Enhancing Throughput in Mobile Ad Hoc Networks Through Ant Colony Optimization Integration
- Conference paper
- First Online: 27 September 2024
- Cite this conference paper
- Gurpreet Singh ORCID: orcid.org/0000-0003-3696-965X 13 , 13 ,
- Amanpreet Kaur ORCID: orcid.org/0000-0001-8415-1524 14 ,
- Rohan Gupta ORCID: orcid.org/0000-0003-4120-2074 15 &
- Aashdeep Singh ORCID: orcid.org/0000-0001-5925-269X 13
Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1038))
Included in the following conference series:
- International Conference On Innovative Computing And Communication
Mobile Ad Hoc Networks (MANETs) represent a dynamic and self-configuring network paradigm where nodes communicate without a fixed infrastructure. This paper provides a succinct yet comprehensive exploration of MANETs and their distinctive characteristics, emphasizing the challenges associated with routing in such decentralized environments. In parallel, the paper introduces Ant Colony Optimization (ACO), a nature-inspired algorithm known for its prowess in solving optimization problems through the simulation of ant foraging behavior. The paper summarizes key findings stemming from an in-depth exploration of ACO's applicability in the context of MANETs. Through a critical analysis of existing literature, the research identifies opportunities for synergy between ACO and MANETs, showcasing the potential improvements in routing performance. The impacts of the presented work lie in advising a novel mixing technique that weights the ability of the ACO to adjust by altering the network conditions and by optimizing the decisions of routing strategy. The fusion of Ant Colony Optimization into Mobile Ad Hoc Networks presents a favorable road path for gripping the inherited contests inherent that lie in the distributed communication. By exploiting the ethics of swarm intelligence, this research paper encourages an adaptive, robust, and efficient framework for routing in MANET by offering the better throughput in the experiments.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save.
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
P. Vijaya Lakshmi, S.A.J. Francis, J.A. Dinakaran, A robust energy efficient ant colony optimization routing algorithm for multi hop ad hoc networks in MANETs. Wirel. Netw. New York 22 (6), 2081–2100 (2016)
Google Scholar
S. Sharma, G. Singh, A. Kaur, Study based comparison of multi-path routing protocols in MANETs. Int. J. Comput. Sci. Commun., pp. 191–196 (2014). ISSN: 0973-7391
A.K. Gupta, H. Sadawarti, A. Verma, Performance analysis of MANET routing protocols in different mobility models. Int. J. Inf. Technol. Comput. Sci. 5 (6), 73–82 (2013)
G. Singh, A. Kaur, Using random way point mobility model to compare the performance of reactive and proactive routing protocols of MANETs in NS-2. Yamuna J. Technol. Bus. Res. 3 (1–2), 5.1–5.7 (2013)
P. Ramesh, M. Devapriya, An optimized energy efficient route selection algorithm for mobile ad hoc networks based on loa. Int. J. Eng. Adv. Technol. 8 (2), 298–304 (2018)
S. Sharma, M. Singh, G. Singh, Swarm intelligence based comparative scrutiny of different routing algorithms in MANETs. Int. J. Res. Eng. Appl. Sci. 2 (2), 1818–1831 (2012)
M. Dorigo, C. Blum, Ant colony optimization theory: a survey. Theoret. Comput. Sci. 344 (2–3), 243–278 (2005)
Article MathSciNet Google Scholar
R. Challenges, A survey of modern ant colony optimization algorithms for MANET , vol. 9, no. 05, pp. 952–959 (2020)
T.K. Priyambodo, D. Wijayanto, M.S. Gitakarma, Performance optimization of MANET networks through routing protocol analysis. Computers (2020)
R. Gupta, G. Singh, A. Kaur, A. Singh, Fitness function based particle swarm optimisation algorithm for mobile adhoc network. Int. J. Eng. Technol. 7 (3.1), 31–33 (2018)
A. Kaur, V.S. Dhaka, G. Singh, Casting multipath behaviour into OANTALG to improve QoS, in IEEE Explore International Conference on Computing for Sustainable Global Development , 16th–18th Mar 2016, pp. 2076–2081
F. Safari, I. Savić, H. Kunze, J. Ernst, D. Gillis, A review of AI-based MANET routing protocols, in 19th IEEExplore International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (2023). Electronic ISBN:9798-3503-3667-226
V. Dattana, K. Krishna Prasad, Optimizing routing in MANETs with energy conservation. Int. J. Appl. Eng. Manage. Lett. (IJAEML) 7(3), 75–87 (2023)
R. Vallikannu, A. George, Performance analysis of autonomous location based energy efficient ACO routing protocol with dissimilar MANET mobility models , vol. 10, no. 4 (2015)
D. Sinwar, N. Sharma, S.K. Maakar, S. Kumar, Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET. J. Inf. Optim. Sci. 41 (2), 621–632 (2020)
A. Kaur, V.S. Dhaka, G. Singh, Adjoining ant’s activities in adhoc on-demand multipath distance vector routing, in International Conference on Green Computing and Engineering Technology , 18–20 Aug 2016, Denmark & Indian J. Sci. Technol. 9 (28), 1–6 (2016)
S. Sharma, M. Singh, G. Singh, Realistic inspection of proposed Ant algorithm with Antnet algorithm using NS-2. Int. J. Res. IT Manage. Eng. 2 (6), 146–156 (2012)
G. di Caro, M. Dorigo, AntNet: distributed stigmergetic control for communications network. J. Artif. Intell. Res. (JAIR) 9 , 317–365 (1998)
S. Prakash Tiwari, G. Singh, Optimizing job scheduling problem using improved GA+CS algorithm, in Lecture Notes in Networks and Systems (LNNS) – ICICC 2022 , vol. 473 (Springer, 2023), pp. 291–297
A. Kaur, G. Singh, A. Singh, R. Gupta, G. Singh, Ant based algorithm for routing in mobile ad-hoc networks, in Springer Lecture Notes in Networks and Systems (LNNS)—ICICC 2023 , vol. 731 (2024), pp. 357–366
V. Kukreja, R. Sharma, A. Kaur, R. Sachdeva, V. Solanki, Deep neural network for multi-classification of parsley leaf spot disease detection, in published in 2022 2nd International Conference on Advance Computing and innovative Technologies in Engineering (ICACITE) (2022)
D. Koundal, S. Gupta, S. Singh, Computer aided thyroid nodule detection system using medical ultrasound images. J. Biomed. Signal Process. Control 40, 117 (2018)
Download references
Author information
Authors and affiliations.
Department of Computer Science and Engineering, Punjab Institute of Technology, Rajpura (MRSPTU, Bathinda), Punjab, India
Gurpreet Singh, Gurpreet Singh & Aashdeep Singh
Department of Computer Science and Engineering, Chitkara University Institute of Engineering & Technology, Rajpura, Punjab, India
Amanpreet Kaur
Department of Electronics and Communication Engineering, University Institute of Engineering, Chandigarh University, Mohali, Punjab, India
Rohan Gupta
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Amanpreet Kaur .
Editor information
Editors and affiliations.
Faculty of Computers and Information, Cairo University, Oula, Egypt
Aboul Ella Hassanien
Department of Operational Research, Faculty of Mathematical sciences, University of Delhi, New Delhi, Delhi, India
Sameer Anand
School of Open Learning, University of Delhi, New Delhi, Delhi, India
Ajay Jaiswal
Computer Science and Engineering Department, National Institute of Technology Patna, Patna, Bihar, India
Prabhat Kumar
Rights and permissions
Reprints and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper.
Singh, G., Kaur, A., Gupta, R., Singh, A. (2024). Enhancing Throughput in Mobile Ad Hoc Networks Through Ant Colony Optimization Integration. In: Hassanien, A.E., Anand, S., Jaiswal, A., Kumar, P. (eds) Innovative Computing and Communications. ICICC 2024. Lecture Notes in Networks and Systems, vol 1038. Springer, Singapore. https://doi.org/10.1007/978-981-97-4149-6_31
Download citation
DOI : https://doi.org/10.1007/978-981-97-4149-6_31
Published : 27 September 2024
Publisher Name : Springer, Singapore
Print ISBN : 978-981-97-4148-9
Online ISBN : 978-981-97-4149-6
eBook Packages : Engineering Engineering (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
- Corpus ID: 18908270
An overview of mobile ad hoc networks: applications and challenges
- J. Hoebeke , I. Moerman , +1 author P. Demeester
- Published 2004
- Computer Science, Engineering
- Journal of The Communications Network
370 Citations
An overview of mobile ad hoc network: application, challenges and comparison of routing protocols, new trends in mobile ad hoc network, the diverse technology of manets: a survey of applications and challenges, vanets (vehicular adhoc networks): introduction, imperatives and challenges, challenges in mobile ad hoc networks (manets), performance analysis of mobile ad-hoc routing protocols by varying mobility, speed and network load, a study on challenges and issues on manet.
- Highly Influenced
Implementation and Analysis of GPSR and ALERT Protocol Techniques in AODV for MANET
Improving efficiency of manet by reducing queuing delay using hybrid algorithm, performance of manet: a review, 13 references, mobile ad hoc networking: imperatives and challenges, internet connectivity for mobile ad hoc networks, a review of routing protocols for mobile ad hoc networks, a review of current routing protocols for ad hoc mobile wireless networks, mipmanet-mobile ip for mobile ad hoc networks, stimulating cooperation in self-organizing mobile ad hoc networks, service discovery in mobile ad hoc networks: an overall perspective on architectural choices and network layer support issues, secure routing in mobile wireless ad hoc networks, mobile ad hoc networking (manet): routing protocol performance issues and evaluation considerations, related papers.
Showing 1 through 3 of 0 Related Papers
Information
- Author Services
Initiatives
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
- Active Journals
- Find a Journal
- Journal Proposal
- Proceedings Series
- For Authors
- For Reviewers
- For Editors
- For Librarians
- For Publishers
- For Societies
- For Conference Organizers
- Open Access Policy
- Institutional Open Access Program
- Special Issues Guidelines
- Editorial Process
- Research and Publication Ethics
- Article Processing Charges
- Testimonials
- Preprints.org
- SciProfiles
- Encyclopedia
Article Menu
- Subscribe SciFeed
- Recommended Articles
- Google Scholar
- on Google Scholar
- Table of Contents
Find support for a specific problem in the support section of our website.
Please let us know what you think of our products and services.
Visit our dedicated information section to learn more about MDPI.
JSmol Viewer
Man-in-the-middle attacks in mobile ad hoc networks (manets): analysis and evaluation.
1. Introduction
- We discovered two types of MITM attackers in the MANET, each of which had unique skills such as message dropping and message delaying;
- We determined various strategies of the MITM attacker according to the stationary mobility of legal nodes and the distribution of the harmful nodes in the MANET;
- We implemented a model based on simulation in order to estimate the influence of the attackers’ patterns.
2. Related Work
3. man-in-the-middle attacks.
- Passive Mode: The communication line between legal nodes can be passively eavesdropped on by an attacker.
- Active Mode: Attackers have the active capability to delay or drop the content of data that is received in a communication.
- MITM as Message Delayed: The successful delivery of messages to each valid node is essential to the operation of MANET. In this assault architecture, the harmful nodes purposefully pass the messages on to the neighboring nodes with a “delay” factor. Since MANET communications are extremely sensitive, delaying such signals might have disastrous effects on the network.
- MITM as Message Dropped: This kind of assault also indicates a “black hole” assault in MANET, which is when the attacker willfully drops the valid message they have just received, hence preventing further valid message propagation. As a result, the assailant prevents the valid node from receiving any communication, which then prevents the messages from reaching their intended recipients. Dropping the messages can have a big effect on the network because they carry delicate data, such as in collision avoidance. Imagine an instance where valid nodes are supposed to announce the presence of black ice on the path.
4. Environment of Simulation
4.1. setup of simulation.
- Scenario one: Assailants are dispersed randomly throughout the system;
- Scenario two: Assailants are gathered in a fleet configuration.
4.2. Simulation Scenario Setup
4.3. performance evaluation metrics.
- End-to-End Delay (E2ED): The E2ED refers to the delay experienced by a packet that has been issued by the legal node and which is to be shared with neighboring nodes. The E2ED is a metric related to the quality of service (QoS) of the network, as shown in the following equation: E 2 ED = T R − T G (1) where T R is the packet reception time, and T G is the packet generation time. Hence, E2ED is the difference of T G and T R .
- Packet Loss Ratio (PLR): The PLR indicates the amount of data that is lost due to MITM nodes, as expressed by the following equation: PLR = M L M T (2) where M T is the overall number of messages received, and M L is the total number of messages lost. Therefore, PLR is the difference of M T and M L . More specifically, the total number of messages M T includes messages received at both the legal node M R and the harmful node M L , as shown in the following equation: M L + M R = M T (3)
- Amount of delayed messages: This indicator displays the number of data that the rogue node has delayed.
- Amount of dropped messages: The dropping of messages from legal nodes is the statistic that is defined for MITM. The number of messages discarded by network attackers is indicated by this measure.
5. Results and Discussion
5.1. simulation results, 5.1.1. message-delayed assaults, 5.1.2. message-dropped assaults, 5.2. discussion, 6. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.
- Hamdi, M.M.; Mustafa, A.S.; Mahd, H.F.; Abood, M.S.; Kumar, C.; Al-shareeda, M.A. Performance Analysis of QoS in MANET based on IEEE 802.11 b. In Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangalore, India, 6–8 November 2020; pp. 1–5. [ Google Scholar ]
- Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. Int. J. Eng. Manag. Res. 2020 , 10 , 153–158. [ Google Scholar ] [ CrossRef ]
- Yasin, A.; Abu Zant, M. Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mob. Comput. 2018 , 2018 , 9812135. [ Google Scholar ] [ CrossRef ]
- Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry 2020 , 12 , 1687. [ Google Scholar ] [ CrossRef ]
- Veeraiah, N.; Khalaf, O.I.; Prasad, C.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021 , 9 , 120996–121005. [ Google Scholar ] [ CrossRef ]
- Kausar Fatima, S.; Gauhar Fatima, S.; Abdul Sattar, S.; Mohd Ali, S. Mobile Adhoc Networks Security Challenges: A Survey. Int. J. Adv. Res. Eng. Technol. 2019 , 10 , 224–237. [ Google Scholar ]
- Saed, M.; Aljuhani, A. Detection of Man in The Middle Attack using Machine learning. In Proceedings of the 2022 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 25–27 January 2022; pp. 388–393. [ Google Scholar ]
- Dorri, A.; Kamel, S.R.; Kheirkhah, E. Security challenges in mobile ad hoc networks: A survey. arXiv 2015 , arXiv:1503.03233. [ Google Scholar ] [ CrossRef ]
- Javeed, D.; MohammedBadamasi, U.; Ndubuisi, C.O.; Soomro, F.; Asif, M. Man in the middle attacks: Analysis motivation and prevention. Int. J. Comput. Netw. Commun. Secur. 2020 , 8 , 52–58. [ Google Scholar ] [ CrossRef ]
- Shekhar, S.; Mahajan, M.; Kaur, S. A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks. In Proceedings of the 2022 IEEE 6th International Conference on Trends in Electronics and Informatics (ICOEI), Cheranmahadevi, Tirunelveli, India, 28–30 April 2022; pp. 638–643. [ Google Scholar ]
- Chen, Z.; Guo, S.; Duan, R.; Wang, S. Security analysis on mutual authentication against man-in-the-middle attack. In Proceedings of the 2009 IEEE First International Conference on Information Science and Engineering, Nanjing, China, 26–28 December 2009; pp. 1855–1858. [ Google Scholar ]
- Stricot-Tarboton, S.; Chaisiri, S.; Ko, R.K. Taxonomy of Man-in-the-Middle Attacks on HTTPS. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 527–534. [ Google Scholar ]
- Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016 , 18 , 2027–2051. [ Google Scholar ] [ CrossRef ]
- Glass, S.M.; Muthukkumarasamy, V.; Portmann, M. Detecting man-in-the-middle and wormhole attacks in wireless mesh networks. In Proceedings of the 2009 IEEE International Conference on Advanced Information Networking and Applications, Bradford, UK, 26–29 May 2009; pp. 530–538. [ Google Scholar ]
- Kaplanis, C. Detection and Prevention of Man in the Middle Attacks in Wi-Fi Technology. Ph.D. Thesis, Aalborg University, Aalborg, Denmark, 2015. [ Google Scholar ]
- Alazzawi, M.A.; Al-behadili, H.A.; Srayyih Almalki, M.N.; Challoob, A.L.; Al-shareeda, M.A. ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; Springer: Singapore, 2020; pp. 80–94. [ Google Scholar ]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 2022 , 22 , 1696. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks. Appl. Sci. 2022 , 12 , 1383. [ Google Scholar ] [ CrossRef ]
- Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 2022 , 22 , 5026. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Appl. Sci. 2022 , 12 , 5939. [ Google Scholar ] [ CrossRef ]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 2021 , 21 , 8206. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 2021 , 9 , 113226–113238. [ Google Scholar ] [ CrossRef ]
- Al-Shareeda, M.A.; Anbar, M.; Alazzawi, M.A.; Manickam, S.; Al-Hiti, A.S. LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access 2020 , 8 , 170507–170518. [ Google Scholar ] [ CrossRef ]
- Ali, I.; Lawrence, T.; Omala, A.A.; Li, F. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Trans. Veh. Technol. 2020 , 69 , 11266–11280. [ Google Scholar ] [ CrossRef ]
- Abass, R.; Habyarimana, A.; Tamine, K. Securing a mobile ad hoc NETwork against the man in the middle attack. Int. J. Artif. Intell. Inform. 2022 , 3 , 53–62. [ Google Scholar ] [ CrossRef ]
- Sowah, R.A.; Ofori-Amanfo, K.B.; Mills, G.A.; Koumadi, K.M. Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). J. Comput. Netw. Commun. 2019 , 2019 , 4683982. [ Google Scholar ] [ CrossRef ]
- Nayak, G.N.; Samaddar, S.G. Different flavours of man-in-the-middle attack, consequences and feasible solutions. In Proceedings of the 2010 3rd IEEE International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 5, pp. 491–495. [ Google Scholar ]
- Ahmad, F.; Adnane, A.; Franqueira, V.N.; Kurugollu, F.; Liu, L. Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies. Sensors 2018 , 18 , 4040. [ Google Scholar ] [ CrossRef ] [ PubMed ]
- Mészáros, L.; Varga, A.; Kirsche, M. Inet framework. In Recent Advances in Network Simulation ; Springer: Berlin, Germany, 2019; pp. 55–106. [ Google Scholar ]
- Sánchez-Casado, L.; Rodríguez-Gómez, R.A.; Magán-Carrión, R.; Maciá-Fernández, G. NETA: Evaluating the effects of NETwork attacks. MANETs as a case study. In Proceedings of the International Conference on Security of Information and Communication Networks, Cairo, Egypt, 3–5 September 2013; Springer: Berlin, Germany, 2013; pp. 1–10. [ Google Scholar ]
- Varga, A. OMNeT++. In Modeling and Tools for Network Simulation ; Springer: Berlin, Germany, 2010; pp. 35–59. [ Google Scholar ]
Click here to enlarge figure
Parameters | Values |
---|---|
Network Simulator | OMNeT++ 4.3 |
MANET Simulator | INET Framework 2.1.0 |
NETwork Attacks | NETA v1-1.0 |
No. of Nodes | 100 |
No. of Harmful Node | 1, 3, 5, 7 |
Simulation Area | 3.0 km · 3.0 km |
Simulation Time | 1000 s |
Node Mobility | Stationary |
Source Application | UDPBasicApp |
Destination Application | UDPSink |
Packet Size | 512 B |
Send Interval | 0.5 s + uniform (−0.001 s, 0.001 s) |
MAC Standard | 802.11 g |
Number of Repetitions | 4 |
Bit Rate | 54 Mbps |
Routing Protocol | AODVUU |
AODVUU Type | Link Layer Feedback |
Transmitter Power | 2.0 mW |
Sensitivity | −85 dBm |
Thermal Noise | −110 dBm |
Carrier Frequency | 2.4 GHz |
Path Loss Alpha | 2 |
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
Share and Cite
Al-Shareeda, M.A.; Manickam, S. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry 2022 , 14 , 1543. https://doi.org/10.3390/sym14081543
Al-Shareeda MA, Manickam S. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry . 2022; 14(8):1543. https://doi.org/10.3390/sym14081543
Al-Shareeda, Mahmood A., and Selvakumar Manickam. 2022. "Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation" Symmetry 14, no. 8: 1543. https://doi.org/10.3390/sym14081543
Article Metrics
Article access statistics, further information, mdpi initiatives, follow mdpi.
Subscribe to receive issue release notifications and newsletters from MDPI journals
IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
- We're Hiring!
- Help Center
Download Free PDF
Mobile Ad Hoc Networks: Issues, Research Trends and Experiments
2008, International Engineering and …
A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe challenges. This paper describes the fundamental problems of ad hoc networking by giving its related background including the concept, features, applications, issues of MANETs, investigates and presents recent research trends and identifies Simulators for MANETs[5]. Based on recent research interests of scholars we found that some issues such as routing and power management attracted much attention and issues such as IP addressing and fault tolerance will have wide scope in the future. In the qualitative analysis [5], we found that some factors such as scalability, stability, and reliability attracted much. The essential simulation metrics for various MANET issues are identified and Simulators are listed for experiment. The analysis results demonstrate the utilization trends for various MANET simulators.
Free related PDFs Related papers
— A mobile ad hoc network is the self-configure and self-organized infrastructure less network that is used for wireless. Mobile ad hoc network (MANET) are not used any centralized device to manage the nodes [1]. The range or the paths between the nodes are limited. When a node are move far from the range that node are out of network. This paper presents the study of the Manet Types, Features and its Challenges.
International Journal of Computer Applications, 2013
International Journal of Emerging Trends in Engineering and Development, 2018
International Journal of Scientific Research in Science and Technology, 2019
MANET is a collection of various mobile nodes that are helpful to communicate with each other without any centralized control which are wireless and work as dynamic network. The current generation is much advanced in using such type of networks, which is very flexible and portable to the end users, which is most economical. The applications of this MANETs are used world wide due to its advantages, but still there are some issues which need to be resolved, known as challenges. This paper is on the various challenges and characteristics of MANET.
International Journal of Engineering and Computer Science, 2019
Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other proper...
Ijca Proceedings on Recent Advances in Wireless Communication and Artificial Intelligence, 2014
International Journal of Engineering Research and Technology (IJERT), 2020
https://www.ijert.org/a-study-on-manet-applications-challenges-and-issues https://www.ijert.org/research/a-study-on-manet-applications-challenges-and-issues-IJERTCONV8IS03003.pdf Wireless ad hoc networks have become an important area of research in wireless communications systems. Mobile Ad hoc Network is an ad hoc network that can be formed to allow nodes to communicate without any infrastructure. The set up of MANET makes it very popular as compared to the traditional wireless network. In traditional wireless network, mid-point is required for overall process of the network, whereas MANET is self-organized and infrastructure-free network, which is considered as a good approach for some specific applications such as battlefield survivability, communication in the natural or manmade disaster areas, emergency or rescue operations. This research work attempts to provide a wide overview of this active field and it first explains detailed survey of MANET in different fields and then takes over several challenges and issues in the Ad hoc networking area. Finally specify the active application areas of MANET and describes the future work.
orhandagdeviren.com
IJCA Proceedings on National Workshop-Cum- …, 2012
International Journal of Network Management, 2005
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Computer Applications, 2014
Electronic Notes in Theoretical Computer Science, 2006
IEEE Systems Journal, 2010
IOSR Journal of Computer Engineering, 2014
Computing and Informatics, 2012
International Journal of Electrical and Computer Engineering (IJECE), 2017
International Journal of Computer Trends and Technology
The Third International Conference on e-Technologies and Networks for Development (ICeND2014), 2014
International Journal of Engineering Research and Technology (IJERT), 2016
Communications in Computer and Information Science, 2020
Related topics
- We're Hiring!
- Help Center
- Find new research papers in:
- Health Sciences
- Earth Sciences
- Cognitive Science
- Mathematics
- Computer Science
- Academia ©2024
IMAGES
VIDEO
COMMENTS
In this paper, an investigation on protocol issues for mobile ad hoc networks (MANET) is conducted. The capacity and relevance of nomadic computing are evident with the quick propagation of wireless devices like laptops, wireless sensors, and smartphones. A MANET is a non-temporary infrastructure, consisting of a group of mobile hosts which have no central management and dynamically create ...
A Mobile Ad-hoc Network (MANET) is a decentralized, infrastructure-less network where. wireless nodes move randomly.Ad-hoc networks can be accessed anytime, anywhere, autonomous with cost ...
In this paper, we describe the ongoing research activities and the challenges in some of the main research areas within the mobile ad hoc network domain. To present the huge amount of research activities on ad hoc networks in a systematic/organic way, we will use, as a reference, the simplified architecture shown in Fig. 2 .
1. Introduction. Mobile ad hoc networks (MANET s) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastr ucture and have attracted. decades ...
1. Introduction. Mobile ad hoc networks (MANETs) represent a featured domain of wireless networks, which are well-differentiated from cellular network infrastructure and have attracted decades of research effort. Traditional MANET research focuses on routing issues among nodes with low power and weak ability.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Mobile ad hoc networks ...
Mobile Ad Hoc Networks (MANETs) represent a dynamic and self-configuring network paradigm where nodes communicate without a fixed infrastructure. This paper provides a succinct yet comprehensive exploration of MANETs and their distinctive characteristics, emphasizing the challenges associated with routing in such decentralized environments.
In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This paradigm has often been identified with the solutions developed inside the IETF MANET working group, and for this reason it is called the MANET paradigm. However, they do not coincide, and in the last decade they clearly diverged. In this article, we start from the reasons why the MANET paradigm did ...
The paper is organized as follows. In Section 2, we explain why ad hoc networking is an essential component of the 4G network architectures. In Section 3, we look at mobile ad hoc networks in closer detail, covering their specific characteristics, advantages, as well as design challenges. This is followed by an analysis of MANET evolution from ...
This article discusses the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the IETF MANET research, and analyzes four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application. In this article we discuss the state of the art of (mobile) multihop ad hoc ...
identified early reactive and proactive MANET routing protocols. Our review focuses upon protocols developed by Perkins, namely the Destination Sequenced Distance Vector (DSDV) and Ad-hoc On-demand Distance Vector (AODV) wh. ch researchers claim is the most popular MANET routing protocol. Due to the popularity of the AODV protocol a number of ...
VANETs which use vehicles as mobile nodes are a subclass of mobile ad hoc networks (MANETs) to provide communications among nearby vehicles and between vehicles and nearby roadside equipment [] but apparently differ from other networks by their own characteristics.Specifically, the nodes (vehicles) in VANETs are limited to road topology while moving, so if the road information is available, we ...
Mobile Ad Hoc Network (M ANET) i s a collection of two or more devices or nodes or terminals with. wireless communica tions and networking capability that communic ate with each other without the ...
Insight is provided into the potential applications of ad hoc networks and the technological challenges that protocol designers and network developers are faced with, which include routing, service and resource discovery, Internet connectivity, billing and security. In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive ...
From the last decade, there has been expeditious growth and a worldwide success is perceived in the area of wireless ad-hoc networking. Especially, one class of wireless ad-hoc networks, that is, mobile ad-hoc network (MANET) drawing a great attention from the critical applications like emergency search and rescue operations and disaster recovery services. A MANET consists of mobile nodes that ...
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, and in Internet of Things (IoT) ecosystems. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature ...
This paper provides insight into the potential. applications of ad hoc networks and discusses the. technological challenges that protocol designers and. network developers are faced with. These ...
Abstract: A mobile ad hoc network (MANET) is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad-hoc network routing ...
Currently, mobile ad hoc network research is a very vibrant and active field and the efforts of the research community, together with current and future MANET enabling radio technologies, which are summarised in Table 3, will certainly pave the way for commercially viable MANETs and their new and exciting applications, with some of these ...
In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the ...
In recent years, routing algorithms for mobile ad hoc networks have been popular research topics. This paper represents a survey of local distributed algorithms which are used for virtual backbone-based routing. The virtual backbone transforms an original flat structure of the mobile ad hoc networks into hierarchical, which is more appropriate ...
— A mobile ad hoc network is the self-configure and self-organized infrastructure less network that is used for wireless. Mobile ad hoc network (MANET) are not used any centralized device to manage the nodes [1]. The range or the paths between the nodes are limited. When a node are move far from the range that node are out of network.
In the related research of MANETs, the mobility model is the basis for studying the simulation of ad hoc network, and currently it mainly faces several difficulties [2, 3]: First, the mobility of ...