The principles of humanism for MANETs

The proposed humanistic approach mapped the human character and behavior into a device to evade the bondages of implementation and surely succeed as we live. Human societies are the complex and most organized networks, in which many communities having different cultural livelihood. The formation of communities within a society and the way of associations can be mapped to MANET. In this work we have presented the principles of humanism for MANETs. The proposed approach is not only robust and secure but it certainly meets the existing challenges (such as name resolution, address allocation and authentication). Its object oriented design defines a service in terms of Arts, Culture, and Machine. An 'Art' is the smallest unit of work (defined as an interface), the 'Culture' is the integration and implementation of one or more Arts (defined as a class) and finally the 'Machine' which is an instance of a Culture that defines a running service. The grouping of all communicable Machines having the same Culture forms a 'Community'. We have used the term 'Society' for a MANET having one or more communities and modeled using the humanistic approach. The proposed approach is compared with GloMoSim and the implementation of file transfer service is presented using the said approach. Our approach is better in terms of implementation of the basic services, security, reliability, throughput, extensibility, scalability etc.

[1]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[2]  Mario Gerla,et al.  GloMoSim: A Scalable Network Simulation Environment , 2002 .

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Aleksi Penttinen,et al.  RESEARCH ON AD HOC NETWORKING : CURRENT ACTIVITY AND FUTURE DIRECTIONS , 2002 .

[5]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[6]  Mario Gerla,et al.  Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  T. Lindvall ON A ROUTING PROBLEM , 2004, Probability in the Engineering and Informational Sciences.

[9]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[10]  Yi Mu,et al.  A secure IPv6 address configuration scheme for a MANET , 2013, Secur. Commun. Networks.

[11]  Panagiotis Papadimitratos,et al.  The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .

[12]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[13]  Gadadhar Sahoo,et al.  A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model , 2013 .

[14]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[15]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..

[16]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[17]  Bryan W. Scotney,et al.  An efficient and robust name resolution protocol for dynamic MANETs , 2010, Ad Hoc Networks.

[18]  John Moy,et al.  OSPF specification , 1989, Request for Comments.

[19]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[20]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[21]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[22]  Mohammad Masdari,et al.  A survey and taxonomy of name systems in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[23]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[24]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[25]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..