Strategies for enhancing the accuracy and security in ad hoc networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Ad Hoc networks are a type of mobile wireless networks composed of mobile and stationary nodes which are moving freely and independently or they are stable. Setting up Ad Hoc networks is very simple and as these networks do not need a standard fixed infrastructure and central legal license, their setting up cost is very low. So, in specials, temporary or short-term situations such as flood, earthquake and fire as well as in military environments where all telecommunication platforms are destroyed, these networks are used as a new solution for creating communications between network elements. As Ad Hoc networks have a limited energy and nodes are continuously displacing, consequently, the accuracy of these networks is important. Nodes can be easily added to the network at any time or leave the network. It not only leads to easy creation of a network and its fast, easy and low-cost expansion, but also makes it possible for an enemy to enter the network. Therefore, the security of these networks must also be considered. In this paper, using a new method and imposing limitations on some network nodes, we created a more reliable network with higher accuracy and security.


  • Keywords


    Ad Hoc Networks; Accuracy; Security; Forwarding A Virtual Package; Backbone.

  • References


      [1] Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks", IEEE Communications Surveys And Tutorials, Volume 13, No 4,Fourth Quarter 2011. http://dx.doi.org/10.1109/SURV.2011.092110.00088.

      [2] Jing Tian, Lu Han, Kurt Rothermel, "Spatially Aware Packet Routing for Mobile Ad Hoc Inter-Vehicle Radio Networks", IEEE, 2003.

      [3] Bimal H Patel, Parth D Shah, Harikrishna B Jethva and Nishidh Chavda, "Issues and Imperatives of Ad hoc Networks", International Journal of Computer Applications, Volume 62, No.13, January 2013.

      [4] Jacob Abraham, V.Arun Prasath and G.Michael, "A Survey of Intrusion Detection for Ad hoc Network", Journal of Global Research in Computer Science, April 2013.

      [5] P.Ramesh Kumar, G.Nageswara Rao and P.Rambabu, "Packet Classification Methods to Counter Jamming Attacks in Ad hoc Networks", International Journal for Development of Computer Science & Technology, August and September 2013.

      [6] P. Narendra Reddy, CH. Vishnuvardhan and V. Ramesh, "Routing Attacks in Mobile Ad hoc Networks", International Journal of Computer Science and Mobile Computing, May 2013.

      [7] Seung-Jun Kim and Georgios B. Giannakis, "Optimal Resource Allocation for MIMO Ad hoc Cognitive Radio Networks", IEEE Transactions ON Information Theory, Volume 57, No.5, May 2011.

      [8] Yi Song and Jiang Xie, "ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad hoc Networks without Common Control Channel", IEEE Transactions on Mobile Computing, July 2012. http://dx.doi.org/10.1109/TMC.2011.140.

      [9] Maxim Raya, Jean-Pierre Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, 2007.

      [10] Raffaele Bruno, Marco Conti, Enrico Gregori, "Mesh Networks: Commodity Multihop Ad Hoc Networks", IEEE Communications Magazine, March 2005. http://dx.doi.org/10.1109/MCOM.2005.1404606.

      [11] Sushant Sharma, Yi Shi, Y. Thomas Hou and Sastry Kompella, "An Optimal Algorithm for Relay Node Assignment in Cooperative Ad hoc Networks", IEEE/ACM Transactions on Networking (TON), June 2011.


 

View

Download

Article ID: 4156
 
DOI: 10.14419/jacst.v4i1.4156




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.