To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
Many more useful measurements could be taken in discrete manufacturing and process plant applications without the expense and labor related to wire and cables for some hard-to-reach applications. Wiring in manufacturing or process-plant settings, with the accompanying complex supporting infrastructure and labor, drops from high ceilings or trenching can add 10-fold or more to installation costs. It doesn’t have to be that way. Industrial wireless technologies can provide cost-effective reliable communications. Key considerations and application examples will be discussed by Dan Capano, owner and president of Diversified Technical Services Inc. Mark T. Hoske, content manager and editor with Control Engineering, will explain wireless trends based on Control Engineering research and will moderate the webcast.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Many more useful measurements could be taken in discrete manufacturing and process plant applications without the expense and labor related to wire and cables for some hard-to-reach applications. Wiring in manufacturing or process-plant settings, with the accompanying complex supporting infrastructure and labor, drops from high ceilings or trenching can add 10-fold or more to installation costs. It doesn’t have to be that way. Industrial wireless technologies can provide cost-effective reliable communications. Key considerations and application examples will be discussed by Dan Capano, owner and president of Diversified Technical Services Inc. Mark T. Hoske, content manager and editor with Control Engineering, will explain wireless trends based on Control Engineering research and will moderate the webcast.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Edhole School provides best Information about Schools in India, Delhi, Noida, Gurgaon. Here you will get about the school, contact, career, etc. Edhole Provides best study material for school students.
Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery.
Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
DOM,XML,DOCUMENT OBJECT MODEL,DOCUMENT,OBJECT,MODEL,API,XML API,INTERFACE,XML INTERFACE,DOM INTERFACE,DOM IN XML,DOM LEVELS,DOM CORE,XML PARSER,XML AND WEB SERVICES,
Arithmetic expression INFIX TO POSTFIX CONVERTION saraswathi ramalingamSaraswathiRamalingam
Arithmetic expression INFIX TO POSTFIX CONVERSION,Arithmetic expression,INFIX TO POSTFIX, CONVERSION,C++,Arithmetic expression INFIX TO POSTFIX CONVERSION IN C++,INFIX NOTATION,POSTFIX NOTATION,EXPRESSION CONVERSION,INFIX EXAMPLE,CONVERSION EXAMPLE IN C++,STACK,INFIX TO POSTFIX CONVERSION USING STACK,STACK CONVERSION IN C++,STACK CONVERSION.
Bubble Sort,Insertion Sort, Structures,Students Mark statement ,Pointers, Arithmetic operations on pointers, Files,Creating file, Reading file,Writing a text file,binary file,lab programs,c programs,example programs,c program,Bubble Sort in c,Insertion Sort in c, Structures in c,Students Mark statement in c ,Pointers in c, Arithmetic operations on pointers in c, Files in c,Creating file in c, Reading file in c,Writing a text file in c,binary file in c,lab program in c,c program,example program,c program,thiruvalluvar university,lab manual,c lab manual
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2. UNIT
Ad-Hoc Basic Concepts – Characteristics –
Applications – Design Issues – Routing –
Essential of Traditional Routing Protocols –
Popular Routing Protocols – Vehicular Ad Hoc
networks ( VANET) – MANET Vs VANET –
Security.
3. Ad-Hoc Basic Concepts
• An ad hoc network is one that is spontaneously formed when
devices connect and communicate with each other.
• The term ad hoc is a Latin word that literally means "for this,"
implying improvised or impromptu.
• Ad hoc networks are mostly wireless local area networks (LANs).
The devices communicate with each other directly instead of relying
on a base station or access points as in wireless LANs for data
transfer co-ordination.
• Each device participates in routing activity, by determining the route
using the routing algorithm and forwarding data to other devices via
this route.
5. Classifications of Ad Hoc Networks
• Ad hoc networks can be classified into several
types depending upon the nature of their
applications.
• The most prominent ad hoc networks that are
commonly incorporated are illustrated in the
diagram below −
6.
7. Ad-Hoc Basic Concepts
• A wireless ad hoc network (WANET) is a decentralized
type of wireless network.
• The network is ad hoc because it does not rely on a pre
existing infrastructure, such as routers in wired
networks or access points in managed (infrastructure)
wireless networks.
• Instead, each node participates in routing by forwarding
data for other nodes, so the determination of which
nodes forward data is made dynamically on the basis of
network connectivity.
8. Ad-Hoc Basic Concepts
• In addition to the classic routing, ad hoc networks
can use flooding for forwarding data.
• Wireless mobile ad hoc networks are self-
configuring, dynamic networks in which nodes
are free to move.
• Wireless networks lack the complexities of
infrastructure setup and administration, enabling
devices to create and join networks "on the fly" -
anywhere, anytime.
9. Ad-Hoc Basic Concepts
• A wireless ad-hoc network, also known as IBSS -
Independent Basic Service Set, is a computer network in
which the communication links are wireless.
• The network is ad-hoc because each node is willing to
forward data for other nodes, and so the determination of
which nodes forward data is made dynamically based on the
network connectivity.
• This is in contrast to older network technologies in which
some designated nodes, usually with custom hardware and
variously known as routers, switches, hubs, and firewalls,
perform the task of forwarding the data.
10. Ad-Hoc Basic Concepts
• Minimal configuration and quick deployment make ad
hoc networks suitable for emergency situations like
natural or human-induced disasters, military conflicts.
• The earliest wireless ad-hoc networks were called
"packet radio" networks, and were sponsored by
Defense Advanced Research Projects Agency (DARPA)
in the early 1970s.
• Bolt, Beranek and Newman Technologies (BBN) and
SRI International designed, built, and experimented
with these earliest systems.
11. Ad-Hoc Basic Concepts
• Experimenters included Jerry Burchfield, Robert Kahn, and
Ray Tomlinson of later TEN-EXtended (TENEX), Internet
and email fame.
• Similar experiments took place in the Ham radio
community.
• It is interesting to note that these early packet radio systems
predated the Internet, and indeed were part of the
motivation of the original Internet Protocol suite.
• Later DARPA experiments included the Survivable Radio
Network (SURAN) project, which took place in the 1980s.
12. Ad-Hoc Basic Concepts
• It is a type of MHWNs.
• Nodes in the network are mobile in general.
• The wireless hosts in such networks, communicate with each other
without the existing of a fixed infrastructure and without a central
control.
• A mobile ad-hoc network can be connected to other fixed networks
or to the Internet.
• Most of the Ad-Hoc networks use the allocated frequencies for the
Industrial, Scientific and Medical (ISM) band.
13. Ad-Hoc Basic Concepts
• Ad-hoc networks have several advantages over
the traditional networks, like: Ad-hoc networks
can have more flexibility.
• It is better in mobility. It can be turn up and turn
down in a very short time.
• It can be more economical. It considered a robust
network because of its non-hierarchical
distributed control and management mechanisms.
14. Ad-Hoc Basic Concepts
• There are lots of applications for Ad-Hoc networks,
like: Group of people with laptops and they want to
exchange files and data without having an access point.
• Sharing the internet Connected to the internet
• Incase if we need to exchange information and the
network infrastructure has been destroyed.
• It is suitable for military communications at battlefield
where there is no network infrastructure.
15. Cellular VS Ad-Hoc Networks
• Infrastructure networks. Fixed, pre-located cell sites and base
station. Static backbone network topology.
• Relatively caring environment and stable connectivity.
• Detailed planning before base station can be installed.
• High setup costs.
• Large setup time.
• Infrastructureless networks.
• No base station, and rapid deployment. Highly dynamic network
topologies.
• Hostile environment and irregular connectivity.
• Ad-Hoc network automatically forms and adapts to changes.
• Cost-effective.
• Less setup time.
16. CHARACTERISTICS
• An ad hoc wireless network is a collection of
wireless mobile hosts forming a temporary
network without the aid of any established
infrastructure or centralized control.
• Ad hoc wireless networks were traditionally of
interest to the military. Throughout the 1970s
and 1980s DARPA funded much work in the
design of ad hoc packet radio networks;
17. CHARACTERISTICS
• Current research in ad hoc wireless network
design is focused on distributed routing.
• Every mobile host in a wireless ad hoc
network must operate as a router in order to
maintain connectivity information
and forward packets from other mobiles.
18. CHARACTERISTICS
• Ad hoc networks require a peer-to-peer architecture, and the
topology of the network depends on the location of the different
users, which changes over time.
• In addition, since the propagation range of a given mobile is limited,
the mobile may need to enlist the aid of other mobiles in forwarding
a packet to its final destination.
• Thus the end-to-end connection between any two mobile hosts may
consist of multiple wireless hops.
• It is a significant technical challenge to provide reliable high-speed
end-to-end communications in ad hoc wireless networks given their
dynamic network topology, decentralized control, and multihop
connections.
19. CHARACTERISTICS
• Ad hoc wireless networking is experiencing a resurgence of interest
because of new applications and improved technology.
• These networks are now being considered for many commercial
applications, including in-home networking, wireless LANs,
nomadic computing, and short-term networking for disaster relief,
public events, and temporary offices.
• Both the IEEE 802.11 and HIPERLAN Type 1 wireless LAN
standards support ad hoc wireless networking within a small area,
and wider area networks are currently under development.
20. APPLICATIONS
• Mobile ad hoc networks (MANETs)
• Vehicular ad hoc networks (VANETs)
• Smartphone ad hoc networks (SPANs)
• iMANETs
• Wireless mesh networks
• Army tactical MANETs
• Air Force UAV Ad hoc networks
• Navy ad hoc networks
• Wireless sensor networks
• Ad hoc home smart lighting
• Ad hoc street light networks
• Ad hoc network of robots
• Disaster rescue ad hoc network
• Hospital ad hoc network
• Data Monitoring And Mining
21. VANET
• VANET is an application of MANET that uses moving
vehicle as node to create mobile network.
• Recently, with the development of vehicle industry and
wireless communication technology, vehicular ad hoc
networks are becoming one of the most promising research
fields.
• VANETs which use vehicles as mobile nodes are a subclass
of mobile ad hoc networks (MANETs) to provide
communications among nearby vehicles and between
vehicles and nearby roadside equipment but apparently
differ from other networks by their own characteristics.
22. VANET
• Specifically, the nodes (vehicles) in VANETs are
limited to road topology while moving, so if the
road information is available, we are able to
predict the future position of a vehicle;
• what is more, vehicles can afford significant
computing, communication, and sensing
capabilities as well as providing continuous
transmission power themselves to support these
functions .
24. VANET
• VANET turns every participating vehicle into a wireless
router or node, allowing vehicles approximately 300m
to 1 km of each other to connect and, in turn, create a
network with a wide range.
• VANET enables communication among the vehicles
and roadside infrastructures. It makes transportation
systems more intelligent.
• Since the movement of vehicles are restricted by roads,
traffic regulations we can deploy fixed infrastructure at
critical locations.
25. VANET
• The primary goal of VANET is to provide road safety
measures where information about vehicle’s current
speed, location coordinates are passed with or without
the deployment of infrastructure.
• Apart from safety measures, VANET also provides
value added services like email, audio/video sharing etc
• The best example of VANET is Transport System of
any travel agency or any company which is joined
internally
26. COMPONENTS OF VANET
• The major components of a VANET are :
– On-Board Unit (OBU)
– Road Side Unit (RSU)
– Trusted Authority (TA)
27. VANET-OBU
• OBUs are installed in vehicles to provide wireless
communication capability.
• While RSUs are deployed on intersections or
hotspots as an infrastructure to provide
information or access to the Internet for vehicles
within their radio coverage.
• The Authority user is responsible for installing the
secure parameters in the OBU to authenticate the
user
28. VANET - COMMUNICATION
• VANET vehicular communication are of three
types:
– Vehicle-to-Vehicle communication (V2V)
– Vehicle-to-Infrastructure communication (V2I)
– Infrastructure-to-Infrastructure communication
(I2I)
29. VANET- APPLICATION
• VANETs applications enable vehicles to
connect to the Internet to obtain real time
news, traffic, and weather reports.
• VANETs also fuel the vast opportunities in
online vehicle entertainments such as gaming
and file sharing via the Internet or the local ad
hoc networks.
30.
31. MANET
• MANET consists of number of mobile devices that are connected
together to form a network, without any support from an existing
internet infrastructure or any other fixed network station.
• It is autonomous system of nodes connected by wireless links.
• In MANET the network topology may change dynamically in an
unpredictable manner since there is no fixed infrastructure and the
nodes are free to move, but each node have limited transmitting
power.
• MANET’s are basically peer-to-peer, multi-hop wireless network in
which packets are transmitted in store.
32. VANET
• VANET is similar to MANET in terms, that is also do not
need any infrastructure for data transmission.
• VANET play important role in aspect of safe driving,
intelligent navigation, emergency and entertainment
applications .
• It can be defined as an intelligent component of transport
system as vehicle are able to communicate with each other
as well as roadside base station, which are located at critical
points of the road
• Example :-Intersection and Construction Sites.
33. MANET VANET
Production cost of MANET is
cheap as compared to VANET
Much Expensive
Mobility of MANET is low as it
make bit difficult for network
enables the serving networks to
locate a mobile subscriber’s point.
High Mobility, as serving networks
to locate a mobile subscriber’s
point is easy.
Change in network topology
orientation is slow.
Frequent and very fast change of
network topology.
Sparse node density. Node density is frequent variables
MANET HAVE 100 Kps
bandwidth available.
VANET bandwidth is 1000 Kps.
It ranges Upto 100 m 500 m range available in VANET.
34. MANET VANET
MANET node lifetime depends on
power resources.
Depend on lifetime vehicle
MANET have medium reliability. High reliability of VANET.
Movement of the nodes affects the
operation of a MANET as node
movement MANETs need to rely
on robust routing protocols. And
this MANET have random node
movement.
Regular, moving pattern of nodes.
Attribute Based addressing scheme. Location Bases addressing scheme.
Position acquisition is obtained
using Ultrasonic.
VANET maintain position
acquisition by using GPS, RADAR.
35. SECURITY
• Security is the most often cited concern with
wireless networks
• Wireless networks pose unique security
problems
• Power computation constraints are often
higher in wireless networks, making security
requirements different Security in Ad-Hoc
Networks
36. Attacks on Ad-Hoc Networks
• Place of disclosure: Location disclosure Attacks that target
Confidentiality requirements of the ad hoc network.
• A black hole: Attack malicious node and enters false
answers route to route requests it receives
• Wormholes: It involves co-operation between the two
malicious nodes that participate in the network to appear
one attacker.
• Denial of Service: Specific instances of denial of service
attacks include the routing table overflow and the sleep
deprivation torture.
37. Why Security Required
• Data confidentiality: keep data secret
• Data integrity: prevent data from being altered
• Data freshness: data must be recent
• Data availability: data should be available on
request
• Data authentication: confirmation that data or
request came from a specific, valid sender
Security in Ad-Hoc Networks
38. Security Challenges
• Vulnerability of channels Messages can be overheard and
fake messages can be introduced into the network
• Vulnerability of nodes Nodes do not usually reside in
physically protected places
• Lack of infrastructure Special networks should operate
independently of any fixed infrastructure.
• Dynamic Topology The permanent changes of topology
require sophisticated routing protocols Security in Ad-Hoc
Networks