* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Current State Of The Literature Related To The Proposed Topic
Survey
Document related concepts
Internet protocol suite wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Peer-to-peer wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Transcript
Optimization In Routing Protocols For Mobile Ad Hoc Networks Synopsis for Admission to Ph. D. Programme Submitted by PRABHAT KUMAR YADAV Roll Number:- R10012375 Submitted to Under the Guidance of Dr. Zaheeruddin. Department of Electrical Engineering Faculty of Natural Sciences Jamia Millia Islamia New Delhi-11 0025 Optimization In Routing Protocols For Mobile Ad Hoc Networks Objective:The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The infrastructure less and the dynamic nature of these networks demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. This, along with the diverse application of these networks in many different scenarios such as battlefield and disaster recovery, has seen MANETs being researched by many different organizations and institutes. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between nodes. However, due to their mobility and the limited resource in wireless networks, each layer in the TCP/IP model require redefinition or modifications to function efficiently in MANETs. One interesting research area in MANET is routing. Routing in the MANETs is a challenging task and has received a tremendous amount of attention from researches. This has led to development of many different routing protocols for MANETs, and each author of each proposed protocol argues that the strategy proposed provides an improvement over a number of different strategies considered in the literature for a given network scenario. Therefore, it is quite difficult to determine which protocols may perform best under a number of different network scenarios, such as increasing node density and traffic. In this paper, we provide an overview of a wide range of routing protocols proposed in the literature. We also provide a performance comparison of all routing protocols and suggest which protocols may perform best in large networks. Current State Of The Literature Related To The Proposed Topic:In recent years, mobile computing has enjoyed a tremendous rise in popularity. The continued minimization of mobile computing devices and the extraordinary rise of processing power available in mobile laptop computers combine to put more and better computer-based applications into the hands of a growing segment of the population. At the same time, the markets for wireless telephones and communication devices are experiencing rapid growth. Projections have been made that, in nowadays there are more than billion wireless devices in use. Therefore, the wireless mobile computers or Mobile Ad Hoc Networks (MANET) have become very necessary. A wireless ad hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Since the nodes communicate over wireless links they have to contend with the effects of radio communication, such as noise, fading, and interference. In addition, the links typically have less bandwidth than in a wired network. Each node in a wireless ad hoc network functions as both a host and a router, and the control of the network is distributed among the nodes. The network topology is in general dynamic, because the connectivity among the nodes may vary with time due to node departures, new node arrivals, and the possibility of having mobile nodes. Hence, there is a need for efficient routing protocols to allow the nodes to communicate over multihop paths consisting of possibly several links in a way that does not use any more of the network "resources" than necessary. Some of these features are characteristic of the type of packet radio networks that were studied extensively in the 1970s and 1980s. To provide routes in such dynamic environments, many routing protocols have been proposed over the last few years. These protocols can be broadly classified onto three categories, namely, proactive, reactive, and hybrid. Yet, research in the area of ad hoc networking is receiving much attention from academia, industry, and government. Since these networks pose many complex issues, there are many open problems for research and opportunities for making significant contributions; one of these issues is the secure communication during the route discovery. The Research Proposal:This proposal is concerns with the development and evaluation of Optimum/Mitigate routes discovery between a source node and a destination in the MANET, which provides secure and safe communication path. As we know, Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet. The inherent features (such as-open medium, dynamically changing network topology, lack of centralized monitoring and management point, and lack of a clear line of defense) of the MANET make it vulnerable to a wide range of attacks. There is no guarantee that a communication path is free from malicious or compromised nodes which deliberately wish to disrupt the network communication. So protecting the mobile ad-hoc network from malicious attacks is very important and challenging issue. Methodology:- Studying and investigating the current protocols of ad hoc wireless networks. - Assessing the difficulties faced by other routing protocols. - Designing algorithms needed to implement the idea of this proposal (The Optimum/Mitigated Routing Algorithm.), and achieve the following goals: • Less congestion control, overhead control and communication cost. • High speed during route discovery, update and data maintenance. • Setting up a communication path which provides secure packet transmission. • Optimum bandwidth for data packet transmission. - Navigating features of software tools that will use in implementation, testing and comprising, such as (C++, Ns2 simulator, TCL and TK). References:1. 2. 3. 4. 5. 6. 7. 8. 9. E.M. Royer, C.-K. Toh, A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal Communications 6 (2) (1999) 46–55. C.-C. Chiang, Routing in clustered multihop mobile wireless networks with fading channel, in: Proceedings of IEEE SICON, April 1997, pp. 197–211. G. Aggelou, R. Tafazolli, RDMAR: a bandwidth-efficient routing protocol for mobile ad hoc networks, in: ACM International Workshop on Wireless Mobile Multimedia (WoWMoM), 1999, pp. 26–33. S. Radhakrishnan, N.S.V Rao, G. Racherla, C.N. Sekharan, S.G. Batsell, DST––A routing protocol for ad hoc networks using distributed spanning trees, in: IEEE Wireless Communications and Networking Conference, New Orleans, 1999. S.-C. Woo, S. Singh, Scalable routing protocol for ad hoc networks, Wireless Networks 7 (5) (2001) 513–529. Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention Yang-Seo Choi ; Jin-Tae Oh ; Jong-Soo Jang ; Jae-Cheol Ryou Information Technology Convergence and Services (ITCS), 2010 . DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics Yuan Tao ; Shui Yu Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE . SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack Agrawal, P.K. ; Gupta, B.B. ; Jain, S. Intelligence and Security Informatics Conference (EISIC), 2011 European. V.Priyadharshini1 , Dr.K.Kuppusamy Prevention of DDOS Attacks Using New Cracking Algorithm Dept of Computer Science & Engg Alagappa University, Karaikudi,Tamilnadu,India , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622,May-June 2012.