This research identifies
some improved protocols which support multiple paths between
source and destination.
Mobile Ad-Hoc Networks are used for data transfer. The nodes of such
networks do not require presetting. They are characterized by dynamic
data transfer during their movement of the nodes. MANET could be
targeted by potential security breaches. Bl
ack hole attack is one of the
serious attacks targeting wireless AD_HOC networks through a false
point whichcan absorb data and send them to another place or neglect
them. This is due to the lack of central control node which is able to
manage communications. This research investigates the effects of the
black hole on the performance of hybrid routing protocol Temporally
Ordered Routing Algorithm (TORA) and proactive routing protocol
Optimized Link State Routing (OLSR) for a variable number of mobile
nodes in different speeds in a high load environment.
In this search, we provide a study
about the security in VANET networks which are considered to be a
part of mobile wireless networks and designed to work between
moving vehicles. The most important security flaws of this
networks and its applica
tions are studied.
In fact, we study the most important and dangerous attacks that may
target VANET networks and analyze its main risks. Furthermore,
we simulate some of these attacks Specifically Denial-of Service
(DOS) attack using prober tools depending on chosen parameters
that characterize the network performance. moreover, we provide
some Security solutions to help counter measuring these attacks and
minimize this effects, and Finally we apply these solutions and
evaluate them.
Mobile wireless networks consist of a set of cooperative and
mobile nodes, each node can move randomly at a specific speed
in all directions without any control of a central manager. This type
of networks has become a hot research topic due to its
military
application and suitability for emergencies and natural disasters.
Due to the lack of fixed infrastructure, the routing process
becomes the major problem in this type of networks, where the
responsibility of routing is transferred to each node. Over the last
few years, a number of traditional routing protocols has been
proposed, but these protocols do not support quality of service in
different environments.
Some studies have improved some of these protocols to support
quality of service for specific environments. This research
identifies and analysis some of these improved protocols.
In this paper we introduce a game model
that explains our proposed approach aiming at preventing the
disappearance of the intermediate nodes.
Mobile ad-hoc Networking MANETS is a promising concept to provide flexible, adaptive, and reconfigurable architecture, cost effective solution.In the mobile ad hoc network security is the basic concern for network functions work properly.Routing is t
he corner stone in Mobile ad-hoc Networks, A lot of known vulnerabilities and security threats can be exploited to attack routing messages, so it is important to provide secure routing protocol for MANETs.In this paper, we present a secure extension for ad-hoc On Demand Distance Vector Protocol (AODV). The default routing protocol for MANETs. The proposed protocol ensures that discovery of the route between the nodes is functioning properly and securely, achieving mutual authentication between nodes, routing message integrity, generating a security key of data sent and exchanges it securely to ensure confidentiality and all of these are in one stage. By this we save in wireless band, resource consumption, preventing duplicate of authentication algorithms.
Network coding isone of the important researches in multi-hop wireless networks domain
and it widely participates in improving the performance of these networks, since it benefits from
the broadcasting nature of transmission processes to transmit m
ore than single packet in one
broadcasting transmission. So it achieves double use of the available bandwidth, which can
increase the throughput of the network and reduce the congestion.Our aim in this research is to
verify the improvement that network coding presents to theperformance of multi-hops wireless
Ad-hoc networks, and to study the accelerating of research process for coding chances through
constructing a virtual queues according to the packets flows that pass the node, and applying
affective manner to manage this queues.