Enhancing Throughput in Mobile Ad Hoc Networks Through Ant Colony Optimization Integration

  • Conference paper
  • First Online: 27 September 2024
  • Cite this conference paper

mobile ad hoc research paper

  • Gurpreet Singh   ORCID: orcid.org/0000-0003-3696-965X 13 , 13 ,
  • Amanpreet Kaur   ORCID: orcid.org/0000-0001-8415-1524 14 ,
  • Rohan Gupta   ORCID: orcid.org/0000-0003-4120-2074 15 &
  • Aashdeep Singh   ORCID: orcid.org/0000-0001-5925-269X 13  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1038))

Included in the following conference series:

  • International Conference On Innovative Computing And Communication

Mobile Ad Hoc Networks (MANETs) represent a dynamic and self-configuring network paradigm where nodes communicate without a fixed infrastructure. This paper provides a succinct yet comprehensive exploration of MANETs and their distinctive characteristics, emphasizing the challenges associated with routing in such decentralized environments. In parallel, the paper introduces Ant Colony Optimization (ACO), a nature-inspired algorithm known for its prowess in solving optimization problems through the simulation of ant foraging behavior. The paper summarizes key findings stemming from an in-depth exploration of ACO's applicability in the context of MANETs. Through a critical analysis of existing literature, the research identifies opportunities for synergy between ACO and MANETs, showcasing the potential improvements in routing performance. The impacts of the presented work lie in advising a novel mixing technique that weights the ability of the ACO to adjust by altering the network conditions and by optimizing the decisions of routing strategy. The fusion of Ant Colony Optimization into Mobile Ad Hoc Networks presents a favorable road path for gripping the inherited contests inherent that lie in the distributed communication. By exploiting the ethics of swarm intelligence, this research paper encourages an adaptive, robust, and efficient framework for routing in MANET by offering the better throughput in the experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

P. Vijaya Lakshmi, S.A.J. Francis, J.A. Dinakaran, A robust energy efficient ant colony optimization routing algorithm for multi hop ad hoc networks in MANETs. Wirel. Netw. New York 22 (6), 2081–2100 (2016)

Google Scholar  

S. Sharma, G. Singh, A. Kaur, Study based comparison of multi-path routing protocols in MANETs. Int. J. Comput. Sci. Commun., pp. 191–196 (2014). ISSN: 0973-7391

A.K. Gupta, H. Sadawarti, A. Verma, Performance analysis of MANET routing protocols in different mobility models. Int. J. Inf. Technol. Comput. Sci. 5 (6), 73–82 (2013)

G. Singh, A. Kaur, Using random way point mobility model to compare the performance of reactive and proactive routing protocols of MANETs in NS-2. Yamuna J. Technol. Bus. Res. 3 (1–2), 5.1–5.7 (2013)

P. Ramesh, M. Devapriya, An optimized energy efficient route selection algorithm for mobile ad hoc networks based on loa. Int. J. Eng. Adv. Technol. 8 (2), 298–304 (2018)

S. Sharma, M. Singh, G. Singh, Swarm intelligence based comparative scrutiny of different routing algorithms in MANETs. Int. J. Res. Eng. Appl. Sci. 2 (2), 1818–1831 (2012)

M. Dorigo, C. Blum, Ant colony optimization theory: a survey. Theoret. Comput. Sci. 344 (2–3), 243–278 (2005)

Article   MathSciNet   Google Scholar  

R. Challenges, A survey of modern ant colony optimization algorithms for MANET , vol. 9, no. 05, pp. 952–959 (2020)

T.K. Priyambodo, D. Wijayanto, M.S. Gitakarma, Performance optimization of MANET networks through routing protocol analysis. Computers (2020)

R. Gupta, G. Singh, A. Kaur, A. Singh, Fitness function based particle swarm optimisation algorithm for mobile adhoc network. Int. J. Eng. Technol. 7 (3.1), 31–33 (2018)

A. Kaur, V.S. Dhaka, G. Singh, Casting multipath behaviour into OANTALG to improve QoS, in IEEE Explore International Conference on Computing for Sustainable Global Development , 16th–18th Mar 2016, pp. 2076–2081

F. Safari, I. Savić, H. Kunze, J. Ernst, D. Gillis, A review of AI-based MANET routing protocols, in 19th IEEExplore International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (2023). Electronic ISBN:9798-3503-3667-226

V. Dattana, K. Krishna Prasad, Optimizing routing in MANETs with energy conservation. Int. J. Appl. Eng. Manage. Lett. (IJAEML) 7(3), 75–87 (2023)

R. Vallikannu, A. George, Performance analysis of autonomous location based energy efficient ACO routing protocol with dissimilar MANET mobility models , vol. 10, no. 4 (2015)

D. Sinwar, N. Sharma, S.K. Maakar, S. Kumar, Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET. J. Inf. Optim. Sci. 41 (2), 621–632 (2020)

A. Kaur, V.S. Dhaka, G. Singh, Adjoining ant’s activities in adhoc on-demand multipath distance vector routing, in International Conference on Green Computing and Engineering Technology , 18–20 Aug 2016, Denmark & Indian J. Sci. Technol. 9 (28), 1–6 (2016)

S. Sharma, M. Singh, G. Singh, Realistic inspection of proposed Ant algorithm with Antnet algorithm using NS-2. Int. J. Res. IT Manage. Eng. 2 (6), 146–156 (2012)

G. di Caro, M. Dorigo, AntNet: distributed stigmergetic control for communications network. J. Artif. Intell. Res. (JAIR) 9 , 317–365 (1998)

S. Prakash Tiwari, G. Singh, Optimizing job scheduling problem using improved GA+CS algorithm, in Lecture Notes in Networks and Systems (LNNS) – ICICC 2022 , vol. 473 (Springer, 2023), pp. 291–297

A. Kaur, G. Singh, A. Singh, R. Gupta, G. Singh, Ant based algorithm for routing in mobile ad-hoc networks, in Springer Lecture Notes in Networks and Systems (LNNS)—ICICC 2023 , vol. 731 (2024), pp. 357–366

V. Kukreja, R. Sharma, A. Kaur, R. Sachdeva, V. Solanki, Deep neural network for multi-classification of parsley leaf spot disease detection, in published in 2022 2nd International Conference on Advance Computing and innovative Technologies in Engineering (ICACITE) (2022)

D. Koundal, S. Gupta, S. Singh, Computer aided thyroid nodule detection system using medical ultrasound images. J. Biomed. Signal Process. Control 40, 117 (2018)

Download references

Author information

Authors and affiliations.

Department of Computer Science and Engineering, Punjab Institute of Technology, Rajpura (MRSPTU, Bathinda), Punjab, India

Gurpreet Singh, Gurpreet Singh & Aashdeep Singh

Department of Computer Science and Engineering, Chitkara University Institute of Engineering & Technology, Rajpura, Punjab, India

Amanpreet Kaur

Department of Electronics and Communication Engineering, University Institute of Engineering, Chandigarh University, Mohali, Punjab, India

Rohan Gupta

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Amanpreet Kaur .

Editor information

Editors and affiliations.

Faculty of Computers and Information, Cairo University, Oula, Egypt

Aboul Ella Hassanien

Department of Operational Research, Faculty of Mathematical sciences, University of Delhi, New Delhi, Delhi, India

Sameer Anand

School of Open Learning, University of Delhi, New Delhi, Delhi, India

Ajay Jaiswal

Computer Science and Engineering Department, National Institute of Technology Patna, Patna, Bihar, India

Prabhat Kumar

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Singh, G., Kaur, A., Gupta, R., Singh, A. (2024). Enhancing Throughput in Mobile Ad Hoc Networks Through Ant Colony Optimization Integration. In: Hassanien, A.E., Anand, S., Jaiswal, A., Kumar, P. (eds) Innovative Computing and Communications. ICICC 2024. Lecture Notes in Networks and Systems, vol 1038. Springer, Singapore. https://doi.org/10.1007/978-981-97-4149-6_31

Download citation

DOI : https://doi.org/10.1007/978-981-97-4149-6_31

Published : 27 September 2024

Publisher Name : Springer, Singapore

Print ISBN : 978-981-97-4148-9

Online ISBN : 978-981-97-4149-6

eBook Packages : Engineering Engineering (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research
  • Corpus ID: 18908270

An overview of mobile ad hoc networks: applications and challenges

  • J. Hoebeke , I. Moerman , +1 author P. Demeester
  • Published 2004
  • Computer Science, Engineering
  • Journal of The Communications Network

370 Citations

An overview of mobile ad hoc network: application, challenges and comparison of routing protocols, new trends in mobile ad hoc network, the diverse technology of manets: a survey of applications and challenges, vanets (vehicular adhoc networks): introduction, imperatives and challenges, challenges in mobile ad hoc networks (manets), performance analysis of mobile ad-hoc routing protocols by varying mobility, speed and network load, a study on challenges and issues on manet.

  • Highly Influenced

Implementation and Analysis of GPSR and ALERT Protocol Techniques in AODV for MANET

Improving efficiency of manet by reducing queuing delay using hybrid algorithm, performance of manet: a review, 13 references, mobile ad hoc networking: imperatives and challenges, internet connectivity for mobile ad hoc networks, a review of routing protocols for mobile ad hoc networks, a review of current routing protocols for ad hoc mobile wireless networks, mipmanet-mobile ip for mobile ad hoc networks, stimulating cooperation in self-organizing mobile ad hoc networks, service discovery in mobile ad hoc networks: an overall perspective on architectural choices and network layer support issues, secure routing in mobile wireless ad hoc networks, mobile ad hoc networking (manet): routing protocol performance issues and evaluation considerations, related papers.

Showing 1 through 3 of 0 Related Papers

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Journal Proposal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

symmetry-logo

Article Menu

mobile ad hoc research paper

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Man-in-the-middle attacks in mobile ad hoc networks (manets): analysis and evaluation.

mobile ad hoc research paper

1. Introduction

  • We discovered two types of MITM attackers in the MANET, each of which had unique skills such as message dropping and message delaying;
  • We determined various strategies of the MITM attacker according to the stationary mobility of legal nodes and the distribution of the harmful nodes in the MANET;
  • We implemented a model based on simulation in order to estimate the influence of the attackers’ patterns.

2. Related Work

3. man-in-the-middle attacks.

  • Passive Mode: The communication line between legal nodes can be passively eavesdropped on by an attacker.
  • Active Mode: Attackers have the active capability to delay or drop the content of data that is received in a communication.
  • MITM as Message Delayed: The successful delivery of messages to each valid node is essential to the operation of MANET. In this assault architecture, the harmful nodes purposefully pass the messages on to the neighboring nodes with a “delay” factor. Since MANET communications are extremely sensitive, delaying such signals might have disastrous effects on the network.
  • MITM as Message Dropped: This kind of assault also indicates a “black hole” assault in MANET, which is when the attacker willfully drops the valid message they have just received, hence preventing further valid message propagation. As a result, the assailant prevents the valid node from receiving any communication, which then prevents the messages from reaching their intended recipients. Dropping the messages can have a big effect on the network because they carry delicate data, such as in collision avoidance. Imagine an instance where valid nodes are supposed to announce the presence of black ice on the path.

4. Environment of Simulation

4.1. setup of simulation.

  • Scenario one: Assailants are dispersed randomly throughout the system;
  • Scenario two: Assailants are gathered in a fleet configuration.

4.2. Simulation Scenario Setup

4.3. performance evaluation metrics.

  • End-to-End Delay (E2ED): The E2ED refers to the delay experienced by a packet that has been issued by the legal node and which is to be shared with neighboring nodes. The E2ED is a metric related to the quality of service (QoS) of the network, as shown in the following equation: E 2 ED = T R − T G (1) where T R is the packet reception time, and T G is the packet generation time. Hence, E2ED is the difference of T G and T R .
  • Packet Loss Ratio (PLR): The PLR indicates the amount of data that is lost due to MITM nodes, as expressed by the following equation: PLR = M L M T (2) where M T is the overall number of messages received, and M L is the total number of messages lost. Therefore, PLR is the difference of M T and M L . More specifically, the total number of messages M T includes messages received at both the legal node M R and the harmful node M L , as shown in the following equation: M L + M R = M T (3)
  • Amount of delayed messages: This indicator displays the number of data that the rogue node has delayed.
  • Amount of dropped messages: The dropping of messages from legal nodes is the statistic that is defined for MITM. The number of messages discarded by network attackers is indicated by this measure.

5. Results and Discussion

5.1. simulation results, 5.1.1. message-delayed assaults, 5.1.2. message-dropped assaults, 5.2. discussion, 6. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Hamdi, M.M.; Mustafa, A.S.; Mahd, H.F.; Abood, M.S.; Kumar, C.; Al-shareeda, M.A. Performance Analysis of QoS in MANET based on IEEE 802.11 b. In Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangalore, India, 6–8 November 2020; pp. 1–5. [ Google Scholar ]
  • Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. Int. J. Eng. Manag. Res. 2020 , 10 , 153–158. [ Google Scholar ] [ CrossRef ]
  • Yasin, A.; Abu Zant, M. Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mob. Comput. 2018 , 2018 , 9812135. [ Google Scholar ] [ CrossRef ]
  • Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry 2020 , 12 , 1687. [ Google Scholar ] [ CrossRef ]
  • Veeraiah, N.; Khalaf, O.I.; Prasad, C.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021 , 9 , 120996–121005. [ Google Scholar ] [ CrossRef ]
  • Kausar Fatima, S.; Gauhar Fatima, S.; Abdul Sattar, S.; Mohd Ali, S. Mobile Adhoc Networks Security Challenges: A Survey. Int. J. Adv. Res. Eng. Technol. 2019 , 10 , 224–237. [ Google Scholar ]
  • Saed, M.; Aljuhani, A. Detection of Man in The Middle Attack using Machine learning. In Proceedings of the 2022 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 25–27 January 2022; pp. 388–393. [ Google Scholar ]
  • Dorri, A.; Kamel, S.R.; Kheirkhah, E. Security challenges in mobile ad hoc networks: A survey. arXiv 2015 , arXiv:1503.03233. [ Google Scholar ] [ CrossRef ]
  • Javeed, D.; MohammedBadamasi, U.; Ndubuisi, C.O.; Soomro, F.; Asif, M. Man in the middle attacks: Analysis motivation and prevention. Int. J. Comput. Netw. Commun. Secur. 2020 , 8 , 52–58. [ Google Scholar ] [ CrossRef ]
  • Shekhar, S.; Mahajan, M.; Kaur, S. A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks. In Proceedings of the 2022 IEEE 6th International Conference on Trends in Electronics and Informatics (ICOEI), Cheranmahadevi, Tirunelveli, India, 28–30 April 2022; pp. 638–643. [ Google Scholar ]
  • Chen, Z.; Guo, S.; Duan, R.; Wang, S. Security analysis on mutual authentication against man-in-the-middle attack. In Proceedings of the 2009 IEEE First International Conference on Information Science and Engineering, Nanjing, China, 26–28 December 2009; pp. 1855–1858. [ Google Scholar ]
  • Stricot-Tarboton, S.; Chaisiri, S.; Ko, R.K. Taxonomy of Man-in-the-Middle Attacks on HTTPS. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 527–534. [ Google Scholar ]
  • Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016 , 18 , 2027–2051. [ Google Scholar ] [ CrossRef ]
  • Glass, S.M.; Muthukkumarasamy, V.; Portmann, M. Detecting man-in-the-middle and wormhole attacks in wireless mesh networks. In Proceedings of the 2009 IEEE International Conference on Advanced Information Networking and Applications, Bradford, UK, 26–29 May 2009; pp. 530–538. [ Google Scholar ]
  • Kaplanis, C. Detection and Prevention of Man in the Middle Attacks in Wi-Fi Technology. Ph.D. Thesis, Aalborg University, Aalborg, Denmark, 2015. [ Google Scholar ]
  • Alazzawi, M.A.; Al-behadili, H.A.; Srayyih Almalki, M.N.; Challoob, A.L.; Al-shareeda, M.A. ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; Springer: Singapore, 2020; pp. 80–94. [ Google Scholar ]
  • Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 2022 , 22 , 1696. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks. Appl. Sci. 2022 , 12 , 1383. [ Google Scholar ] [ CrossRef ]
  • Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 2022 , 22 , 5026. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Appl. Sci. 2022 , 12 , 5939. [ Google Scholar ] [ CrossRef ]
  • Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 2021 , 21 , 8206. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 2021 , 9 , 113226–113238. [ Google Scholar ] [ CrossRef ]
  • Al-Shareeda, M.A.; Anbar, M.; Alazzawi, M.A.; Manickam, S.; Al-Hiti, A.S. LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access 2020 , 8 , 170507–170518. [ Google Scholar ] [ CrossRef ]
  • Ali, I.; Lawrence, T.; Omala, A.A.; Li, F. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Trans. Veh. Technol. 2020 , 69 , 11266–11280. [ Google Scholar ] [ CrossRef ]
  • Abass, R.; Habyarimana, A.; Tamine, K. Securing a mobile ad hoc NETwork against the man in the middle attack. Int. J. Artif. Intell. Inform. 2022 , 3 , 53–62. [ Google Scholar ] [ CrossRef ]
  • Sowah, R.A.; Ofori-Amanfo, K.B.; Mills, G.A.; Koumadi, K.M. Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). J. Comput. Netw. Commun. 2019 , 2019 , 4683982. [ Google Scholar ] [ CrossRef ]
  • Nayak, G.N.; Samaddar, S.G. Different flavours of man-in-the-middle attack, consequences and feasible solutions. In Proceedings of the 2010 3rd IEEE International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 5, pp. 491–495. [ Google Scholar ]
  • Ahmad, F.; Adnane, A.; Franqueira, V.N.; Kurugollu, F.; Liu, L. Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies. Sensors 2018 , 18 , 4040. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Mészáros, L.; Varga, A.; Kirsche, M. Inet framework. In Recent Advances in Network Simulation ; Springer: Berlin, Germany, 2019; pp. 55–106. [ Google Scholar ]
  • Sánchez-Casado, L.; Rodríguez-Gómez, R.A.; Magán-Carrión, R.; Maciá-Fernández, G. NETA: Evaluating the effects of NETwork attacks. MANETs as a case study. In Proceedings of the International Conference on Security of Information and Communication Networks, Cairo, Egypt, 3–5 September 2013; Springer: Berlin, Germany, 2013; pp. 1–10. [ Google Scholar ]
  • Varga, A. OMNeT++. In Modeling and Tools for Network Simulation ; Springer: Berlin, Germany, 2010; pp. 35–59. [ Google Scholar ]

Click here to enlarge figure

ParametersValues
Network SimulatorOMNeT++ 4.3
MANET SimulatorINET Framework 2.1.0
NETwork AttacksNETA v1-1.0
No. of Nodes100
No. of Harmful Node1, 3, 5, 7
Simulation Area3.0 km · 3.0 km
Simulation Time1000 s
Node MobilityStationary
Source ApplicationUDPBasicApp
Destination ApplicationUDPSink
Packet Size512 B
Send Interval0.5 s + uniform (−0.001 s, 0.001 s)
MAC Standard802.11 g
Number of Repetitions4
Bit Rate54 Mbps
Routing ProtocolAODVUU
AODVUU TypeLink Layer Feedback
Transmitter Power2.0 mW
Sensitivity−85 dBm
Thermal Noise−110 dBm
Carrier Frequency2.4 GHz
Path Loss Alpha2
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

Al-Shareeda, M.A.; Manickam, S. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry 2022 , 14 , 1543. https://doi.org/10.3390/sym14081543

Al-Shareeda MA, Manickam S. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry . 2022; 14(8):1543. https://doi.org/10.3390/sym14081543

Al-Shareeda, Mahmood A., and Selvakumar Manickam. 2022. "Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation" Symmetry 14, no. 8: 1543. https://doi.org/10.3390/sym14081543

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

First page of “Mobile Ad Hoc Networks: Issues, Research Trends and Experiments”

Download Free PDF

Mobile Ad Hoc Networks: Issues, Research Trends and Experiments

Profile image of Lokanatha Reddy

2008, International Engineering and …

A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe challenges. This paper describes the fundamental problems of ad hoc networking by giving its related background including the concept, features, applications, issues of MANETs, investigates and presents recent research trends and identifies Simulators for MANETs[5]. Based on recent research interests of scholars we found that some issues such as routing and power management attracted much attention and issues such as IP addressing and fault tolerance will have wide scope in the future. In the qualitative analysis [5], we found that some factors such as scalability, stability, and reliability attracted much. The essential simulation metrics for various MANET issues are identified and Simulators are listed for experiment. The analysis results demonstrate the utilization trends for various MANET simulators.

Free related PDFs Related papers

— A mobile ad hoc network is the self-configure and self-organized infrastructure less network that is used for wireless. Mobile ad hoc network (MANET) are not used any centralized device to manage the nodes [1]. The range or the paths between the nodes are limited. When a node are move far from the range that node are out of network. This paper presents the study of the Manet Types, Features and its Challenges.

mobile ad hoc research paper

International Journal of Computer Applications, 2013

Study of Mobile Ad hoc Networks Cover Page

International Journal of Emerging Trends in Engineering and Development, 2018

A Review on Manet (Mobile Ad Hoc Network) Cover Page

International Journal of Scientific Research in Science and Technology, 2019

MANET is a collection of various mobile nodes that are helpful to communicate with each other without any centralized control which are wireless and work as dynamic network. The current generation is much advanced in using such type of networks, which is very flexible and portable to the end users, which is most economical. The applications of this MANETs are used world wide due to its advantages, but still there are some issues which need to be resolved, known as challenges. This paper is on the various challenges and characteristics of MANET.

Study of Mobile Ad-hoc Network's Challenges and Characteristics Cover Page

International Journal of Engineering and Computer Science, 2019

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other proper...

Survey of mobile ad hoc networks (manets) Cover Page

Ijca Proceedings on Recent Advances in Wireless Communication and Artificial Intelligence, 2014

A Survey to MANET Techniques Research and Related Challenges Cover Page

International Journal of Engineering Research and Technology (IJERT), 2020

https://www.ijert.org/a-study-on-manet-applications-challenges-and-issues https://www.ijert.org/research/a-study-on-manet-applications-challenges-and-issues-IJERTCONV8IS03003.pdf Wireless ad hoc networks have become an important area of research in wireless communications systems. Mobile Ad hoc Network is an ad hoc network that can be formed to allow nodes to communicate without any infrastructure. The set up of MANET makes it very popular as compared to the traditional wireless network. In traditional wireless network, mid-point is required for overall process of the network, whereas MANET is self-organized and infrastructure-free network, which is considered as a good approach for some specific applications such as battlefield survivability, communication in the natural or manmade disaster areas, emergency or rescue operations. This research work attempts to provide a wide overview of this active field and it first explains detailed survey of MANET in different fields and then takes over several challenges and issues in the Ad hoc networking area. Finally specify the active application areas of MANET and describes the future work.

IJERT-A Study on Manet: Applications, Challenges and Issues Cover Page

orhandagdeviren.com

Modeling and Simulation of Mobile Ad hoc Networks Cover Page

IJCA Proceedings on National Workshop-Cum- …, 2012

Performance Analysis of Various Protocols for MANETs through simulation Cover Page

International Journal of Network Management, 2005

Study of MANET routing protocols by GloMoSim simulator Cover Page

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

MANET : An Overview Cover Page

International Journal of Computer Applications, 2014

Simulation based Comparative Study of MANET Routing Protocols Cover Page

Electronic Notes in Theoretical Computer Science, 2006

An Overview of MANETs Simulation Cover Page

IEEE Systems Journal, 2010

A testbed for MANETs: Implementation, experiences and learned lessons Cover Page

IOSR Journal of Computer Engineering, 2014

Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs) Cover Page

Computing and Informatics, 2012

Performance Evaluation of MANET Routing Protocols: Simulations and Experiments Cover Page

International Journal of Electrical and Computer Engineering (IJECE), 2017

A Performance Review of Intra and Inter-Group MANET Routing Protocols under Varying Speed of Nodes Cover Page

International Journal of Computer Trends and Technology

Mobile Ad Hoc Networks: An Overview Cover Page

The Third International Conference on e-Technologies and Networks for Development (ICeND2014), 2014

A comparative study of MANET routing protocols Cover Page

International Journal of Engineering Research and Technology (IJERT), 2016

IJERT-Performance Analysis of Routing Protocols based on Simulation Models in MANET’s Cover Page

Communications in Computer and Information Science, 2020

Analytical Study of Wireless Ad-Hoc Networks: Types, Characteristics, Differences, Applications, Protocols Cover Page

Related topics

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. (PDF) An overview of mobile ad hoc networks: Applications and challenges

    mobile ad hoc research paper

  2. (PDF) Mobile Ad-Hoc Networks Applications and Its Challenges

    mobile ad hoc research paper

  3. (PDF) Mobile Ad Hoc Network

    mobile ad hoc research paper

  4. (PDF) Survey of Mobile Ad hoc Networks Attacks and a New Classification

    mobile ad hoc research paper

  5. (PDF) Mobile Ad Hoc Networks: Issues, Research Trends and Experiments

    mobile ad hoc research paper

  6. A survey of security issues in mobile ad hoc and sensor networks

    mobile ad hoc research paper

VIDEO

  1. #Research_Proposal

  2. Tap Mining app || Earn Money By Tap on Mobile || Tap Application Real or fake || tap tap mining app

  3. Routing in Mobile Ad-hoc Networks

  4. Mit WEMF-Daten zum Erfolg: Black Friday-Kampagne enthüllt Potenzial, Zielgruppen und Medienstrategie

  5. Applications of Mobile Ad-hoc Networks

  6. Mobile Ad hoc Network with Aodv Network Simulator 3 Code Projects

COMMENTS

  1. A Review of Mobile Ad hoc NETwork (MANET) Protocols and their

    In this paper, an investigation on protocol issues for mobile ad hoc networks (MANET) is conducted. The capacity and relevance of nomadic computing are evident with the quick propagation of wireless devices like laptops, wireless sensors, and smartphones. A MANET is a non-temporary infrastructure, consisting of a group of mobile hosts which have no central management and dynamically create ...

  2. MOBILE AD-HOC NETWORKS: APPLICATIONS AND CHALLENGES

    A Mobile Ad-hoc Network (MANET) is a decentralized, infrastructure-less network where. wireless nodes move randomly.Ad-hoc networks can be accessed anytime, anywhere, autonomous with cost ...

  3. Mobile ad hoc networking: imperatives and challenges

    In this paper, we describe the ongoing research activities and the challenges in some of the main research areas within the mobile ad hoc network domain. To present the huge amount of research activities on ad hoc networks in a systematic/organic way, we will use, as a reference, the simplified architecture shown in Fig. 2 .

  4. Recent Advances in Mobile Ad Hoc Networks

    1. Introduction. Mobile ad hoc networks (MANET s) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastr ucture and have attracted. decades ...

  5. Recent Advances in Mobile Ad Hoc Networks

    1. Introduction. Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort. Traditional MANET research focuses on routing issues among nodes with low power and weak ability.

  6. Mobile Ad Hoc Networks: Recent Advances and Future Trends

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Mobile ad hoc networks ...

  7. Enhancing Throughput in Mobile Ad Hoc Networks Through Ant Colony

    Mobile Ad Hoc Networks (MANETs) represent a dynamic and self-configuring network paradigm where nodes communicate without a fixed infrastructure. This paper provides a succinct yet comprehensive exploration of MANETs and their distinctive characteristics, emphasizing the challenges associated with routing in such decentralized environments.

  8. Mobile ad hoc networking: milestones, challenges, and new research

    In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This paradigm has often been identified with the solutions developed inside the IETF MANET working group, and for this reason it is called the MANET paradigm. However, they do not coincide, and in the last decade they clearly diverged. In this article, we start from the reasons why the MANET paradigm did ...

  9. Mobile ad hoc networking: imperatives and challenges

    The paper is organized as follows. In Section 2, we explain why ad hoc networking is an essential component of the 4G network architectures. In Section 3, we look at mobile ad hoc networks in closer detail, covering their specific characteristics, advantages, as well as design challenges. This is followed by an analysis of MANET evolution from ...

  10. Mobile ad hoc networking: milestones, challenges, and new research

    This article discusses the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the IETF MANET research, and analyzes four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application. In this article we discuss the state of the art of (mobile) multihop ad hoc ...

  11. PDF A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

    identified early reactive and proactive MANET routing protocols. Our review focuses upon protocols developed by Perkins, namely the Destination Sequenced Distance Vector (DSDV) and Ad-hoc On-demand Distance Vector (AODV) wh. ch researchers claim is the most popular MANET routing protocol. Due to the popularity of the AODV protocol a number of ...

  12. Vehicular Ad Hoc Networks: Architectures, Research Issues

    VANETs which use vehicles as mobile nodes are a subclass of mobile ad hoc networks (MANETs) to provide communications among nearby vehicles and between vehicles and nearby roadside equipment [] but apparently differ from other networks by their own characteristics.Specifically, the nodes (vehicles) in VANETs are limited to road topology while moving, so if the road information is available, we ...

  13. (PDF) An Overview of Mobile Ad Hoc Networks for the ...

    Mobile Ad Hoc Network (M ANET) i s a collection of two or more devices or nodes or terminals with. wireless communica tions and networking capability that communic ate with each other without the ...

  14. [PDF] An overview of mobile ad hoc networks: applications and

    Insight is provided into the potential applications of ad hoc networks and the technological challenges that protocol designers and network developers are faced with, which include routing, service and resource discovery, Internet connectivity, billing and security. In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive ...

  15. Routing in Mobile Ad-hoc Networks

    From the last decade, there has been expeditious growth and a worldwide success is perceived in the area of wireless ad-hoc networking. Especially, one class of wireless ad-hoc networks, that is, mobile ad-hoc network (MANET) drawing a great attention from the critical applications like emergency search and rescue operations and disaster recovery services. A MANET consists of mobile nodes that ...

  16. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs ...

    Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, and in Internet of Things (IoT) ecosystems. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature ...

  17. An overview of mobile ad hoc networks: Applications and challenges

    This paper provides insight into the potential. applications of ad hoc networks and discusses the. technological challenges that protocol designers and. network developers are faced with. These ...

  18. Mobile ad hoc network overview

    Abstract: A mobile ad hoc network (MANET) is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad-hoc network routing ...

  19. (PDF) An Overview of Mobile Ad Hoc Networks: Applications and

    Currently, mobile ad hoc network research is a very vibrant and active field and the efforts of the research community, together with current and future MANET enabling radio technologies, which are summarised in Table 3, will certainly pave the way for commercially viable MANETs and their new and exciting applications, with some of these ...

  20. (PDF) Mobile Ad-Hoc Networks: An Overview

    In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the ...

  21. Mobile ad hoc networks: Local distributed algorithms for virtual

    In recent years, routing algorithms for mobile ad hoc networks have been popular research topics. This paper represents a survey of local distributed algorithms which are used for virtual backbone-based routing. The virtual backbone transforms an original flat structure of the mobile ad hoc networks into hierarchical, which is more appropriate ...

  22. Mobile Ad Hoc Networks: Issues, Research Trends and Experiments

    — A mobile ad hoc network is the self-configure and self-organized infrastructure less network that is used for wireless. Mobile ad hoc network (MANET) are not used any centralized device to manage the nodes [1]. The range or the paths between the nodes are limited. When a node are move far from the range that node are out of network.

  23. Mobile Ad-Hoc Networks Applications and Its Challenges

    In the related research of MANETs, the mobility model is the basis for studying the simulation of ad hoc network, and currently it mainly faces several difficulties [2, 3]: First, the mobility of ...