An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks

Size: px
Start display at page:

Download "An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks"

Transcription

1 Int'l Conf. Wireless Networks ICWN' An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Chyi-Ren Dow, Duc-Binh Nguyen, Zi-How Lin and Shiow-Fen Hwang Department of Information Engineering and Computer Science Feng Chia University, Taichung, Taiwan {crdow, p39568, m12313, and sfhwang Abstract In recent years, Vehicular Ad-hoc Networks (VANETs) have become a popular research field. In addition, conditions happened surrounding our life often have the demand to be supported by other people, and these conditions often occur on the road. This study proposes an efficient crowdsourcing search scheme in VANETs to search objects and collect data. Our proposed mechanism is based on the virtual backbone construction in VANETs. The regional data exchange can be limited, and the packet transmissions can be reduced. We have established coordinator and header mechanisms to manage the information of region nodes, reduce the amount of packet transmission and improve searching efficiency. Experimental results show that our schemes can effectively provide assistance in terms of search efficiency and satisfactory ratio. Keywords: VANETs, crowdsourcing, search scheme. I. INTRODUCTION Vehicular Ad-hoc Networks are emerging network architecture using wireless network technologies on the intelligent transportation systems (ITS) for mobile information communications. There are many VANETs applications, such as cooperative monitoring of traffic load, prevention and warning of vehicle collision, and location based services (LBS) combined with the nearby area information, etc. In addition, a model for problem solving is also developed with the Internet. Jeff Howe, a reporter of the Wired magazine has created a whole new jargon Crowdsourcing in 26. Enterprise organizations solicit a large number of volunteers to help them to gather information, provide ideas and solve problems about technical through the Internet. Volunteers usually complete tasks in their spare time and charge a small reward or not, but there may be some opportunities to get more rewards in the future. This solution provides a new way of organizing labors, especially for the software industry and the service industry. For example, Wikipedia [2] is an Internet encyclopedia, and everyone can participate in online editing. In the past, when people got off a taxi and forgot something in the car, it is not only hard to find the lost property but also wasting time, especially when they do not know the taxi fleet and license plate number. Currently, some taxi fleets and radio stations provide services to help people finding their missing property online. However, it is not immediate when the messages are broadcasted until the driver finds the lost property and returns it. In recent years, with the development of the Internet and the popularity of smart phones, people began to help each other through exchanging messages over the network such as looking for an accident escape, animal abusing, bullying and other cases. These Internet users can assist in finding suspects as long as they have enough information. In fact, the concept of the crowdsourcing already exists in our daily life. Crowdsourcing mechanisms have been widely applied in many fields since created, and there were many applications developed with sensors on smart phones and tablets. However, in VANETs with crowdsourcing, how to choose the crowd to assist the task and communicate effectively to the demand for them, and how to make proper filtering and screening to ensure the quality and accuracy of the returned data by the crowd, are important issues about crowdsourcing. In addition, the concept of traditional practice of distribution of demand and recovery of data is similar to the broadcast or multicast schemes. It is easy to generate large amounts of streaming data. The influence is perhaps not obvious because there is enough bandwidth in the wired network architecture, but it is a serious problem in VANETs with limited bandwidth. If we want to provide applications with effective crowdsourcing, we need to reduce the time of request spread and data recovery. Both are closely related to the amount of packet transmission. Anycast [1] is a method of information spreading on the network. Its concept is that if there is anyone who can provide the required services, they will be accepted after the demand spread. This method not only can reduce the amount of packet transmission, but also can choose appropriate service providers. Thus, anycast is more suitable for applications in bandwidth limited wireless network infrastructure compared with the broadcast scheme. Considering these issues, the application and technology of taxi based VANETs with a group structure and high density to find and track the target in a city are worth a discussion among us. Therefore, we propose an efficient crowdsourcing search scheme in VANETs. It is a distributed searching system based on virtual backbone and geography information

2 196 Int'l Conf. Wireless Networks ICWN'15 in VANETs. It uses vehicles on the backbone to play the role of crowd, and apportions the searching tasks to the crowd through crowdsourcing in VANETs. The information of vehicles is integrated and exchanged with headers via coordinators in a geographic grid [9]. When there are searching demands generated, our system will ask the coordinators first, and then forward the packet to headers and request vehicles to join the searching task. II. RELATED WORK The topic of data searching has been engaged in network research. Lakas et al. [8] proposed a hybrid cooperative through cooperating vehicles using the store-and-forward technique to share collected information. Noguchi et al. [14] proposed a location-aware service discovery scheme. It spreads service discovery messages to nodes inside a geographical area with IPv6 multicast. Some research schemes [6], [13] improved AODV to propose methods to optimize the route of discovery. Lo et al. [12] enabled vehicles to cooperatively aid the source node to discover the location of the destination node without the support of location services. The geographic load balancing routing, namely GLRV is deployed to provide a virtual backbone. GLRV can increase delivery ratio and reduce the transmission latency in hybrid VANETs architecture. How to process the distribution of a vast number of information from different locations is an important issue. Data aggregation technique aims to solve redundant or distributed data problem to improve the communication efficiency. Tal et al. [16] analyzed various solutions by using Fuzzy Logic in data aggregation schemes is suitable to get benefits in the development process of traffic systems that relies on these schemes. Zhang et al. [19] presented a hierarchical data aggregation scheme to reduce the transmitting of the redundant data which resulted from multisource data collecting and multi-path data transmitting. Traditional data aggregation methods usually rely on a fixed routing structure to ensure data to be aggregated. However, they cannot be used in highly mobile vehicle environments. Catch-Up [17] dynamically changed the forwarding speed of nearby reports so that they had a better chance to meet each other and be aggregated together. Dietzel et al. [4] proposed a generic model to describe and classify the proposed schemes. DA2RF [18] is an infrastructure-free data aggregation scheme by restricting forwarders to limit the number of forwarders in VANETs. In this way, transmission collisions can be avoided as much as possible. With the increasing popularity of smart phones in recent years, there are many studies using crowdsourcing techniques, including the sensing data collection, transportation issues, data accuracy, and other interesting applications. CrowdITS system [1] used the smart phones to collect sensing data without additional sensors and communication equipment and make improvements to traffic by collection of traffic information. CrowdOut [2] is based on contributions made by mobile users equipped with smart phones. It allows users to report traffic offense in real time and to map them on a city plan. There are systems sought volunteers to mine the disaster sensing dead space by crowdsourcing [3] and create a noise map in the urban environment through mobile phones with crowdsourcing [7]. Huang et al. [5] presented selection methods of automatic sensor based on crowdsourcing models for unattended acoustic sensor selection. Furthermore, passengers can also be an effective statistical evaluation of the traveling road conditions through the triaxial sensors in the phone [15]. Liu et al. [11] combined people and mobile sensing devices into a live wireless sensor. It uses this combination to remedy the traditional sensor blind, and also conforms the concept of crowdsourcing. III. THE PROPOSED SEARCHING METHOD In this section, we introduce our proposed searching mechanisms, including virtual backbone establishment of the tree searching architecture and the design of the crowdsourcing anycast query spreading mechanism. Then, we formulate crowdsourcing data filtering mechanisms. A. The Virtual Backbone of the Tree Searching Architecture Traffic could change very often with complex road structure in urban environments as time goes by different distances, directions and speed of the vehicle will cause the network topology changes and affect the stability of the chain. If the city roads are divided by geographic grids to establish a backbone tree, we can limit the area of data exchange of information and reduce unnecessary traffic packets to achieve fast and stable data transmission. Exchanging and maintaining the data table between important nodes in the backbone can simplify data storage and management. The data can be found more quickly, and the searching time can also be reduced with precise management. The vehicle stays in each geographic grid longest will be elected as a header to manage the information of other vehicles in the grid to reduce the packet number of switched data. Normally, the vehicle closest to the center of the grid will be elected as a coordinator. As shown in Figure 1,, where and are coordinates of the center, and are coordinates of the vehicles in the same grid. is the range of transmission to consider a vehicle as the header in the grid. As shown in Figure 1, we calculate the distance between each vehicle and the center, the header of the grid is D1 because it has the smallest distance. Headers within grids regularly gather information of vehicles in the same grid. As shown in Figure 2, the coordinator within the grid gathers information from adjacent grids in order to accelerate the speed of searching, but it will generate a lot of queries and return packets when there are too many coordinators. Therefore, development an appropriate number of coordinators is an important issue. As shown in Figure 3, considering the degree of branching of the tree and beginning with the smallest number of grids. If the degree of the header within the grid is greater than 2, it will be elected as the coordinator. Therefore, this step may lead to a coordinator

3 Int'l Conf. Wireless Networks ICWN' having too many nearby coordinators. For example, coordinator within grids 22 and 54 are superfluous, because there are too many coordinators. In order to avoid collecting unnecessary information from other paths, a coordinator is created every three hops. However, the coordinator cannot be established if it is located in the leaves of the tree (grids 2 and 58) to avoid excessive control overhead and reduce excess coordinators. Because grids 55 and 58 collect information on the same area, they will result in a large amount of duplicated information and redundant of transmission. B. The Crowdsourcing Anycast Query Spreading Mechanism Figure 1 Grid Header Election Figure 4 The Reply Table Figure 5 The Query Packet Figure 2 Coordinator Collection Figure 3 Coordinator Establishment The header or the coordinator within each grid maintains a reply table as shown in Figure 4 which contains detailed data fields of each informed object. Vehicles will periodically reply the information of board objects (such as lost and sensor data, etc.) to headers within grids, and forward the data to coordinators for management. When there is a task (object searching or data collection, etc.), our system will generate query packets as shown in Figure 5 to send to the nearby coordinator. These query packets contain the purpose of task (lost, target searching, data collection, etc.), content (including target characteristics, time, location, etc.). The coordinator receiving the query packet will be compared with the reply table, and then return to the source node. If the task needs to cooperate for finding the target, the header within the grid near the target area asks the vehicle within the grid for joining the task after receiving the query packet. When any vehicle responses content, the task starts. When the task is completed, the data will be returned by the header and coordinator. If there is no matching information, the coordinator passes the query packets to other coordinators through the adjacent headers within the grids, and they compare with the reply table. In order to maintain the

4 198 Int'l Conf. Wireless Networks ICWN'15 effectiveness of the searching mechanism, we have developed the threshold of searching time to avoid searching too long or endless searching. We will terminate searching and return results if time is over. Our crowdsourcing search mechanism is listed as follows: (1) Coordinators regularly update the reply form. (2) Source node generates a query packet, and delivers to coordinators for comparing data. In case of the data is matched, the coordinator returns to the source node. (3) If the data is not matching, the query packet will be passed to other coordinators for comparing data by neighbor headers. (4) After receive the query packet, the header of each neighbor will ask other vehicles if willing to assist or not. (5) The task starts when any vehicle responses content. (6) When the task completes, messages will be responded to the source node via headers and coordinators. (7) If searching time exceeds T search, the task will be terminated. C. The Filtering Mechanism Although we have designed the query packet format and reply mechanism to provide the format of returned data. However, getting the number of requirements from the return data is also a problem. Hence we need to formulate the filtering mechanism to deal with these situations. If we allow the transmitted of data to be collected together, it would cause a considerable burden for the network. Thus, we must filter redundant information through hierarchical steps to reduce traffic and leave useful information. We divide data filtering into three types. For the first type, the searching condition given from the source node to the coordinator is precision and the searching condition given from the coordinator to the header is fuzzy. By this way, we can reduce the difficulty of searching by vehicles and increase the number of data. The coordinator can filter those data returned by headers before passing to the source node. The second type) where conditions given from the source node, and the coordinator are both precise. It increases the difficulty of searching by vehicles but reduces the amount of data and reduces the load of networks. The third type represents the conditions given from the source node and the coordinators are both fuzzy, the data returned by vehicles will not be filtered by the coordinator, and the source node can select the information which one does it wants. When the new beginning data is received, our mechanisms allow the same information received within the time threshold T for maintaining accuracy and reliability of the information. The number of repetitions will be recorded into the reply table and form a credit value. The higher credit value represents the higher reliability of the data. Each cumulative data will get a survival time, T life after time T, and it is not allowed to accept the same data. When the time T life ends, the extra data will be discarded or replaced by new data. IV. EXPERIMENTAL RESULTS This section is carried to evaluate our proposed crowdsourcing search scheme. We use the version 2.35 of Network Simulator 2 (NS-2) as our simulator. The simulation vehicular movement mode is generated by Simulation of Urban Mobility (SUMO). As shown in Figure 6, we compare the control overhead with the time change. At the beginning, since the purpose of our method is to establish the backbone, the amount of control packets required will be greater than AODV and Geogrid. However, once the backbone structure and information forms contents are completed, the needed amount of control overhead will gradually stabilize. Control Overhead Success Rate Time (sec) Figure 6 Control Overhead vs. Time Distance (m) Figure 7 Successful Rate vs. Distance Ours AODV Geogrid AODV Geogrid Ours As shown in Figure 7, the success rate is compared to the change in distance. The range for distance is 5 to 25. The success rate of AODV decreases as the distance increases, because AODV always starts a new search. Therefore, the success rate will decrease when the distance increases. On the other hand, when Geogrid perform a search, every point is looking for the nearest coordinator for inquiries. Thus, the success rate obtained will display a stable status. In our method, every coordinator works together to maintain and

5 Int'l Conf. Wireless Networks ICWN' exchange the reply tables. This reduces the search time, which also raises the level of efficiency. In comparison, Geogrid can find the target more effectively. V. CONCLUSIONS In this study, we propose an effective crowdsourcing search scheme in VANETs. It can reduce the number of transmission packets through the establishment of coordinator and header, and provide crowdsourcing search of the query instead of blind searching. The proposed scheme not only improves the results of discovery, but also reduces dissemination time and reply time. Design of the table information can help to exchange all reply discoveries. As the future work, we intend to implement our crowdsourcing search scheme. However, not everyone is willing to participate in crowdsourcing tasks. Maybe we can combine incentives to promote the wishes of people, providing them with virtual or real currency. Furthermore, we will consider more methods for both data aggregation and data filtering in order to achieve more perfect results. ACKNOWLEDGMENT The authors would like to thank the Ministry of Science and Technology of the Republic of China for financially supporting this research under Contract No E REFERENCES [1] K. Ali, D. A. Yaseen, A. Ejaz, T. Javed and H. S. Hassanein, CrowdITS: Crowdsourcing in Intelligent Transportation Systems, Wireless Communications and Networking Conference, Paris, pp , Apr [2] E. Aubry, T. Silverston, A. Lahmadi and O. Festor, CrowdOut: A Mobile Crowdsourcing Service for Road Safety in Digital Cities, Pervasive Computing and Communications Workshops, Budapest, pp , Mar [3] E. T. Chu, Y. L. Chen, J. Y. Lin and J. W. S. Liu, Crowdsourcing Support System for Disaster Surveillance and Response, Symposium on Wireless Personal Multimedia Communications, Taipei, pp , Sep [4] S. Dietzel, J. Petit, F. Kargl and B. Scheuermann, In-Network Aggregation for Vehicular Ad Hoc Networks, Communications Surveys & Tutorials, Vol. PP, No. 99, pp.1, Apr [5] P. S. Huang, M. H. Johnson, Y. Wotao and T. S. Huang, Opportunistic Sensing: Unattended Acoustic Sensor Selection Using Crowdsourcing Models, IEEE International Workshop on Machine Learning for Signal Processing, Santander, pp. 1-6, Sep [6] F. Iqbal, M. I. K. Babar, M. H. Zafar and M. F. Zuhairi, I- AODV: Infrastructure Based Ad Hoc On-demand Distance Vector Routing Protocol for Vehicular Ad Hoc Networks, IEEE International Conference on Smart Instrumentation, Measurement and Applications, TBD Malaysia, pp. 1-5, Nov [7] S. S. Kanhere, Participatory Sensing: Crowdsourcing Data from Mobile Smartphones in Urban Spaces, IEEE International Conference on Mobile Data Management,Lulea, pp. 3-6, Jun [8] A. Lakas, M. A. Serhani and M. Boulmalf, A Hybrid Cooperative Service Discovery Scheme for Mobile Services in VANET, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Wuhan, pp , Oct [9] Y. H. Lee, C. R. Dow, L. H. Huang, Y. C. Lin, S. F. Hwang and W. B. Lee, An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks, Ninth International Conference on Information Technology: New Generations, Nevada, pp , Apr [1] P. J. Lin, C. R. Dow, S. C. Chen, C. J. Li and S. F. Hwang, An Efficient Anycast Scheme for Discovering K Services in Mobile Ad-hoc Networks, The 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Vancouver, pp , Oct. 28. [11] J. W. S. Liu, E. T. H. Chu and P. H. Tsai, Fusing Human Sensor and Physical Sensor Data, IEEE International Conference on Service-Oriented Computing and Applications,Taipei, pp. 1-5, Dec [12] C. C. Lo, J. W. Lee, C. H. Lin, M. F. Horng and Y. H. Kuo, A Cooperative Destination Discovery Scheme to Support Adaptive Routing in VANETs, IEEE Vehicular Networking Conference, New Jersey, pp.22-28, Dec. 21. [13] H. Maowad and E. Shaaban, Efficient Routing Protocol for Vehicular Ad Hoc Networks, IEEE International Conference on Networking, Sensing and Control, Beijing, pp , Apr [14] S. Noguchi, M. Tsukada, T. Ernst, A. Inomata and K. Fujikawa, Location-aware Service Discovery on IPv6 GeoNetworking for VANET, International Conference on ITS Telecommunications, Petersburg, pp , Aug [15] C. Song, J. Wu, M. Liu, H. Gong and B. Gou, RESen: Sensing and Evaluating the Riding Experience Based on Crowdsourcing by Smart Phones, 8 th International Conference on Mobile Ad-hoc and Sensor Networks, Chengdu, pp , Dec [16] I. Tal and G. Muntean, Using Fuzzy Logic for Data Aggregation in Vehicular Networks, Distributed Simulation and Real Time Applications, Dublin, pp , Oct [17] B. Yu, C. Z. Xu and M. Guo, Adaptive Forwarding Delay Control for VANET Data Aggregation, Parallel and Distributed Systems, Vol. 23, No. 1, pp , Jan [18] Y. Yuan, J. Luo, W. Yan, T. Zhao and S. Lu, DA2RF: A Data Aggregation Algorithm by Restricting Forwarders for VANETs, Computing, Networking and Communications, Anaheim, pp , Feb [19] L. Zhang and B. Jin, QoS-Oriented Data Dissemination in VANETs, Parallel and Distributed Processing Symposium Workshops & PhD Forum, Shanghai, pp.21-25, May 212. [2] Wikipedia.

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India Trupti1814@gmail.com

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Intelligent transportation systems: Past, present and look to future by using Grid technology

Intelligent transportation systems: Past, present and look to future by using Grid technology Intelligent transportation systems: Past, present and look to future by using Grid technology Behin Alipour Islamic Azad University of Tabriz Alipour_behin@yahoo.com Abstract Existing technologies in ITS

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Mobile Tracking and Resource Reservation Scheme for Cellular Networks

Mobile Tracking and Resource Reservation Scheme for Cellular Networks Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems

Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems Marc Bechler, Lars Wolf Technical University of Brunswick, Germany Email: [bechler, wolf]@ibr.cs.tu-bs.de Oliver Storz

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Navyasree Veeramallu M.Tech DECS Gudlavalleru Engineering College Gudlavalleru- 521356, Krishna District, Andhra

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks I.J. Information Technology and Computer Science, 2,, 4-46 Published Online November 2 in MECS (http://www.mecs-press.org/) Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

More information

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A SURVEY OF MOBILITY MANAGEMENT PROTOCOLS

A SURVEY OF MOBILITY MANAGEMENT PROTOCOLS A SURVEY OF MOBILITY MANAGEMENT PROTOCOLS Wei Siang Hoh, Sashikumar Muthut, Bi-Lynn Ong, Mohamed Elshaikh, Mohd Nazri Mohd Warip and R. Badlishah Ahmad School of Computer and Communication Engineering,

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile

More information

Robust Routing in Wireless Ad Hoc Networks

Robust Routing in Wireless Ad Hoc Networks Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo. gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL Komal Rani 1, Meenakshi 2 1 M.Tech Scholar, Central University of Punjab er.komrani@gmail.com 2 Centre for computer science

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan s9430605@cyut.edu.tw

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Technology Longowal, Punjab, India

Technology Longowal, Punjab, India An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los

More information