CFP last date
20 May 2024
Reseach Article

A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network

by Kirna Rani, Kamaljeet Kaur Magnat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 9
Year of Publication: 2014
Authors: Kirna Rani, Kamaljeet Kaur Magnat
10.5120/17405-7972

Kirna Rani, Kamaljeet Kaur Magnat . A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network. International Journal of Computer Applications. 99, 9 ( August 2014), 32-37. DOI=10.5120/17405-7972

@article{ 10.5120/17405-7972,
author = { Kirna Rani, Kamaljeet Kaur Magnat },
title = { A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 9 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number9/17405-7972/ },
doi = { 10.5120/17405-7972 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:48.224005+05:30
%A Kirna Rani
%A Kamaljeet Kaur Magnat
%T A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 9
%P 32-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A network is a collection of two or more computer systems which connected with each other. It is type of replace of information to communicate with one another. It is an association or set up of computer devices which are involved with the communication facilities. When number of computer is connected simultaneously to exchange information they form networks and contribute to resources. Networking is used to distribute information like data communication. Sharing resources can be software type or hardware types. It is central administration system or supports these types of system [1]. The communications protocols used to organize network traffic, with the network's size, its topology and its organizational intent. A network can be wired network and wireless network. Wired network is that which used wires for communicate with each other's and wireless network is that which communicate without the use of wires through a medium. In this paper we will discuss the method to detect and Isolation of Selective Packet Drop Attack in Mobile Ad hoc Networks. Other aspects of the paper are:- • To study and evaluate the selective packet drop attack in MANET and its consequences. • To detect the selective packet drop in MANET using AODV protocol. • To propose a new scheme to detect malicious node in the network which are responsible for triggering the selective packet drop attack in the network. • Simulating the detection of selective packet drop attack using AODV protocol in MANET using NS-2 tool.

References
  1. Sunil Taneja, Dr. Ashwani Kush, Amandeep Makkar, "End to End Delay Analysis of Prominent On-demand Routing Protocols", IJCST Vol. 2, Issue1, March 2011
  2. ABDUL HAIMID BASHIR MOHAMED, thesis, "ANALYSIS AND SIMULATION OF WIRELESS AD-HOC NETWORK ROUTING PROTOCOLS"2004
  3. Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer, "An Intrusion Detection Tool forAODV-based Ad hocWireless Networks", 2004
  4. Sevil ?en, John A. Clark, Juan E. Tapiador, "Security Threats in Mobile Ad Hoc Networks", 2010
  5. Rusha Nandy, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages:1035-1043 (2011)
  6. Wenjia Li and Anupam Joshi , "Security Issues in Mobile Ad Hoc Networks- A Survey",2005
  7. Gene Tsudik, "Anonymous Location-Aided Routing Protocols for Suspicious MANETs", 2010
  8. Karim El Defrawy, and Gene Tsudik , "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs" , IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 9, SEPTEMBER 2011
  9. Steven M. Bellovin and Michael Merritt "Limitations of the Kerberos Authentication", USENIX – winter 1991
  10. Seung Yi, Robin Kravets, "Key Management for Heterogeneous Ad Hoc Wireless Networks" , 10 th IEEE International Conference on Network Protocols (ICNP'02) 1092-1648
  11. Pradeep kyasanur "Selfish MAC layer Misbehavior in wireless networks", IEEE on Mobile Computing, 2005
  12. Yixin Jiang Chuang Lin, Minghui Shi, Xuemin Shen "Multiple Key Sharing and Distribution Scheme With (n; t) Threshold for NEMO Group Communications", IEEE 2006
  13. Caimu Tang ,Dapeng Oilver "An Efficient Mobile Authentication Scheme for Wireless Networks", IEEE
  14. Tien-Ho Chen and Wei-Kuan, Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks ETRI Journal, Volume 32, Number 5, October 2010
  15. Sushma Yalamanchi and K. V. Sambasiva Rao "Two-Stage Authentication For Wireless Networks Using Dual Signature And Symmetric Key Protocol" International Journal of Computer Science and Communication (IJCSC), n Vol. 2, No. 2, July-December 2011, pp. 419-422
  16. Jacek Cicho, Rafa? Kapelko, Jakub Lemiesz, and Marcin Zawada "On Alarm Protocol in Wireless Sensor Networks", 2010
  17. S. Sharmila and G. Umamaheswari, " Defensive Mechanism of Selective Packet Forward Attack in Wireless Sensor Networks", International Journal of Computer Applications (0975 – 8887) Volume 39– No. 4, February 2012
  18. Priyanka Goyal, Vintra Parmar and Rahul Rishi , " MANET: Vulnerabilities, Challenges, Attacks, Application" , IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011 ISSN (Online): 2230-7893 2011
  19. Donatas Sumyla, " Mobile Adhoc Networks" , IEEE Personal Communications Magazine, April 2003, pp. 46-55.
  20. Amandeep Singh Bhatia and Rupinder Kaur Cheema ,"Analysing and Implementing the Mobility over MANETS using Random Way Point Model" , International Journal of Computer Applications (0975 – 8887) Volume 68– No. 17, April 2013
  21. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester , " An overview of Mobile Adhoc Networks: Applications and challenges", Sint Pietersnieuwstraat 41, B-9000 Ghent, Belgium ,2005
  22. Loukas Lazos, and Marwan Krunz, "Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks" Dept. of Electrical and Computer Engineering, University ofArizona, Tucson, Arizona, 2009
  23. Jiazi YI , " A Survey on the Application of MANET", 2005
  24. Ian D. Chakeres and Elizabeth M. Belding-Royer , "AODV Routing Protocol Implementation Design", In C. E. Perkins, editor, Ad hoc Networking, pages 173. 219. Addison-Wesley, 2004
  25. Rusha Nandy, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, Pages: 1035-1043 (2011)
  26. Tien-Ho Chen and Wei-Kuan, Shih , "A Robust Mutual Authentication Protocol for Wireless Sensor Networks" ETRI Journal, Volume 32, Number 5, October 2010
  27. Vinit Garg, Manoj Kr. Shukla, Tanupriya Choudhury, Charu Gupta, "Advance Survey of Mobile Ad-Hoc Network," IJCST Vol. 2, Iss ue 4, Oct . - Dec. 2011
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network MANET AODV.