A mobile ad-hoc network (MANET) is a dynamic, distributed system of wireless mobile nodes in which the nodes can move in any direction, independent of each other. The mobile nodes in such network can communicate with each other through direct wireless links or multi-hop routing. MANET is used in wide range of applications such as Battle Field and Rescue operations etc. A MANET is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures like routers. In these networks, a new art of network establishment is introduced and which can be well suited for an environment where either the infrastructure is lost or where deployment of an infrastructure is not very cost effective. Maintaining and allocating network resources effectively and fairly among a collection of users is a major issue. Congestion control is a critical issue to achieve optimal network resource utilization and fairness among data transmission. In MANET, shared resources are used, where multiple senders compete for link bandwidth to prevent network from getting overloaded. It is necessary to adjust the data rate used by each sender. The packets which are sent by the sending node and not forwarded by the router are automatically dropped. Consequently, a large amount of packets arriving at a network leads to many packet drops. Security has also become a primary concern today for providing secured communication between mobile nodes. Also unique characteristics of mobile ad-hoc networks pose a number of non-trivial challenges to security design like open peer-to-peer network architecture, highly dynamic network topology, and stringent resource constraints and shared wireless medium. These challenges clearly make a case for building multi-fence security solutions that achieve both protection from undesired and unauthorized users and desirable network performance based upon reduced delay time and increased throughput. Thus, we have introduced an approach which is a combination of congestion control and security techniques to resolve above said problem to provide a better network system for effective transmission from source node to intended destination node without any delay and congestion in the transmission medium.
[1]
Dhammika Jayalath,et al.
Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks
,
2007,
2007 IEEE 66th Vehicular Technology Conference.
[2]
Adi Shamir,et al.
Identity-Based Cryptosystems and Signature Schemes
,
1984,
CRYPTO.
[3]
Thomas F. La Porta,et al.
Mitigating Performance Degradation in Congested Sensor Networks
,
2008,
IEEE Transactions on Mobile Computing.
[4]
Dr. Anil Kapil.
Identity-Based Key Management in MANETs using Public Key Cryptography
,
2004
.
[5]
Tara M. Swaminatha,et al.
Wireless Security and Privacy: Best Practices and Design Techniques
,
2002
.
[6]
Abhishek Bande,et al.
An Improvement in Congestion Control Using Multipath Routing in MANET
,
2013
.
[7]
William A. Arbaugh,et al.
Toward secure key distribution in truly ad-hoc networks
,
2003,
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[8]
Md. Mahbubul Alam,et al.
Congestion control in Mobile Ad-Hoc networks (MANETs)
,
2011
.
[9]
Ali Miri,et al.
An authenticated broadcasting scheme for wireless ad hoc network
,
2004,
Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[10]
MANET Robin Choudhary.
A Novel Approach for Congestion Control in MANET
,
2012
.
[11]
Vijay Varadharajan,et al.
Designing secure wireless mobile ad hoc networks
,
2005,
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[13]
Jiejun Kong,et al.
Providing robust and ubiquitous security support for mobile ad-hoc networks
,
2001,
Proceedings Ninth International Conference on Network Protocols. ICNP 2001.