Sie sind auf Seite 1von 4

Mobile Ad hoc Networks routing algorithms & Protocol in MANET

TALHA RIAZ1, Muhammad Mumtaz2 , Umar Hassan3 , Engr. UZMA MAJEED[4]

Hamdard University Islamabad Campus (Department of Electrical Engineering)

trpj07@gmail.com , m.mkanwal15@gmail.com , umarraaj2020@gmail.com , uzmamajeed14@gmail.com

Abstract: Mobile Ad hoc Networks (MANET) is a technology Proactive Protocols: In this type of routing protocol, each
where multiple nodes are connected with wireless connection and
node in a network maintains one or more routing tables
independent to form network topology. The devices can self
configure them self and they can move independently. In MANET which are updated regularly. Each node sends a broadcast
each device is able change their link frequently all devices act both
message to the entire network if there is a change in the
as a host and as a router, because due to limited range of energy
transmission. The existing routing algorithms & protocols are network topology. However, it incurs additional overhead
insufficient for batter communication from source to destination. cost due to maintaining up-to-date information and as a
In this paper we discuss about the exciting techniques and
improvement in these techniques, to form a better network result; throughput of the network may be affected but it
topology for effective communication between source and provides the actual information to the availability of the
destination.
network. Distance vector (DV) protocol, Destination
Introduction Sequenced Distance vector (DSDV) protocol, Wireless

MANET is a mobile network in which each node Routing protocol Fisheye State Routing (FSR) protocol are
communicate each other without using any predefine the examples of Proactive protocols.
infrastructure or central administration. These networks are
mainly uses in temporary networks or to form a small Reactive Protocols: In this type of routing protocol, each
networking topology. Generally these network topologies
node in a network discovers or maintains a route based on-
are used for civilian purposes. This is a valid field of
research in this topology there are devices in network which demand. It floods a control message by global broadcast
are mobile devices, there are existing algorithms which are during discovering a route and when rote is discovered then
not sufficient for communication. Many researchers have bandwidth is used for data transmission. The main
research on it by both quantitative and qualitative research
advantage is that this protocol needs less touting
methods. By new emerging technologies like Wi-Fi
(wireless lane), Bluetooth make mobile ad-hoc networking information but the disadvantages are that it produces huge
more realistic. By using these technologies it can be easy to control packets due to route discovery during topology
established mobile ad-hoc network. Now a day’s mobile
changes which occur frequently in MANETs and it incurs
spot multi-media applications on mobile phones can make
MANET easier. higher latency. The examples of this type of protocol are
Dynamic Source Routing (DSR), Ad-hoc On Demand
Routing (AODV) and Associatively Based Routing (ABR)
protocols.

Hybrid Protocols: It is a combination of proactive and


reactive protocols taking the best features from both worlds.

Four Routing Protocols: In this report, the following four


routing protocols have been discussed but only
implementation and analysis for AODV and DSR are
shown.
Distance Vector (DV) Protocol: It is a proactive protocol 3) Routing Table: It contains the shortest distance and
that works on the principles of distance vector where each the up-to-date information of all destinations.
node in a network maintains a distance table that contains 4) Message Retransmission List (MRL): Each node in
the shortest distance and the address of the next hop router. a network sends a hello message to its neighbors
Initially, each node knows only the distance with the nodes and informs them that he is alive and waits for the
that are directly connected and a distance vector is acknowledgement (ACK) from its neighbors. If it
initialized with that distance. Initially, distance to all others does get any ACK from any neighbors within a
nodes that are not directly connected are initialized the certain time, then keeps this information to MRL
infinity. When a change occurs in the network, each node list. Next time it will send update message to nodes
updates its directly connected neighbors to the least cost only that did not reply to the hello message.
distance vector. This process continues until convergence. Dynamic Source Routing (DSR) Protocol: It is a reactive
protocol that creates a route on demand using source routing
The advantages of distant vector protocol are
protocol i.e. it requires a full series of paths to be established

1) No need for global broadcasting. between source and destination nodes to transmit packets
and each packet follows the same path. The major
2) Short route acquisition delay all information for each motivations of this protocol are to limit the bandwidth by
node is available in the routing table. avoiding the periodic table updates and long convergence
time. The underline fact to this protocol is that it floods a
3) Long convergence time which may cause counting to
route request message in the network to establish a route
infinity problem for large Networks.
and it consists of two procedures: Route Discovery and
4) Non-availability of alternative paths. Route Maintenance.
Route Discovery: As it is on-demand routing protocol, so it
Wireless Routing Protocol (WRP): It is an improved
looks up the routing during transmission of a packet. At the
version of the distant vector protocol that eliminates the
first phase, the transmitting node search its route cache to
count-to-infinity problems and thereby decreasing the
see whether there is a valid destination exists and if so, then
convergence time. It has some disadvantages also. It
the node starts transmitting to the destination node and the
requires larger memory and greater processing. It is also not
route discovery process end here. If there is no destination
suitable large networks with mobility. However, in WRP,
address then the node broadcasts the route request packet to
each node in a network maintains the following four tables:
reach the destination. When the destination node gets this
1) Link Cost Table: Each node contains cost and other packet, it returns the learned path to the source node.
information like identifier to the directly connected
ATTACKS ON MANET
nodes. The cost of a broken link is identified by
infinity. There are different types of attacks that effect the manet.
Some of them are describe below
2) Distance Table: In this table, each node contains
information to the nodes that are not directly LOCATION DISCLOSURE: Location disclosure is a type
connected. of attack that directly attacks the privacy terms of an ad-hoc
network by using different techniques like probing and
monitoring approaches an attacker have the ability to detect network and look like friendly nodes thus, the compromised
the whole network nodes can join the network as the normal nodes

BLACK HOLE: A black hole problem means that one Eavesdropping: Eavesdropping means to obtain some
malicious node utilizes the routing protocol to claim itself of confidential information that should be kept secret during
being the shortest path to the destination node, but drops the the communication. The confidential information consists of
routing packets but does not forward packets to its public key, private key, location and passwords of the
neighbors nodes. Such type of data is very confidential to the nodes
that should be kept secret so that no unauthorized can access
REPLAY: This attack can degrade the performance of the this confidential information.
MANET. By the phenomenon of interception and
retransmission a reply attacker does this attack Applications of MANET:

Wormhole: Wormhole node fakes a route that is shorter Military Tactical Operations: For fast and possibly short
than the original one within the network this can confuse term establishment of military communications and troop
routing mechanism. it has one or more malicious node and deployments in hostile and/or unknown environments.
a tunnel between them Search and Rescue Operations: For communication in
areas with little or no wireless infrastructure support.
Blackmail: This type of attack is related to the routing
Disaster Relief Operations: For communication in
protocols which mainly uses the mechanism for the environments where the existing infrastructure is destroyed
identification of malicious nodes and propagates messages or left inoperable.
and try to isolate valid node from the network.
Law Enforcement: For secure and fast communication
during law enforcement operations.
Denial of service: This attack can completely disturbs the
routing function which effects the whole ad-hoc network. A Commercial Use: For enabling communications in
denial service attack is an attempt to make a network exhibitions, conferences and large gatherings. For some
business scenarios, the need for collaborative computing
resource unavailable to its intended users and disrupt the
might be more important outside office environments than
establishment of legal route. inside a building. After all, it is often the case where people
do need to have outside meetings to cooperate and exchange
Routing: This attack can maintain the routing table that information on a given project.
contains the information about the route of the network.

In this attack a malicious node is generated that sends the Proposed Methodology: It’s also mention that we can
fabricated signals from the other nodes to enter the false make an Ad-hoc network by using the modern technology
entries in the tables of the participating nodes. like as Wi-Fi and blue-tooth we can connect our smart
phones through these technology. By creating these
Breaking the neighbor relationship: An intelligent filter is networking it helps us to communicate into a short range
placed in between two ISS (information system) that could area it is helpful inside a institute for communication same
change information in the routing update. like as in industry we have to communicate with other
workers they can any where inside an industry if we use
Masquerading: By masquerading as another node,
mobile phone as ad-hoc networks.
malicious nodes can run many attacks in a network.
Attacker modifies either the MAC or the IP address in
outgoing packets in order to adopt another identity in the
network and appear as a good natured
node. By this technique he is then able to operate as a
trustworthy node and can for example advertise incorrect
routing information to other participants of the network.

Impersonation: Impersonation is a severe threat for the


network that can capture some of the nodes from thr
[2] Arun Kumar B.R., Lokanatha C.Reddy,
Prakash.S.Hiremath, “Performance Comparison of Wireless
Mobile Ad hoc Network Routing Protocols” IJCSNS
International Journal of Computer Science and Network
Security VOL.8 No.6, June 2008.

[3] Srdjan Krco and Marina Dupcinov, “Improved Neighbor


Detection Algorithm for AODV Routing Protocol”,
IEEE Communications Letters, vol. 7, No. 12, december
2003.

It should be helpful in above case. Other then we use this [4] A Arafatur Rahman Md. , Farhat Anwar, Saiful Azad
technology in smart house living system. By providing a Md. , “Integrated Metric-Ad Hoc On-Demand Distance
better protocol we have to use this technology in many Vector:A Routing Protocol over Wireless Mesh
means. There is main challenge in these technology is Networks” Journal of Computer Science 5 (7): 511-518,
protocol as above mention that our wireless protocols are 2009, ISSN 1549-3636
not good and not efficient in communication. If we use two
step hybrid protocols then we have a better communication [5] Hua Qu Peng Zhang Ji- hong Zhao, “A New Local
network. Repair Scheme Based on Link Breaks for Mobile Ad
Hoc Networks”, Seventh Annual Communication
By two step hybrid protocol means in MANET we use two Networks and Networks and Services Research
protocols which is not easy to hack and we also avoid from Conference -2009.
black hole. In this we use one as proactive and other as
reactive protocols Ad-hoc network. With the help of two [6] Jasmine Jeni P.R., Vimala Juliet A, Shaji B, SRM
routing protocol we can save from MANET from different university Chennai,“MDSR (Modified Dynamic Source
attacks like bloke hole and whom node if such a attack come Routing) and AODV (Ad hoc On Demand Distance
in our network. We have to update the routing table of Vector) in MANET”, European Journal of Scientific
proactive protocol or nodes are assembling with proactive Research ISSN 1450-216X Vol.39 No.4 (2010), pp.606-
routing protocol. 612, EuroJournals Publishing, Inc. 2010

Conclusion: In this paper we study about the routing [7] Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain,
protocols in MANET and the attacks on MANET. We also “Performance Comparison of AODV, DSDV and I-DSDV
study about the vectors or how a node behaves in MANET. Routing Protocols in Mobile Ad Hoc networks”,
We study about the AODV, DSR, TORA, ZRP and also European Journal of Scientific Research, Vol.31 No.4
about the table driven routing protocols. Drawbacks of (2009), pp.566-576.
above mention protocols. We also discuss the attacks on
[8] Anders Fongen, Morten Gjellerud, Eli Winjum “A
MANET which attacks generally destroy our network.
MILITARY MOBILITY MODEL FOR MANET
There are some applications also discuss in the paper to
RESEARCH”
make it more familiar for use. And we also have a method to
improve MANET but the methodology is not clear to [9] Vishal Sharma et al“Performance evaluation of reactive
implement. routing protocols in MANET networks using GSM based
voice traffic applications” Optik - Int. J. Light Electron Opt.,
References:
Elsevier pp 201-204.JUNE 2012.
[1] KU Khan, RU Zaman and A. Venugopal Reddy,
[10] Perkins, C., Belding, E., Das, S., Ad hoc On-Demand
“Performance Comparison of On-Demand and Table Driven
Distance Vector (AODV) Routing - RFC 3561, 2003.
Ad HocRouting Protocols using NCTUns”, Tenth
International Conference on Computer Modeling and
Simulation, 2008.

Das könnte Ihnen auch gefallen