneling and also provides dynamically adjusting service which improves MANET flexibility. Simulations show that, when used in combination with AODV routing, our solution provides up to 25% delivery ratio improvement.Keywords
AODV, MANET, Gateway, Tunneling.- A Robust Intrusion Detection in Mobile Ad-Hoc Networks with Reactive Routing Protocols
Abstract Views :164 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, Karunya University, IN
1 Department of Computer Science and Engineering, Karunya University, IN
Source
Wireless Communication, Vol 3, No 4 (2011), Pagination: 250-253Abstract
Mobile ad-hoc networks (MANETs) will be formed where a fixed network is not possible to be maintained. MANETs are infrastructure less and will be having mobile nodes. Security in mobile ad hoc networks is difficult to achieve, because of the dynamic topologies, limited resources, the absence of a certification authority and the lack of a centralized monitoring point [1]. MANETs are vulnerable to many kinds of attacks. Most of the attacks are routing protocol attacks. The routing protocol attacks will be carried out by forming holes in the network. The holes in the network can drop, tamper or fabricate the traffic in the network. The holes or the malicious nodes should be detected and detached as early as possible. The detection mechanism should also guarantee higher detection rate and lesser traffic. In this paper we propose a robust technique to detect the holes in the MANET which uses reactive routing protocol.Keywords
MANET, Sinkhole Nodes, Routing Attacks, Bogus RREQ, Cross-Over Error Rate.- Wormhole Detection Methods-A Survey
Abstract Views :186 |
PDF Views:3
Authors
Affiliations
1 Karunya University, Coimbatore 641114, IN
1 Karunya University, Coimbatore 641114, IN