Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 9
Year of Publication: 2014
Authors:
Kirna Rani
Kamaljeet Kaur Magnat
10.5120/17405-7972

Kirna Rani and Kamaljeet Kaur Magnat. Article: A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network. International Journal of Computer Applications 99(9):32-37, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Kirna Rani and Kamaljeet Kaur Magnat},
	title = {Article: A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {9},
	pages = {32-37},
	month = {August},
	note = {Full text available}
}

Abstract

A network is a collection of two or more computer systems which connected with each other. It is type of replace of information to communicate with one another. It is an association or set up of computer devices which are involved with the communication facilities. When number of computer is connected simultaneously to exchange information they form networks and contribute to resources. Networking is used to distribute information like data communication. Sharing resources can be software type or hardware types. It is central administration system or supports these types of system [1]. The communications protocols used to organize network traffic, with the network's size, its topology and its organizational intent. A network can be wired network and wireless network. Wired network is that which used wires for communicate with each other's and wireless network is that which communicate without the use of wires through a medium. In this paper we will discuss the method to detect and Isolation of Selective Packet Drop Attack in Mobile Ad hoc Networks. Other aspects of the paper are:- • To study and evaluate the selective packet drop attack in MANET and its consequences. • To detect the selective packet drop in MANET using AODV protocol. • To propose a new scheme to detect malicious node in the network which are responsible for triggering the selective packet drop attack in the network. • Simulating the detection of selective packet drop attack using AODV protocol in MANET using NS-2 tool.

References

  • Sunil Taneja, Dr. Ashwani Kush, Amandeep Makkar, "End to End Delay Analysis of Prominent On-demand Routing Protocols", IJCST Vol. 2, Issue1, March 2011
  • ABDUL HAIMID BASHIR MOHAMED, thesis, "ANALYSIS AND SIMULATION OF WIRELESS AD-HOC NETWORK ROUTING PROTOCOLS"2004
  • Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer, "An Intrusion Detection Tool forAODV-based Ad hocWireless Networks", 2004
  • Sevil ?en, John A. Clark, Juan E. Tapiador, "Security Threats in Mobile Ad Hoc Networks", 2010
  • Rusha Nandy, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages:1035-1043 (2011)
  • Wenjia Li and Anupam Joshi , "Security Issues in Mobile Ad Hoc Networks- A Survey",2005
  • Gene Tsudik, "Anonymous Location-Aided Routing Protocols for Suspicious MANETs", 2010
  • Karim El Defrawy, and Gene Tsudik , "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs" , IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 9, SEPTEMBER 2011
  • Steven M. Bellovin and Michael Merritt "Limitations of the Kerberos Authentication", USENIX – winter 1991
  • Seung Yi, Robin Kravets, "Key Management for Heterogeneous Ad Hoc Wireless Networks" , 10 th IEEE International Conference on Network Protocols (ICNP'02) 1092-1648
  • Pradeep kyasanur "Selfish MAC layer Misbehavior in wireless networks", IEEE on Mobile Computing, 2005
  • Yixin Jiang Chuang Lin, Minghui Shi, Xuemin Shen "Multiple Key Sharing and Distribution Scheme With (n; t) Threshold for NEMO Group Communications", IEEE 2006
  • Caimu Tang ,Dapeng Oilver "An Efficient Mobile Authentication Scheme for Wireless Networks", IEEE
  • Tien-Ho Chen and Wei-Kuan, Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks ETRI Journal, Volume 32, Number 5, October 2010
  • Sushma Yalamanchi and K. V. Sambasiva Rao "Two-Stage Authentication For Wireless Networks Using Dual Signature And Symmetric Key Protocol" International Journal of Computer Science and Communication (IJCSC), n Vol. 2, No. 2, July-December 2011, pp. 419-422
  • Jacek Cicho, Rafa? Kapelko, Jakub Lemiesz, and Marcin Zawada "On Alarm Protocol in Wireless Sensor Networks", 2010
  • S. Sharmila and G. Umamaheswari, " Defensive Mechanism of Selective Packet Forward Attack in Wireless Sensor Networks", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 4, February 2012
  • Priyanka Goyal, Vintra Parmar and Rahul Rishi , " MANET: Vulnerabilities, Challenges, Attacks, Application" , IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011 ISSN (Online): 2230-7893 2011
  • Donatas Sumyla, " Mobile Adhoc Networks" , IEEE Personal Communications Magazine, April 2003, pp. 46-55.
  • Amandeep Singh Bhatia and Rupinder Kaur Cheema ,"Analysing and Implementing the Mobility over MANETS using Random Way Point Model" , International Journal of Computer Applications (0975 – 8887) Volume 68– No. 17, April 2013
  • Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester , " An overview of Mobile Adhoc Networks: Applications and challenges", Sint Pietersnieuwstraat 41, B-9000 Ghent, Belgium ,2005
  • Loukas Lazos, and Marwan Krunz, "Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks" Dept. of Electrical and Computer Engineering, University ofArizona, Tucson, Arizona, 2009
  • Jiazi YI , " A Survey on the Application of MANET", 2005
  • Ian D. Chakeres and Elizabeth M. Belding-Royer , "AODV Routing Protocol Implementation Design", In C. E. Perkins, editor, Ad hoc Networking, pages 173. 219. Addison-Wesley, 2004
  • Rusha Nandy, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages: 1035-1043 (2011)
  • Tien-Ho Chen and Wei-Kuan, Shih , "A Robust Mutual Authentication Protocol for Wireless Sensor Networks" ETRI Journal, Volume 32, Number 5, October 2010
  • Vinit Garg, Manoj Kr. Shukla, Tanupriya Choudhury, Charu Gupta, "Advance Survey of Mobile Ad-Hoc Network," IJCST Vol. 2, Iss ue 4, Oct . - Dec. 2011