Performance Analysis for MANETs using certain realistic mobility models: NS-2
Keywords:
Privacy, Authentication, Vehicular Networks, VANET, Intelligent Transportation System (ITS), securityAbstract
In order to know about how a protocol carries out when deployed in a real scenario, it is jussive that the simulation gathers the true nature of the physical scenario and the mobility of nodes, for all cases it may not be possible. For example, consider a scenario where a set of nodes are deployed in a release-rescue operation. Even though the mobility of the nodes can be gathered with certain realistic mobility models and techniques, the node doesn’t gather the uneven areas, catastrophic failure of the nodes, and so on, in which the nodes operate. This paper focuses on analyzing the AODV Performance over different variants of realistic mobility models by the use of ns-2.
References
C.S. Murthy, B.S. Manoj, “Ad Hoc Wireless Networks :Architectures and Protocols”, Prentice Hall Publishers, May 2004, ISBN 013147023X.
C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall publishers, December 2001, ISBN 0130078174.
C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”. In Proc. of the ACM SIGCOMM, October 1994.
S. Murthy, J.J. Garcia-Luna-Aveces, "A Routing Protocol for Packet Radio Networks," Proc. ACM International Conference on Mobile Computing and Networking, pp. 86-95, November, 1995.
C.C. Chiang, “Routing in Clustered Multihop, Mobile Wireless Networks withFading Channel,” Proc. IEEE SICON ’97, Apr. 1997, pp. 197–211.
S R. Das, C E. Perkins, E M. Royer and M K. Marina ."Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networks."IEEE Personal Communications Magazine special issue on Ad hoc Networking, p. 16-28, February 2001.
Z.J Haas, “ A new routing protocol for the reconfigurable wireless network”. In Proceedings of the 1997 IEEE 6th International Conference on Universal Personal Communications, ICUPC `97, San Diego, CA, pp. 562 – 566,October 1997;
K.Sanzgiri, B. Dahill, B. N. Levine, C. Shields and E M. B royer."A Secure Routing Protocol for Ad Hoc Networks" (ARAN) In International Conference on Network Protocols (ICNP), Paris, France, November 2002.
S Basagni, M Conti, S Giordano, I Stojmenovic, “Mobile Ad Hoc Networking”, ISBN: 0-471-37313-3, Wiley-IEEE Press: Chapter 12: Ad hoc networks SecurityPietroMichiardi, RefikMolva.
Y Hu, D B. Johnson, A Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA `02), pp: 3-13, Jun 2002.
Y Hu, A Perrig, D B. Johnson. "Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks"MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002.
A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," Cryptobytes,, Volume 5, No. 2 (RSA Laboratories, Summer/Fall 2002), pp. 2-13.
P. Papadimitratos and Z. Haas."Secure routing for mobile ad hoc networks" (SRP) SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 27--31, January 2002.
S. Capkun, L. Buttyan and J-P Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc Networks ", IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 52-64,Jan-Mar 2003.
W Wang, Y Zhu, B Li. "Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks ", in the Proceedings of IEEE Vehicular Technology Conference (VTC 2003), Orlando, Florida, 10/6-9, 2003.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. "Providing robust and Ubiquitous Security support for Mobile Ad Hoc Networks ", Proceedings of the 9th International conference on Network Protocols (ICNP), Riverside, California, USA, November 11-14, 2001.
E C. H. Ngai and M R. Lyu. "Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks", 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW`04), Hachioji, Tokyo, Japan, 3/23-24, 2004.
L. Zhou and Z. Haas. “Securing Ad Hoc Networks”, IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December 1999.
M C Morogan “Certificate Management in Ad Hoc Networks”, Symposium on Applications and the Internet Workshops (SAINT`03 Workshops), pp. 337,January 27 - 31, 2003.
T. Camp, J. Boleng, and V. Davies. “A Survey of Mobility Models for Ad Hoc Network Research",in Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, 2002.
B Liang, Z. J. Haas, “Predictive distance-based mobility management for multidimensional PCS networks”, IEEE/ACM Transactions on Networking (TON), Volume 11 , Issue 5 , Pages: 718 – 732, October 2003
J. Yoon, M. Liu, and B. Noble."Random waypoint considered harmful," in Proc. of IEEE INFOCOM `03, vol. 2, pp. 1312—1321, March 2003.
M G Zapata, “SecureAdhoc On-Demand Distance Vector Routing”, ACM Mobile Computing and Communications Review (MC2R), pp:106--107, July 2002.
R. Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.