Analysis of Exposed Node Problem and Security Concerns in Adhoc Networks
Home >
2010,
Vol. 1 No. 1 > Analysis of Exposed Node Problem and Security Concerns in Adhoc Networks
Authors
- T. L. SingalChitkara Institute of Engineering and Technology, Rajpura, Punjab
- Prachi SharmaInfosys Technologies Ltd., Mysore
- Ravneet KaurInfosys Technologies Ltd., Mysore
Keywords
Exposed node, Adhoc network, Simulator, MANET GloMoSim, AODV, CSMA
Abstract
“The paper contains the analysis of exposed node problem in mobile adhoc network. The problem is that before starting the transmission, a station wants to know whether there is activity around the receiver. If the transmission is taking place around the receiver, there will be collisions and the effective throughput will be decreased. A detailed study of the simulation on these exposed nodes is carried out using the GloMoSim software to calculate the throughput for the various transmission powers and different protocols, so as to compare the performances by varying different parameters. These simulation results with GloMoSim corroborate our theoretical analysis.”
References
- ANSI/IEEE Standards 802.11, (1999) ‘Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications’.
- Bhargava, S. and Agrawal, D.P. (2001) ‘Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks’, Vehicular Technology Conference, 7-11 Oct., Atlantic City, NJ.
- Gummalla, C.V. and Limb, J.O. (2000) ‘Wireless medium access control protocols,’ IEEE Communications Surveys & Tutorials, 3, 2-15.
- Saeed, M. J., Merabti, M. and Skwith, R.J. (2007) ‘Route Maintenance in Wireless Ad Hoc Networks’, paper presented at PGNet2007, 28-29 June, Liverpool John Moores University.
- Talukdar, A.K. and Yawagal, R. (2005) ‘Mobile Computing’, (1st Ed), Tata Macgraw Hill, pp 324-326.
- URL:http://pcl.cs.ucla.edu/projects/glomosim
- URL:http://www.isi.edu/nsam/ns
- Xu, K., Gerla, M. and Bae, S. (2002) ‘How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?’,IEEE Globecom’02, 17-21 November, California University, Los Angeles, USA.
- Xu, K., Gerla, M. and Bae, S. (2003) ‘Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks’, 1, 107-123.
- Zhang, Y. and Lee, W. (2000) ‘Intrusion Detection in Wireless Ad Hoc Networks,’ 6th International Conference on Mobile Computing and Network, 6-11 August, pp. 275–283.
How to Cite
T. L. Singal, Prachi Sharma, Ravneet Kaur. Analysis of Exposed Node Problem and Security Concerns in Adhoc Networks.
J.Technol. Manag. Grow. Econ.. 2023, 01, 103-112