Do you want to publish a course? Click here

Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes. MANET could be targeted by potential security breaches. Bl ack hole attack is one of the serious attacks targeting wireless AD_HOC networks through a false point whichcan absorb data and send them to another place or neglect them. This is due to the lack of central control node which is able to manage communications. This research investigates the effects of the black hole on the performance of hybrid routing protocol Temporally Ordered Routing Algorithm (TORA) and proactive routing protocol Optimized Link State Routing (OLSR) for a variable number of mobile nodes in different speeds in a high load environment.
In this search, we provide a study about the security in VANET networks which are considered to be a part of mobile wireless networks and designed to work between moving vehicles. The most important security flaws of this networks and its applica tions are studied. In fact, we study the most important and dangerous attacks that may target VANET networks and analyze its main risks. Furthermore, we simulate some of these attacks Specifically Denial-of Service (DOS) attack using prober tools depending on chosen parameters that characterize the network performance. moreover, we provide some Security solutions to help counter measuring these attacks and minimize this effects, and Finally we apply these solutions and evaluate them.
Mobile wireless networks consist of a set of cooperative and mobile nodes, each node can move randomly at a specific speed in all directions without any control of a central manager. This type of networks has become a hot research topic due to its military application and suitability for emergencies and natural disasters. Due to the lack of fixed infrastructure, the routing process becomes the major problem in this type of networks, where the responsibility of routing is transferred to each node. Over the last few years, a number of traditional routing protocols has been proposed, but these protocols do not support quality of service in different environments. Some studies have improved some of these protocols to support quality of service for specific environments. This research identifies and analysis some of these improved protocols.
Mobile ad-hoc Networking MANETS is a promising concept to provide flexible, adaptive, and reconfigurable architecture, cost effective solution.In the mobile ad hoc network security is the basic concern for network functions work properly.Routing is t he corner stone in Mobile ad-hoc Networks, A lot of known vulnerabilities and security threats can be exploited to attack routing messages, so it is important to provide secure routing protocol for MANETs.In this paper, we present a secure extension for ad-hoc On Demand Distance Vector Protocol (AODV). The default routing protocol for MANETs. The proposed protocol ensures that discovery of the route between the nodes is functioning properly and securely, achieving mutual authentication between nodes, routing message integrity, generating a security key of data sent and exchanges it securely to ensure confidentiality and all of these are in one stage. By this we save in wireless band, resource consumption, preventing duplicate of authentication algorithms.
Network coding isone of the important researches in multi-hop wireless networks domain and it widely participates in improving the performance of these networks, since it benefits from the broadcasting nature of transmission processes to transmit m ore than single packet in one broadcasting transmission. So it achieves double use of the available bandwidth, which can increase the throughput of the network and reduce the congestion.Our aim in this research is to verify the improvement that network coding presents to theperformance of multi-hops wireless Ad-hoc networks, and to study the accelerating of research process for coding chances through constructing a virtual queues according to the packets flows that pass the node, and applying affective manner to manage this queues.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا