Abstract

A Mobile Ad-hoc Network (MANET) is a group of wireless mobile nodes that dynamically form a network without any pre-established infrastructure or centralized administration, Soewito (2014). Some network hops may be needed to send a packet from one node to another node in the MANET. To do the communication between the nodes, a route has to be selected in the network, therefore it need a routing protocol that manage selection of the route. Selection route in mobile ad-hoc network is not easy because nodes always move so that the topology of network always changed every time. This is a big issue in selection route in mobile ad-hoc network because the route can be broken anytime. Moreover, MANET is more vulnerable than other wireless communication types because every mobile node serves as both the host and the router and forwards packets on behalf of each other. This study presents the analyzing and evaluation several routing algorithms and a novel scheme to build an authentication system by adding the modified zero knowledge proof algorithm to each mobile node in MANET.

Highlights

  • The mobile ad hoc network consists of wireless devices faced with a situation that a serious disaster has occurred that can communicate each other

  • In this research we analyzed several famous routing protocols in ad-hoc network and we introduced the modified zero knowledge proof algorithm to build an authentication system in wireless ad hoc network

  • To simulate and evaluate the authentication system and performance routing protocols, some experiments have been done by simulation ad hoc network

Read more

Summary

Introduction

The mobile ad hoc network consists of wireless devices faced with a situation that a serious disaster has occurred that can communicate each other. To (GPS), Personal Digital Assistant (PDA), smart phone, tab, help the people in that area ambulance service, fire a vehicle with mobile terminals, or any other devices service, the national Self-Defense Forces and police will capable of sending and/or receiving data generated by other rush come to the disaster site. Every vehicle that they mobile nodes on the network.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.