Performance Analysis of DSR, AODV and DYMO Protocols, Quality of Service Issues and Security in MANET

ABSTRACT Applications of mobile ad hoc networks (MANET) are expected in wide varieties of area in spite of several constraints and challenges. MANET characteristics such as dynamic infrastructure arrangement, high level of heterogeneity, mobile nodes and hence dynamic topology, energy constraints, unreliable communication and security have posed a lot of challenges. The quality of service routing is a crucial factor in such an MANET environment. To optimize the routing algorithms, it is most important to evaluate the performance of the routing protocols, identify the research issues in connection to quality of service (QoS) with proper justification and to explore the security requirements in MANET. This work evaluates the performance analysis of on-demand routing protocols and certain QoS issues pertaining to routing protocols and the security. Keywords: MANET, Quality of Service (QoS), Throughput, End-end Delay, Dynamic Source Routing (DSR), Dynamic MANET on-demand, Ad-hoc on demand distance vector (AODV), Security attacks,

[1]  Kang G. Shin,et al.  Providing deterministic delay guarantees in ATM networks , 1998, TNET.

[2]  Ivan Stojmenovic,et al.  Ad hoc Networking , 2004 .

[3]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[4]  Fei Hu,et al.  Quality of Service , 2014 .

[5]  Yih-Chun Hu Efficient Security Mechanisms for Routing Protocols , 2003 .

[6]  Hussein Zedan,et al.  Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.

[7]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[8]  A. Pietrabissa,et al.  A proactive link-failure resilient routing protocol for MANETs based on reinforcement learning , 2012, 2012 20th Mediterranean Conference on Control & Automation (MED).

[9]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[10]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[11]  Abdallah Khreishah,et al.  Distributed secure routing protocol for Mobile Ad-Hoc Networks , 2013, 2013 5th International Conference on Computer Science and Information Technology.

[12]  Jian Li,et al.  Group communications in mobile ad hoc networks , 2004, Computer.

[13]  Roch Guérin,et al.  Quality-of-Service in Packet Networks: Basic Mechanisms and Directions , 1999, Comput. Networks.

[14]  kc claffy,et al.  The nature of the beast: Recent traffic measurements from an Internet backbone , 1998 .

[15]  Arun Kumar B.R.,et al.  Cross-Layer Design for Quality of Service Multicasting in Mobile Ad Hoc Networks , 2011 .

[16]  Yih-Chun Hu,et al.  Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.

[17]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .