You are previewing Technological Advancements and Applications in Mobile Ad-Hoc Networks.
O'Reilly logo
Technological Advancements and Applications in Mobile Ad-Hoc Networks

Book Description

Mobile ad-hoc networks must be rapidly interoperable, customizable, and quick to adapt to the latest technological advances.Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends offers a current look into the latest research in the field, frameworks for development, and future directions. As mobile networks become more complex, it is vital for researchers, practitioners, and academics alike to stay abreast within the ever-burgeoning field. With a wide range of applications, theories, and use across industrial, commercial, and domestic settings, mobile ad-hoc networks are a topic of vital discussion, and this volume offers the cutting edge developments with contributions from around the world.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. EDITORIAL ADVISORY BOARD
    2. LIST OF REVIEWERS
  5. Dedication
  6. Foreword
  7. Preface
  8. Acknowledgment
  9. Section 1: Mobility Research Models, Issues, and Findings in MANET
    1. Chapter 1: Mobility Prediction and Mobile-aware Routing Protocols in MANETs
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TAXIMONY OF MOBILITY METRICS
      4. 4. SUMMARY AND CONCLUSION
    2. Chapter 2: Multicast Routing Protocols in MANET
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. MULTICAST ROUTING PROBLEM
      4. 3. MULTICAST ROUTING CLASSIFICATIONS
      5. 4. MULTICAST ROUTING PROTOCOLS
      6. 5. CONCLUSION
    3. Chapter 3: Mobility Models for Ad-Hoc Networks
      1. ABSTRACT
      2. 1.1 MOBILITY MODELS
      3. 1.2 IMPORTANCE OF MOBILITY MODELS
      4. 1.3 CLASSIFICATION OF MOBILITY MODELS
      5. 1.5 TEMPORAL DEPENDENCY MODELS
      6. 1.6 SPATIAL DEPENDENCY MODELS
      7. 1.6 GEOGRAPHICAL RESTRICTION MODEL
      8. 1.8 MOBILITY MODEL ANALYSIS METRICS
      9. 1.9 PERFORMANCE ANALYSIS OF MOBILITY MODELS
      10. 1.10 CURRENT TRENDS IN MOBILITY MODELS
      11. 1.11 CONCLUSION
    4. Chapter 4: Broadcasting in Wireless Ad hoc Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND AND PRELIMINARIES
      4. 3. BROADCASTING SCHEMES IN MANET
      5. 4. CONCLUSION AND FUTURE DIRECTIONS
    5. Chapter 5: Connectivity as a Fundamental Characteristic of Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. NETWORK MODEL
      4. NODE CONECTIVITY INDEX
    6. Chapter 6: Overview of Temporally Ordered Routing Algorithm and QOS Components in MANETS
      1. ABSTRACT
      2. OVERVIEW OF TORA
      3. 1. ROUTE ESTABLISHMENT
      4. 2. ROUTE MAINTENANCE
      5. 3. ROUTE ERASING
      6. PROPERTIES OF TORA
      7. QUALITY OF SERVICE IN MANETS
      8. MANET NODE MODEL STRUCTURE OF OPNET
      9. CONCLUSION
  10. Section 2: MANET Protocols
    1. Chapter 7: Topology-based Classification of Multicast Routing Protocols for Mobile Ad hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SOURCE TREE-BASED MANET MULTICAST ROUTING PROTOCOLS
      5. SHARED TREE-BASED MANET MULTICAST ROUTING PROTOCOLS
      6. SOURCE-INITIATED MESH BASED MULTICAST PROTOCOLS
      7. RECEIVER-INITIATED MESH BASED MULTICAST PROTOCOLS
      8. CONCLUSION
      9. FUTURE RESEARCH DIRECTIONS
    2. Chapter 8: Performance Comparison of AODV and DSDV Routing Protocols of MANET
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. PROACTIVE ROUNTING PROTOCOL
      4. 3. REACTIVE ROUNTING PROTOCOL
      5. 4. DESTINATION SEQUENCE DISTANT VECTOR PROTOCOL
      6. 8. PERFORMANCE EVALUATION METRICS
      7. 9. RESULTS
      8. 10. CONCLUSION
    3. Chapter 9: Analyzing Performance of Ad hoc Routing Protocols under Various Constraints
      1. ABSTRACT
      2. INTRODUCTION
      3. CLASSIFICATION OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
      4. PROTOCOL DESCRIPTIONS
      5. METRICS USED FOR ANALYSIS
      6. RESULTS AND DISCUSSION
      7. CONCLUSION
    4. Chapter 10: Overview and Performance Analysis of Ad-Hoc on-Demand Distance Vector Routing Protocol
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SIMULATION STUDY
      5. OPNET
      6. PROGRAM CODE
      7. CONCLUSION
    5. Chapter 11: Environment Design Architecture of MANET
      1. ABSTRACT
      2. 1. INTRODUCTION TO MOBILE NETWORK AND MOBILE AD HOC NETWORK
      3. 2. BACKGROUND
      4. 3. MANET ENVIRONMENT ARCHITECTURE
      5. FUTURE WORK
      6. CONCLUSION
  11. Section 3: MANET Threat and Security
    1. Chapter 12: Key Generation for Wireless Sensor Networks Using Symmetric Balanced Incomplete Block Design
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RELATED WORK
      5. 1. COMBINATORIAL BASED KEY GENERATION
      6. 2. DESIGN AND IMPLEMENTATION
      7. 3. ANALYSIS
      8. 4. RESULTS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. APPENDIX
    2. Chapter 13: Security Issues and Models in Mobile ad hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE PROPOSED MODEL
      5. CONCLUSION
    3. Chapter 14: Incorporating Security and Energy Efficiency for Multimedia Communications in WANets
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. WIRELESS AD HOC NETWORKS AND SECURITY
      4. 3. APPLICATIONS OF WIRELESS MULTIMEDIA NETWORKS
      5. 4. VIDEO COMPRESSION CHARACTERISTICS
      6. 5. RELATED WORKS
      7. 6. SECURE VLC (SECVLC)
      8. 7. PERFORMANCE EVALUATION
      9. CONCLUSION
    4. Chapter 15: Security Threats and Issues with MANET
      1. ABSTRACT
      2. I. INTRODUCTION
      3. II. HOW IS SECURITY IN MANET DIFFERENT?
      4. III. ATTACK MODEL
      5. IV. OVERVIEW OF SECURITY ISSUES AND CHALLENGES IN MANET
      6. VI. FUTURE DIRECTION IN SECURITY ISSUES OF MANET
      7. VII. OPEN PROBLEMS
      8. CONCLUSION
    5. Chapter 16: Security Aware Routing Protocols for Mobile Ad hoc Networks
      1. ABSTRACT
      2. 1.1 INTRODUCTION
      3. 1.2 ROUTING IN MANETS
      4. 1.3 SECURITY PROBLEMS WITH EXISTING AD HOC ROUTING PROTOCOLS
      5. 1.4 SECURITY GOALS
      6. 1.5 ISSUES AND CHALLENGES IN SECURITY PROVISIONING
      7. 1.6 SECURITY ATTACKS ON AD HOC ROUTING PROTOCOLS
      8. MAC LAYER ATTACKS
      9. NETWORK LAYER ATTACKS
      10. TRANSPORT LAYER ATTACKS
      11. APPLICATION LAYER ATTACKS
      12. OTHER ATTACKS
      13. 1.7 SECURITY MECHANISM AND SOLUTIONS
      14. 1.8 SECURE AD HOC ROUTING
      15. 1.10 CONCLUSION
  12. Section 4: Emerging Trends of Research in MANET
    1. Chapter 17: Energy Conservation Issues and Challenges in MANETs
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND INFORMATION
      4. PRELIMINARY
    2. Chapter 18: Modelling WSNs Using OMNeT++
      1. ABSTRACT
      2. INTRODUCTION
      3. WSN BACKGROUND AND MODELLING
      4. SIMULATION TOOLS OVERVIEW: WHY OMNET++ FOR WSNS
      5. USING OMNET++ TO MODEL WSNS: CONCEPT AND DISCUSSIONS
      6. CONCLUSION
      7. FUTURE RESEARCH
    3. Chapter 19: Data Fusion in Wireless Sensor Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUD: CLASSIFICATION OF DATA FUSION
      4. 4. DATA FUSION MODELS AND ARCHITECTURES
      5. 5. PERFORMANCE EVALUATION OF DATA FUSION SYSTEMS
      6. 6. FUTURE CONSIDERATIONS
      7. 7. CONCLUSION
    4. Chapter 20: Agility Improvement in Cognitive Radio under Bluetooth Paradigm Using Ant Colony Metaphor
      1. ABSTRACT
      2. 1. INTRODUCTION AND BACKGROUND
      3. 2. BACKGROUND
      4. 3. COGNITIVE RADIO PROTOCOL: COMPONENTS AND FUNCTIONS
      5. 4. AGILITY MANAGEMENT IN COGNITIVE RADIO FOR BLUETOOTH
      6. 5. ANT COLONY OPTIMIZATION: A STEP TOWARDS BIO-INSPIRED COMPUTING
      7. 6. OPEN RESEARCH CHALLENGES IN BIO-INSPIRED COGNITIVE RADIOS
      8. 7. CONCLUSION
    5. Chapter 21: Potential Area of Research in MANET
      1. ABSTRACT
      2. I. INTRODUCTION
      3. II. ROUTING IN MANET
      4. III. QUALITY OF SERVICE IN MANET
      5. IV. BATTERY POWER AND ENERGY MANAGEMENT IN MANET
      6. V. SECURITY IN MANET
      7. VI. RECENT RESEARCH AREAS IN MANET
      8. VII. OPEN PROBLEMS IN MANET
      9. CONCLUSION
    6. Chapter 22: SimuMANET
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SIMUMANET: OPEN SOURCE SOFTWARE TOOLS
      5. SIMUMANET: TOOL DEVELOPMENT
      6. SIMUMANET: CASE STUDIES
  13. Compilation of References
  14. About the Contributors