Abstract
A mobile ad-hoc network (MANET) is a self configuring network of mobile routers (and associated hosts) connected by wireless links—the union of which form an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably. MANETs are usually set upin situations of emergency for temporary operations or simply if there are no resources to set up elaborate networks. These types of networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication, something that is not easily done as many of the demands of network security confl ict with the demands of mobile networks, mainly due to the nature of the mobile devices (e.g. low power consumption, low processing load). Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Besides the general security objectives like authentication, confidentiality, integrity, availability and non repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze threats faced by the adhoc network environment and provide a classification of the various security mechanisms. We analyzed the respective strengths and vulnerabilities of the existing routing protocols and suggest a broad and comprehensive framework that can provide a tangible solution. Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. There is no fixed infrastructure such as base stations for mobile switching.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Samarth H. Shah, Kai Chen, Klara Nahrstedt, Available Bandwidth Estimation in IEEE 802.11-based Wireless Networks Department of Computer Science University of Illinois at Urbana-Champaign
IEEE standard for wireless LAN MediumAccess Control (MAC) and Physical Layer(PHY) specification, June 1997
Lei Chen, and Wendi B. Heinzelman,QoS-Aware Routing Based on BandwidthEstimation for Mobile Ad Hoc Networks, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 3, MARCH 2005
S. Chen and K. Nahrstedt, “Distributed quality-of-service in ad hoc networks,”IEEE J. Sel. Areas Commun., vol. 17, no. 8, Aug. 1999
S. Chen, “Routing support for providing guaranteed end-toend quality-of-service,” Ph.D. dissertation, Univ. Illinois at Urbana–Champaign, Urbana–Champaign, IL, 1999
P. Mohapatra, J. Li, and C. Gui, “QoS in mobile ad hoc networks,” IEEE Wireless Commun. Mag. (Special Issue on QoS in Next-GenerationWireless Multimedia.Communications Systems)
Fethi Filali,” QoS Issues and Solutions in Wireless Networks”, CNRS- GDR – ARP – QoS Day :Paris, June 4, 2004
R. S. Prasad M. Murray_ C. Dovrolis_ K.Claffy,”Bandwidth estimation: metrics, measurement techniques, and tools”
Toshaki Osada, Gen Kitagata, A new QOS routing scheme for MANET
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer India Pvt. Ltd
About this paper
Cite this paper
Patil, R., Damodaram, A., Das, R. (2011). Cross layer QOS routing for various traffic patterns in mobile ADHOC network through bandwidth estimation. In: Pise, S.J. (eds) Thinkquest~2010. Springer, New Delhi. https://doi.org/10.1007/978-81-8489-989-4_14
Download citation
DOI: https://doi.org/10.1007/978-81-8489-989-4_14
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-8489-988-7
Online ISBN: 978-81-8489-989-4
eBook Packages: Computer ScienceComputer Science (R0)