Preview

Reliability And Trust In MANET Analysis

Powerful Essays
Open Document
Open Document
1612 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reliability And Trust In MANET Analysis
Reliability and Trust in Mobile Ad-hoc NETworks (MANET) are considerable due to their applicability in different situations such as military, emergency applications or health care applications. Indeed, due to absence of a fixed infrastructure and a central controller, providing trust and reliability still is challenge in these networks. Since energy is limited and distributed in MANETs, trust and reliability providing (is different from wired systems and it must be reasonable and compatible with network resources. Many literatures have been dedicated to provide trust and reliability in MANETs. In this paper we have a review on reliable and trusted routing protocols in MANETs.
Keywords: Mobile Ad-Hoc Networks, Routing, Trust, Reliability
I. INTRODUCTION
…show more content…
II. RELIABILITY AND TRUST
Reliability is an important issue in MANETs, and it would become a main issue when the system environment is distributed and energy is limited. Reliability is affected severely by fault and failure which happen because of several reasons. Occurring fault and failure in MANETs is deniable, therefore it must be looking for an approach to recover the transmitted information after occurring failure. Reliability is so important in fault and loss packet sensitive application. Hence, many researches are offered in MANET’s routing in order to increasing reliability which some of them are offered in this section.
Generally, multipath routing techniques are used for increasing reliability. The techniques mainly divide into two groups: discrete nodes and discrete edges [5]. When failure happen in a path, another paths are available to perform the operation, therefore route recovery is not required for disabled path [6]. But multipath routing is weak about packet
…show more content…
Santivanez et al, have introduced scalability metric in MANETs as sum of header and a least of load traffic. The analysis provided an improvement for simple flooding algorithms in high mobility scenarios with vague monitoring of connections [8]. In [9] a protocol is offered based on AODV. In the paper, high reliable nodes are used in order to increasing reliability. Authors have tried to use high reliable nodes in routing and rout discovery. Indeed, multipath routing is applied to prevent bottlenecks. Complexity of using high reliable nodes in implementation and large delay of multipath routing through reliable nodes are the limitation of this research. In [10], Heusse et al proved that if a low number of nodes operate in bandwidth, efficiency would be decreased. In [11], three techniques is studied to increase reliability: Retransmission of data link layer, Placement of low quality connections in black list and using reliability metrics in order to increase reliability in packet

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    CIS590: Project Plan Paper

    • 4496 Words
    • 18 Pages

    Addressing the need for a network topology that will address security, resiliency and business continuity challenges both day-to-day and in the event of a man-made (i.e., hacker) or natural (earth quake) disaster.…

    • 4496 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HW Assignment Unit 2

    • 545 Words
    • 2 Pages

    If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.…

    • 545 Words
    • 2 Pages
    Good Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience.…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Good Essays

    (Network Protection, 2010). These metrics cover a broad range of key factors to the survivability, reliability and availability of the network. Factors such as the percentage of time a network and its services are up are important factors to not only the reliability of the network, but also the availability. Availability is affected by two aspects, these aspects being Mean time between failures (MTBF) and Mean time to repair (MTTR). As shown by the graphic below, availability is affected by MTBF distinctively.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Homework

    • 304 Words
    • 1 Page

    Reliable Delivery: The protocols provides reliable delivery service by guaranteeing to move each network layer datagram across the link without error.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Introduction A network that allows two wireless devices to communicate with the help of other wireless devices that lie within range of each other. Challenges Lack of resources The absence of a central node High mobility Different devices and platforms Leads to Key distribution problem Coping with attacks What model to use…

    • 701 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The first is V2V (vehicle to vehicle) type in which a vehicle user communicates with another directly which is the purest form of infrastructure-less characteristic of ad hoc networks. The other is V2R (vehicle to RSU) type where a vehicle communicates with RSU which is a fixed infrastructure. These vehicles communicate using the Dedicated Short Range Communication (DSRC) protocol [3]. The RSU, OBU and TA communicate using this protocol which is based on the IEEE 802.11p radio technology. The vehicles can access the wireless channel either using a directional antenna or a unidirectional antenna. Because of this wireless access VANETs are vulnerable to many attacks due to collision, eavesdropping, interference, jamming and other problems. To avoid these attacks only we introduce a concept of security in VANET. The intention of providing security is to maintain confidentiality among users by grouping them together and to efficiently provide authentication services. In many literature systems all the authentication services, key storage and updating services are performed by the authority. This imposes a huge overhead on the authority. Also this situation results in a scenario where it becomes easier to an attacker to attack only the authority end and collapse the whole system. It is inefficient if the authority is attacked that results to handing over the control to an attacker. This issue must be…

    • 1582 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Electronic Engineer

    • 4716 Words
    • 19 Pages

    Abstract—Energy consumption of nodes is a crucial factor that constrains the networks life time for Wireless Sensor Networks (WSNs). WSNs are composed of small sensors equipped with lowpower devices, and have limited battery power supply. The main concern in existing architectural and optimisation studies is to prolong the network lifetime. The lifetime of the sensor nodes is affected by different components such as the microprocessor, the sensing module and the wireless transmitter/receiver. The existing works mainly consider these components to decide on best deployment, topology, protocols and so on. Recent studies have also considered the monitoring and evaluation of the path loss caused by environmental factors. Path loss is always considered in isolation from the higher layers such as application and network. It is necessary to combine path loss computations used in physical layer, with information from upper layers such as application layer for a more realistic evaluation. In this paper, a simulation-based study is presented that uses path-loss model and application layer information in order to predict the network lifetime. Physical environment is considered as well. We show that when path-loss is introduced, increasing the transmission power is needed to reduce the amount of packets lost. This presents a tradeoff between the residual energy and the successful transmission rate when more realistic settings are employed for simulation.…

    • 4716 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    IESCCA

    • 899 Words
    • 4 Pages

    Over the past few years, we have witnessed a significant amount of interest in the study of ad-hoc and sensor networks. Unlike cellular networks, these networks can use other nodes as relays to deliver data from different sources to destinations. The relaying functionality adds a complex dimension to the performance analysis of multi-hop networks. The additional traffic imposed by relaying diminishes a node’s ability to transmit its own data. The relays could also induce hot spots (or congested areas) in the network, which in turn result in reducing the overall throughput in the case of battery-limited networks. In this paper, we analyze the impact of straight line routing in large homogeneous multi-hop wireless networks. We estimate the nodal load, which is defined as the number of packets served at a node, induced by straight line routing. For a given total offered load on the network, our analysis shows that the nodal load at each node is a function of the node’s Voronoi cell, the node’s location in the network, and the traffic pattern specified by the source and destination randomness and straight line routing. In which we calculate each node’s probability that the node serves a packet arriving to the network approaches the products of half the length of the Voronoi cell perimeter and the load density function .Based on this density function we generate the straight line path.…

    • 899 Words
    • 4 Pages
    Powerful Essays