0% found this document useful (0 votes)
4 views5 pages

Article On Cloud

The article presents a robust gateway detection approach for enhancing internet access in Mobile Ad Hoc Networks (MANETs), focusing on identifying the capacity of gateways to manage mobile devices effectively. It discusses the importance of security in decentralized networks and the role of trust-based systems, cryptographic measures, and Network Function Virtualization (NFV) in improving network management and service delivery. The study emphasizes the need for proactive routing protocols and the evaluation of performance metrics to optimize the functionality of MANETs.

Uploaded by

talk2aps
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views5 pages

Article On Cloud

The article presents a robust gateway detection approach for enhancing internet access in Mobile Ad Hoc Networks (MANETs), focusing on identifying the capacity of gateways to manage mobile devices effectively. It discusses the importance of security in decentralized networks and the role of trust-based systems, cryptographic measures, and Network Function Virtualization (NFV) in improving network management and service delivery. The study emphasizes the need for proactive routing protocols and the evaluation of performance metrics to optimize the functionality of MANETs.

Uploaded by

talk2aps
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal on Recent and Innovation Trends in Computing and Communication

ISSN: 2321-8169 Volume: 11 Issue: 9


Article Received: 25 July 2023 Revised: 12 September 2023 Accepted: 30 September 2023
___________________________________________________________________________________________________________________

Enhanced Internet Access in MANETs: A Robust and


Efficient Gateway Detection Approach with Amplified
Backing
1
Atma Prakash Singh, 2Dr. Santosh Kumar, 3Dinesh Kumar Singh
1
Ph.D. Research Scholar, Maharishi University of Information Technology Lucknow
2
Professor, Maharishi University of Information Technology Lucknow
3
Department of Information Technology,Dr. Shakuntala Mishra National rehabilitation University, Lucknow.

Abstract
When a certain gateway is connected to a significant number of mobile devices, the quality of service begins to decline. As a result,
we propose that the number of mobile devices up to which a specific gateway performs well within expectations be identified, and
that this number be referred to as the gateway's capacity. The capacity of each node should then be verified in the optimum gateway
discovery protocol before connecting to the gateway for the best results. Trust-based systems might help protect decentralised, self-
organized networks like dedicated cellular carriers and dedicated vehicle networks against insider attacks. To guard against external
threats, A/V encryption and access control might be utilised. Cryptographic systems, for example, are prevention-focused.

Key Words : Cloud computing , MANET, NFV.

1. Introduction : Ad hoc networks have been developed A variety of security issues affect the architecture of each
over the years and are used in both military and civilian layer in each type of network, from wired and centralized to
environments. The evolution of ad hoc networks will affect decentralized, mobile, and self-organizing wireless networks.
people's ways of life in the future. As an example of how As our modern and interconnected society increasingly relies
MANET can be used to improve people's daily commutes, on the Internet, security has become an increasingly important
think about how people's perceptions of road conditions have issue since its rapid ascent in the 1990s. Many cryptographic
changed. Meanwhile, innovations such as network function research efforts have been made to find solutions to these
virtualization are causing fundamental change in the way security problems, and the resulting techniques are often
networks are designed and managed. The ad hoc network referred to as prevention-based mechanisms or hard protection
service and architecture have been improved, accelerating the systems. Attackers will always find a way to circumvent
development of ad hoc network applications. One day, all security measures, no matter how well designed they are. If
digital software will have dedicated networking capabilities. It hackers can bypass the network's first defences, these
is common for people to use services without giving much measures will be ineffective. As a result, soft protection
thought to the networks and/or technologies that make this technologies (detection-based technologies) are created to
possible. Dr. Mark Weiser, an early advocate of pervasive further improve network security. Over the past few years,
computing, claimed that the "peaceful technological age, trust-based systems have received considerable attention as a
when technology recedes into the background of human life," potentially profitable innovation-based strategy for network
[3] has arrived. In order to provide the best possible service, security. Here are four important advantages of trust- based
the provider must ensure that their customers do not know systems.
how their data is being sent or stored. The day will come
when IT help will be as common as cable or telephone. 2. Cloud Computing and NFV in MANET:
There is no shortage of supply, it's always there so no one
notices it doesn't exist.To achieve this ambitious goal, security Cloud computing's flexibility and adaptability mean that even
in computer networks should be prioritized as a research field. the tiniest businesses may eventually make use of the same

2403
IJRITCC | September 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 9
Article Received: 25 July 2023 Revised: 12 September 2023 Accepted: 30 September 2023
___________________________________________________________________________________________________________________

resources that were formerly reserved for the larger ones. mention independent programmers and open-source
Because of this, using computers is both straightforward and communities, purchase project management services from the
energy-efficient [4]. Because of its adaptability to satisfy the software industry. Cloud-based application creation,
fluctuating needs of the market, cloud computing is deployment, and management are made possible to some part
increasingly being seen as a public utility. by "platform as a service" (PaaS). A good example is
The word "cloud" must be defined before any discussion of Google's App Engine [9], which offers a server platform for
"cloud computing" can begin. Using "an infrastructure that customers to host Java, Python, or PHP programs. Customers
contains both computer hardware and the operating systems that use Infrastructure as a Service have access to every
and applications that operate on that hardware," [5] is how the utility. Accessing cloud services does not restrict the
term "cloud computing" is defined. Without the hardware and operating system a user may be using. Windows Azure [10]
software that powers the data centre, the cloud would be provides this kind of service and is capable of running a wide
useless. Customers may be required to pay a fee if the data variety of operating systems to meet the needs of its users. All
centre’s owner decides to restrict access to certain apps. The of these different categories of cloud services depend
cloud computing community has settled on three common significantly on virtualization. The networking sector will
service categories [6]. "Software as a service," or SaaS, refers undergo significant changes as a result of NFV. Because it
to a model in which software is hosted remotely and made gives telecommunications firms, who play a crucial role
available to users through the internet. One such service is in the network service business, the flexibility to meet the
Dropbox [7], which allows users to store and share files on the evolving demands of their clientele. There is also the
cloud. Customers may choose from a number of storage flexibility for NFV- based network services to suit the needs
packages that range in price. As a version control service, of the future.
GitHub is available [8]. Businesses of various sizes, not to

Figure 1: The transition from traditional networking hardware to NFV reduces costs [1]. NFV allows for fine-grained customisation
and software-like flexibility in the delivery of network services. By increasing the scalability of network services, Network Function
Virtualization (NFV) paves the way for the implementation of new business models.

By using a network hypervisor [11] similar to a virtual isolating, and sharing, even the most fundamental of
machine's hypervisor, NFV moves the core network functions physical networks may be virtualized. The NFV design may
formerly incorporated into network devices to the higher- be seen in Fig. 1. Commercial value is brought to the
level software. By virtualizing networks, we may be able to customer through the network service. This component
get a fresh perspective on these systems. In other words, it includes all the functionality required and meets all the
"digitizes" the real-world asset [12]. With abstraction, slicing, requirements. Network services need NFV management and

2404
IJRITCC | September 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 9
Article Received: 25 July 2023 Revised: 12 September 2023 Accepted: 30 September 2023
___________________________________________________________________________________________________________________

orchestration in order to create and convert to lower layer VNF life-cycle management allocates resources to each VNF
VNFs. Virtualized network functions (VNFs) include during deployment. Aside from that, the VNF life-cycle
firewalls and routing protocols. Each VNF's deployment and management monitors
management is handled by a VNF life-cycle manager. The

Figure 2.: Organizational Network Function Virtualization Architecture [2].

In general, VNFs. Corrective actions and VNF scalability central administration. Send the client (the vehicle node) to
adjustments may be implemented through the VNF life-cycle the gateway first, and if you receive an acknowledgement
management. NFV management and orchestration rely on the and can locate it nearby, you can send the vehicle node a
VNF life-cycle manager to carry out business logic. request to get data and receive an acknowledgement that is
Provisioning of additional virtual resources including tied to a routing table or register. Request messages CV REQ
computation, storage, and network is made possible thanks to GW are broadcast to all gateways within the client mobile's or
the NFV infrastructure module's backing of VNFs. An client vehicle's (CV) hearing range. When a request is made,
essential part of the NFV architecture, the virtualization the gateway closest to the client responds and chooses to act
platform abstracts away the need for physical resources. The as the internet portal up until it becomes overloaded, at which
term "hypervisor" is occasionally used to describe this level. point it sends the requesting client an acknowledgement
OpenStack [6], VMware vCenter [7], and Amazon Web message (GW ACK). The closest gateway is chosen as the
Services optimal gateway to service the client vehicle after it is
[8] are all parts of this framework. The virtualized overloaded. Then CV sends a message with the request for
infrastructure manager is a piece of software responsible for data CV REQ DATA through the chosen gateway. The ACK
overseeing the NFV infrastructure. DATA message is sent by the cloud to inform the requesting
CV whether the requested data is available or not. When the
3. Result and Conclusion: Create a MANET using the client vehicle is prepared to accept data and receives
proactive demand affirmation routing protocol, and then use acknowledgement, it sends the message CV RDY DATA
GloMoSim to facilitate peer-to-peer communication within to the cloud. Following that, Table driven (Proactive)
the ad-hoc network. Before choosing an intergateway Routing protocols—On demand (Reactive) Routing
connection, the gateway is examined without the use of a protocols—list out destinations routing by regularly

2405
IJRITCC | September 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 9
Article Received: 25 July 2023 Revised: 12 September 2023 Accepted: 30 September 2023
___________________________________________________________________________________________________________________

dispersing routing tables demand by flooding Apply all of following parameters using the calculations.
these techniques to the MANET network and measure the

Figure 3. -#QoS qos=(PacketShaper/10)*100Quality of service vs no of node

Figure 4. network end to end delay vs no of nodedely=Length of packets Following that, Table driven (Proactive) Routing
protocols—On demand (Reactive) Routing protocols—list out destinations routing by regularly dispersing routing tables
demand by flooding Apply all of these techniques to the MANET network and measure the following parameters using the
calculations.

References: management for mobile ad hoc networks,” IEEE


[1] “Network functions virtualisaztion (NFV); NFV Communications Surveys and Tutorials, vol. 13, no. 4,
security; problem statement.” website: pp. 562–583, 2011.
http://www.etsi.org. [5] T. Clausen and P. Jacquet, “Optimized link state routing
[2] “Network functions virtualisaztion (NFV): protocol (OLSR),” IETF RFC 3626, Oct. 2003.
Architectural framework.” website: [6] T. Clausen, C. Dearlove, and P. Jacquet, “The optimized
http://www.etsi.org. link state routing protocol version 2,” IETF draft-ietf-
[3] M. Weiser, “The computer for the 21st century,” manet-olsrv2-13, Oct. 2011.
SIGMOBILE Mob. Comput. Commun. Rev., vol. 3, pp. [7] “Qualnet simulator.” website: http://www.scalable-
3–11, July 1999. networks.com/content/.
[4] J. H. Cho, A. Swami, and I. R. Chen, “A survey on trust [8] D. Heckerman, “A tutorial on learning with bayesian

2406
IJRITCC | September 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 9
Article Received: 25 July 2023 Revised: 12 September 2023 Accepted: 30 September 2023
___________________________________________________________________________________________________________________

networks,” Microsoft Research Report MSR-TR-95-06, [23] C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P.
1995. Muhlethaler, and D. Raffo, “Securing the OLSR
[9] M. Momani, S. Challa, and R. Alhmouz, “BNWSN: protocol,” in Proc. 2nd IFIP Annual Mediterranean Ad
Bayesian network trust model for wireless sensor Hoc Networking Workshop (Med-Hoc-Net 2003),
networks,” in Proc. MIC CCA’08, (Amman), Aug.2008. (Mahdia, Tunisia), Jun. 2003.
[10] C. T. Nguyen, O. Camp, and S. Loiseau, “A Bayesian [24] T. Clausen and U. Herberg, “Vulnerability analysis of
network based trust model for improving collaboration the optimized link state routing protocol version 2
in mobile ad hoc networks,” in Proc. IEEE Research, (OLSRv2),” in Proc. IEEE WCNIS’10, (Beijing, China),
Innovation and Vision for the Future, (Hanoi, Vietnam), Feb. 2010.
Mar. 2007. [25] H. Deng, W. Li, and D. Agrawal, “Routing security in
[11] Y. Wang and J. Vassileva, “Bayesian network trust wireless ad hoc networks,” IEEE Comm. Mag., vol. 40,
model in peer-to-peer networks,” in Proc. AAMAS’03, no. 10, pp. 70–75, 2002.
(Melbourne, Australia), Jul. 2003. [26] C. Adjih, D. Raffo, and P. Muhlethaler, “Attacks against
[12] J. Pearl, Probabilistic Reasoning in Intelligent Systems: OLSR: distributed key management for security,” in
Networks of Plausible Inference. Morgan Kaufmann, Proc. 2nd OLSR Workshop, (Domaine de Voluceau,
1988. France), Dec. 2005.
[13] G. Shafer and J. Pearl, Readings in Uncertain [27] F. Cunha, L. Villas, A. Boukerche, G. Maia, A. Viana,
Reasoning. Morgan Kaufmann, 1990. R. A. Mini, and A. A. Loureiro, “Data communication in
[14] B. Yu and M. P. Singh, “An evidential model of MANET,” Ad Hoc Netw., vol. 44, pp. 90–103, July
distributed reputation management,” in Proc. ACM 2016.
AAMAS’02, (Bologna, Italy), Jul. 2002. [28] J. M. III, Cognitive Radio: An Integrated Agent
[15] H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, “Sensor Architecture for Software Defined Radio. KTH, 2000.
fusion using DempsterShafer theory,” in Proc. IEEE [29] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz,
Instrumentation and Measurement Technology Conf., A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I.
(Alaska, USA), May 2002. Stoica, and M. Zaharia, “A view of cloud computing,”
[16] J. Y. Halpern, Reasoning about Uncertainty. The MIT Commun. ACM, vol. 53, pp. 50–58, Apr. 2010.
Press, 2003.
[17] F. R. Yu, H. Tang, M. Huang, Z. Li, and P. C. Mason,
“Defense against spectrum sensing data falsification
attacks in mobile ad hoc networks with cognitive
radios,” in Proc. IEEE MilCom’09, (Boston, MA, USA),
Oct. 2009.
[18] S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic,
Mobile Ad Hoc Networking: The Cutting Edge
Directions, 2nd Edition. Wiley-IEEE Press, 2013.
[19] J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc
Networks: Current Status and Future Trends. CRC
Press, 2011.
[20] D. Johnson, Y. Hu, and D. Maltz, “The dynamic source
routing protocol (DSR) for mobile ad hoc networks for
ipv4,” IETF RFC 4728, Feb. 2007.
[21] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-
demand distance vector (AODV) routing,” IETF RFC
3561, Jul. 2003.
[22] T. Clausen, C. Dearlove, and J. Dean, “Mobile ad hoc
network (MANET) neighborhood discovery protocol
(NHDP),” IETF RFC 6130, Apr. 2011.

2407
IJRITCC | September 2023, Available @ http://www.ijritcc.org

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy