Adaptive Neighbor Detection for Mobile Ad Hoc Networks
نویسندگان
چکیده
One critical issue of MANET is to improve packet delivery in presence of network dynamics. Proactive MANET routing protocols tend to provide smaller route discovery latency than ondemand protocols because they maintain route information to all the nodes in the network at all time. However, the downside for such protocols is the excessive routing control overhead generated by disseminating periodic HELLO messages and topology control messages. Due to the resource-constrained nature of wireless networks, the routing overhead increases channel contention, leads to network congestions and lowers significantly network performance. In order to mitigate the side effects of the soft update control overheads, we propose an adaptive neighbor detection algorithm for MANET routing protocols, namely DT MIAD. By tuning the value of refresh intervals dynamically and automatically, refresh updates are triggered based on traffic conditions and node mobility. We have shown through simulations that, the proposed adaptive routing algorithm outperforms traditional proactive routing protocols like OLSR. Adaptive Neighbor Detection for Mobile Ad Hoc Networks Yangcheng Huang Department of Computer Science University College London Gower Street, London WC1E 6BT Email: [email protected] Saleem Bhatti School of Computer Science University of St. Andrews St. Andrews, UK Email: [email protected] Søren-Aksel Sørensen Department of Computer Science University College London Gower Street, London WC1E 6BT Email: [email protected] Abstract— One critical issue of MANET is to improve packet delivery in presence of network dynamics. Proactive MANET routing protocols tend to provide smaller route discovery latency than on-demand protocols because they maintain route information to all the nodes in the network at all time. However, the downside for such protocols is the excessive routing control overhead generated by disseminating periodic HELLO messages and topology control messages. Due to the resource-constrained nature of wireless networks, the routing overhead increases channel contention, leads to network congestions and lowers significantly network performance. In order to mitigate the side effects of the soft update control overheads, we propose an adaptive neighbor detection algorithm for MANET routing protocols, namely DT MIAD. By tuning the value of refresh intervals dynamically and automatically, refresh updates are triggered based on traffic conditions and node mobility. We have shown through simulations that, the proposed adaptive routing algorithm outperforms traditional proactive routing protocols like OLSR. One critical issue of MANET is to improve packet delivery in presence of network dynamics. Proactive MANET routing protocols tend to provide smaller route discovery latency than on-demand protocols because they maintain route information to all the nodes in the network at all time. However, the downside for such protocols is the excessive routing control overhead generated by disseminating periodic HELLO messages and topology control messages. Due to the resource-constrained nature of wireless networks, the routing overhead increases channel contention, leads to network congestions and lowers significantly network performance. In order to mitigate the side effects of the soft update control overheads, we propose an adaptive neighbor detection algorithm for MANET routing protocols, namely DT MIAD. By tuning the value of refresh intervals dynamically and automatically, refresh updates are triggered based on traffic conditions and node mobility. We have shown through simulations that, the proposed adaptive routing algorithm outperforms traditional proactive routing protocols like OLSR.
منابع مشابه
ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل