Full Paper View Go Back

Performance Analysis for MANETs using certain realistic mobility models: NS-2

R. Kumari1 , P. Nand2

  1. Dept. of CSE, SCSE (Galgotias University), Gr. Noida, India.
  2. Dept. of CSE, SCSE (Galgotias University), Gr. Noida, India.

Correspondence should be addressed to: ranichoudhary04@gmail.com.


Section:Research Paper, Product Type: Journal-Paper
Vol.6 , Issue.1 , pp.70-77, Feb-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i1.7077


Online published on Feb 28, 2018


Copyright © R. Kumari, P. Nand . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Kumari, P. Nand, “Performance Analysis for MANETs using certain realistic mobility models: NS-2,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.70-77, 2018.

MLA Style Citation: R. Kumari, P. Nand "Performance Analysis for MANETs using certain realistic mobility models: NS-2." International Journal of Scientific Research in Computer Science and Engineering 6.1 (2018): 70-77.

APA Style Citation: R. Kumari, P. Nand, (2018). Performance Analysis for MANETs using certain realistic mobility models: NS-2. International Journal of Scientific Research in Computer Science and Engineering, 6(1), 70-77.

BibTex Style Citation:
@article{Kumari_2018,
author = {R. Kumari, P. Nand},
title = {Performance Analysis for MANETs using certain realistic mobility models: NS-2},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2018},
volume = {6},
Issue = {1},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {70-77},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=565},
doi = {https://doi.org/10.26438/ijcse/v6i1.7077}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.7077}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=565
TI - Performance Analysis for MANETs using certain realistic mobility models: NS-2
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - R. Kumari, P. Nand
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 70-77
IS - 1
VL - 6
SN - 2347-2693
ER -

425 Views    206 Downloads    95 Downloads
  
  

Abstract :
In order to know about how a protocol carries out when deployed in a real scenario, it is jussive that the simulation gathers the true nature of the physical scenario and the mobility of nodes, for all cases it may not be possible. For example, consider a scenario where a set of nodes are deployed in a release-rescue operation. Even though the mobility of the nodes can be gathered with certain realistic mobility models and techniques, the node doesn‘t gather the uneven areas, catastrophic failure of the nodes, and so on, in which the nodes operate. This paper focuses on analyzing the AODV Performance over different variants of realistic mobility models by the use of ns-2.

Key-Words / Index Term :
Privacy, Authentication, Vehicular Networks, VANET, Intelligent Transportation System (ITS), security

References :
[1] C.S. Murthy, B.S. Manoj, “Ad Hoc Wireless Networks :Architectures and Protocols”, Prentice Hall Publishers, May 2004, ISBN 013147023X.
[2] C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall publishers, December 2001, ISBN 0130078174.
[3] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”. In Proc. of the ACM SIGCOMM, October 1994.
[4] S. Murthy, J.J. Garcia-Luna-Aveces, "A Routing Protocol for Packet Radio Networks," Proc. ACM International Conference on Mobile Computing and Networking, pp. 86-95, November, 1995.
[5] C.C. Chiang, “Routing in Clustered Multihop, Mobile Wireless Networks withFading Channel,” Proc. IEEE SICON ’97, Apr. 1997, pp. 197–211.
[6] S R. Das, C E. Perkins, E M. Royer and M K. Marina ."Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networks."IEEE Personal Communications Magazine special issue on Ad hoc Networking, p. 16-28, February 2001.
[7] Z.J Haas, “ A new routing protocol for the reconfigurable wireless network”. In Proceedings of the 1997 IEEE 6th International Conference on Universal Personal Communications, ICUPC `97, San Diego, CA, pp. 562 – 566,October 1997;
[8] K.Sanzgiri, B. Dahill, B. N. Levine, C. Shields and E M. B royer."A Secure Routing Protocol for Ad Hoc Networks" (ARAN) In International Conference on Network Protocols (ICNP), Paris, France, November 2002.
[9] S Basagni, M Conti, S Giordano, I Stojmenovic, “Mobile Ad Hoc Networking”, ISBN: 0-471-37313-3, Wiley-IEEE Press: Chapter 12: Ad hoc networks SecurityPietroMichiardi, RefikMolva.
[10] Y Hu, D B. Johnson, A Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA `02), pp: 3-13, Jun 2002.
[11] Y Hu, A Perrig, D B. Johnson. "Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks"MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002.
[12] A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," Cryptobytes,, Volume 5, No. 2 (RSA Laboratories, Summer/Fall 2002), pp. 2-13.
[13] P. Papadimitratos and Z. Haas."Secure routing for mobile ad hoc networks" (SRP) SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 27--31, January 2002.
[14] S. Capkun, L. Buttyan and J-P Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc Networks ", IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 52-64,Jan-Mar 2003.
[15] W Wang, Y Zhu, B Li. "Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks ", in the Proceedings of IEEE Vehicular Technology Conference (VTC 2003), Orlando, Florida, 10/6-9, 2003.
[16] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. "Providing robust and Ubiquitous Security support for Mobile Ad Hoc Networks ", Proceedings of the 9th International conference on Network Protocols (ICNP), Riverside, California, USA, November 11-14, 2001.
[17] E C. H. Ngai and M R. Lyu. "Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks", 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW`04), Hachioji, Tokyo, Japan, 3/23-24, 2004.
[18] L. Zhou and Z. Haas. “Securing Ad Hoc Networks”, IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December 1999.
[19] M C Morogan “Certificate Management in Ad Hoc Networks”, Symposium on Applications and the Internet Workshops (SAINT`03 Workshops), pp. 337,January 27 - 31, 2003.
[20] T. Camp, J. Boleng, and V. Davies. “A Survey of Mobility Models for Ad Hoc Network Research",in Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, 2002.
[21] B Liang, Z. J. Haas, “Predictive distance-based mobility management for multidimensional PCS networks”, IEEE/ACM Transactions on Networking (TON), Volume 11 , Issue 5 , Pages: 718 – 732, October 2003
[22] J. Yoon, M. Liu, and B. Noble."Random waypoint considered harmful," in Proc. of IEEE INFOCOM `03, vol. 2, pp. 1312—1321, March 2003.
[23] M G Zapata, “SecureAdhoc On-Demand Distance Vector Routing”, ACM Mobile Computing and Communications Review (MC2R), pp:106--107, July 2002.
[24] R. Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation