Published October 30, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Proposed Mutual Exclusion MAC Protocol for MANET to Overcome Hidden and Exposed Terminal Problem

  • 1. Professor, Department of Computer Science and Business System, Panimalar Engineering College, Chennai (Tamil Nadu), India. Post Doctorial Research Fellow, Manipur International University, Imphal, Manipur, India.
  • 1. Professor, Department of Computer Science and Business System, Panimalar Engineering College, Chennai (Tamil Nadu), India. Post Doctorial Research Fellow, Manipur International University, Imphal, Manipur, India.
  • 2. PhD, DSc Vice Chancellor and Professor, Manipur International University, Imphal, Manipur, India.
  • 3. CTO & amp; amp; Dean Innovation, Manipur International University, Imphal, Manipur, India.

Description

Abstract: Mobile Adhoc Network (MANET) is a kind of wireless transmission network could able to form the communication network without need of any basic infrastructure with all the communication nodes can able to move freely ad communication could be done b forwarding the received packet from one node to another nodes in order to reach until the desired destination node found. One of the major challenges in MANET is nodes can move freely from one region to another region where the possibilities route failure and collision among the node. Especially the of Hidden and exposed node problem is the major challenges in the MANET which could not able to define the permanent solution to resolve the issue. This research article focus on hidden and Exposed terminal problem in MAC layer and proposed the new protocol called the Mutual Exclusion MAC protocol (ME- MAC) which support to solve the Hidden and Exposed Terminal issue in MAC layer.

Files

F42380812623.pdf

Files (392.2 kB)

Name Size Download all
md5:588b6bac73931cee3f430a9369189b21
392.2 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2023-10-15
Manuscript received on 22 June 2022 | Revised Manuscript received on 08 August 2023 | Manuscript Accepted on 15 October 2023 | Manuscript published on 30 October 2023

References

  • R. Ramanathan and J. Redi,9 (2002) "A Brief Overview of ad hoc networks: challenges and Directions," IEEE Commun. Mag., vol. 40, no. 5, May. 2002. https://doi.org/10.1109/MCOM.2002.1006968
  • Dr. James A. ,Joseph P. Macker Freebersyser, Advanced Technology Office Defense Advanced Research Projects Agency, " Overview of CBMANET, ITMANET for WAND proposer Day meeting" Feb27, 2007
  • Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong (2012)," A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks" in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008
  • Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, (2010)"COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS" JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.
  • Ms. Ritu Patidar, Prof. Dinesh Chandra Jain,(2012) " Solving the Hidden Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Adhoc Networks" ijarcsse, Volume 2, Issue 5, May 2012.
  • CaiZ J Lu M, Wang X D. Channel access-based self-organized clustering in ad hoc networks. IEEETransactions on Mobile Computing 2003; 2(2): 102-113. https://doi.org/10.1109/TMC.2003.1217231
  • Khaled H. Almotairi and Xuemin (Sherman) Shen, "Multichannel medium access control for adhoc wireless networks" WIRELESS COMMUNICATIONS AND MOBILE COMPUTING(2011). https://doi.org/10.1002/wcm.1159
  • Ketema Adere, Rammurthy, "Solving the Hidden and Exposed Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Sensor Networks" 7th International Conference on Wireless and Optical Communication Networks, Colombo(2010). https://doi.org/10.1109/WOCN.2010.5587352
  • Ki Hong Kim, Daejeon, Korea, "Security Attack based on Control Packet Vulnerability in Cooperative Wireless Networks" The Ninth International Conference on Networking and Services 2013.
  • Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong," A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks" in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008
  • Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, "COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS" JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.
  • Chen J, Sheu S, Yang C. A new multichannel access protocol for IEEE 802.11 ad hoc wireless LANs.Proc IEEE PIMRC 2003. 2003; 2291-2296.
  • Liu K, Wong T, Li J, et al. Performance analysis of UPMA protocol for wireless multihop mobile ad hoc networks. Proc IEEE WCNC 2003. 2003; 971-976.
  • Liu Kai*, Xing Xiaoqin, "A New Exposed-terminal-free MAC Protocol for Multi-hop Wireless Networks" Chinese Journal of Aeronautics 22(2009) 285-292. https://doi.org/10.1016/S1000-9361(08)60101-6
  • Lu Wang, Kaishun Wu,Mounir Hamdi, "Attached-RTS: Eliminating Exposed Terminal Problem in Wireless Networks" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,2012. https://doi.org/10.1109/TPDS.2012.228
  • M. V. Madhuri and Dr. M. V. Sangameswar, "Encryption Technique to Optimize Information Leakage in Multi Cloud Storage Services," International Journal of Engineering and Advanced Technology, vol. 8, no. 6s. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 1078–1081, Sep. 06, 2019. doi: 10.35940/ijeat.f1002.0886s19. Available: http://dx.doi.org/10.35940/ijeat.F1002.0886S19
  • S. Chandolu, P. S. Naidu, and S. Sindhe, "Secure Energy Trade-off Analysis in Wireless Ad-Hoc Networks using Novel Scalable & Secure Management Procedure," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 3. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 469–473, Sep. 30, 2019. doi: 10.35940/ijrte.a1018.098319. Available: http://dx.doi.org/10.35940/ijrte.A1018.098319
  • A. Chitransh and B. S. Kalyan, "ARM Microcontroller Based Wireless Industrial Automation System," Indian Journal of Microprocessors and Microcontroller, vol. 1, no. 2. Lattice Science Publication (LSP), pp. 8–11, Sep. 10, 2021. doi: 10.54105/ijmm.b1705.091221. Available: http://dx.doi.org/10.54105/ijmm.B1705.091221
  • Dr. A. M. Shamiulla*, "Role of Artificial Intelligence in Cyber Security," International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 1. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 4628–4630, Nov. 30, 2019. doi: 10.35940/ijitee.a6115.119119. Available: http://dx.doi.org/10.35940/ijitee.A6115.119119
  • H. Koli and Prof. M. P. S. Chawla, "Comparative Study of Electric Vehicle Battery Systems with Lithium-Ion and Solid State Batteries," International Journal of Emerging Science and Engineering, vol. 10, no. 10. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 1–6, Sep. 30, 2022. doi: 10.35940/ijese.i2540.09101022. Available: http://dx.doi.org/10.35940/ijese.I2540.09101022