logo
    Machine Learning Driven Routing Optimization for Named Data Networking in Mobile Adhoc Network
    0
    Citation
    0
    Reference
    10
    Related Paper
    Securing an Ad Hoc Network has always been a challenge due to high node mobility and low trust between the network's nodes. This paper suggests an architecture for an Intrusion Detection Prevention System in Ad hoc Networks, assuming an environment where the network's nodes are random, mobile within a specific area that has a centralized, physically fixed node which will be later defined as the Ad Hoc Super-Host.
    A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
    Geocast
    Delay-tolerant networking
    Citations (12)
    Technological advances are leveraging the widespread deployment of mobile ad hoc networks. An interesting characteristic of ad hoc networks is their self-organization and their dependence of the behavior of individual nodes. Until recently, most research on ad hoc networks has assumed that all nodes were cooperative. This assumption is no longer valid in spontaneous networks formed by individuals with diverse goals and interests. In such environment, the presence of selfish nodes may degrade significantly the performance of the ad hoc network. This paper proposes a novel algorithm that aims to discourage selfish behavior in mobile ad hoc networks.
    Geocast
    Delay-tolerant networking
    Post-hoc analysis
    Citations (68)
    MANETs find their use particularly in the field where infrastructured network are not possible without having any centralized administration. Where this feature helps in rapidly deploying and establishing the ad Hoc networks, it makes it highly susceptible for attacks. Mobile ad- hoc networks (MANETs) rely on cooperation of all participating nodes. Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.
    Citations (0)
    A mobile ad-hoc network (MANET) is a wireless network made up of mobile hosts that do not require any fixed infrastructure to communicate. The major features of ad-hoc networks is self-organization and dynamics in user participation. Because of these features, the security in ad-hoc becomes a challenge. In this paper, we consider an interesting scenario, where an arbitrary number of nodes in MANET can dynamically form an anonymous group that exhibits the following features: (1) any outsider can be convinced that the node is indeed in the group; (2) any outsider can send a message back to the node in the group.
    Geocast
    Citations (3)
    In this paper an algorithm is proposed for distributed self-controlled movement of mobile nodes in a wireless ad-hoc network to maintain the topology of a Mobile Ad-Hoc Networks (MANET). Each node in the network gets the present status of other nodes and its connectivity with them through message communication. Examining the situation the nodes take necessary action to maintain the neighborhood topology. The necessary actions are stop, rush and continue with their preferred velocity. This concept is simulated in a few example networks. These simulation results show that the nodes remain in the neighborhood of each other throughout the movement, for each network.
    Topology Control
    Geocast
    Citations (0)
    선진국은 미래전쟁을 네트워크 및 컴퓨팅을 중심으로 전자정보전이라는 개념하에 전투병의 생존을 보장해 주고, 전투상황에 대한 유용한 정보를 효율적으로 제공해줄 수 있는 군 통신망이 개발되고 있다. 미군은 변화된 미래 전장환경에 효율적으로 대처하는 방법은 발달된 첨단 네트워크 기술에 기반한 정보우위의 달성이라 판단하고, 이를 실현하기 위해 WIN-T(Warfrighter Information Network-Tactical), 중간 체계인 JNN(Joint Network Node), 미래전투체계인 FCS(Future Combat System) 사업 등이 이루어 지고 있다. 우리나라 역시 네트워크 중심전(NCW)에 대비한 전술통신체계인 TICN(Tactical Information Communication Network) 체계를 개발하고 있으며, TICN체계의 주요 장비 중 하나인 TMMR(Tactical Multiband Multirole Radio)은 소프트웨어 기반의 SDR(Software Defined Radio) 무전기로 여러 가지 대역과 모드를 지원한다. 정보의 유통을 위한 전술 데이터망을 구성하는 WNW(Wideband Network Waveform)이 모드를 지원하며, 이의 구현을 위해 MANET(Mobile Ad hoc Network) 기술을 적용하고 있다. MANET이란 기존의 인프라 기반의 네트워크와는 달리 이동성을 가진 노드들 간의 멀티홉을 통해 데이터를 전달하는 개념의 네트워크 기술로 미래 전장 환경에서 C2OTM(Commnad & Control On-The-Move)의 보장을 위한 기술이다. 이동 Ad Hoc 네트워크 기술의 동향을 살펴보고 우리 군이 적용해야 할 방향을 정립할 필요가 있다. 이동 Ad Hoc 네트워크는 고정적이고 계층적인 인프라스트럭처 네트워크와는 비교되는, 이동 노드만으로 구성된 자율적이고 수평적인 네트워크이다. 이동 Ad Hoc 네트워크의 이동 노드는 중재자의 도움 없이 능동적인 연결 설정이 가능하고 네트워크의 참여 또는 이탈이 자유로우며 에너지원의 공급이 제한되어 빈번하게 네트워크의 토폴로지를 변화시킨다. 이러한 망의 특성상 미래 전장 환경에서 전투원의 이동성 보장을 대안으로 주목되는 기술이다. 군 전술이동통신 환경에서 적절한 이동 Ad-hoc 네트워크 기술이 적절히 활용되고 개발되어야 한다. 이 글에서는 이러한 Ad Hoc 네트워크의 특징과 특성을 살펴보고 관련 주요 요소 기술과 과거부터 현재까지 이동 Ad Hoc 네트워크 기술 분야에서 진행 되어온 연구동향을 살펴본다.
    Geocast
    Citations (0)
    The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of thei
    Mobile ad hoc network is a self-organized network made up of mobile devices. It is also often termed an infrastructure-less, spontaneous and dynamic network. Due to the temporary cooperation among nodes, and no enough knowledge between each node in advance, it is difficult to establish trust in ad hoc network. In this paper, a novel cluster-based trust model for ad hoc networks was presented and an inter-cluster recommendation trust concept was introduced. In our model, a network is divided into clusters with one special node each. It establishes trust relationship for internal clusters dynamically based on previous transactions result. From the experiment results, we can see that the model is dynamic and efficient enough to be applicable to in ad hoc networks. Uncertainty problem with nodes coming and going in spontaneous ad hoc environments can be solved well with this model.
    Delay-tolerant networking
    Citations (16)