Army Security Communication Network - An Review on Inter Tactical Mobile Ad Hoc Network Routing Protocol

Authors

  • Goutham S Tantri  UG Scholar, Department of Electronics and communication, Jawaharlal Nehru National College, Shivammoga, Karnataka, India
  • Manjunatha M J  UG Scholar, Department of Electronics and communication, Jawaharlal Nehru National College, Shivammoga, Karnataka, India

Keywords:

Mission-critical military operations with dismounted soldiers are frequently characterized by high battlefield dynamics. In such scenarios a mobility model can manage soldiers’ movements dynamically especially under enemy attacks. MOBILE armies need mobile communications. Those communications, though, must be secure—and not just from eavesdropping. They also need to be uninterruptible, The battlefield where these equipment are deployed includes a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANETs links. Operational communications tend to provide tactical ad hoc networks some capacities. There is a better broadband radio in UHF band (ex: NATO - 225-400 MHz) and some heterogeneous services such as voice or video are provided. Several Network-layer protocols have been proposed in order to handle inter-domain routing for tactical MANETs. One key factor is the much more dynamic pattern of participation of individual nodes in a MANET. Today’s operations can be much more ad hoc in terms of the use of unmanned vehicles, or airborne assets .This MANET communication networking comes handy in relocating operations, rescue operation and can even be applied in daily civilian usage

Abstract

Mission-critical military operations with dismounted soldiers are frequently characterized by high battlefield dynamics. In such scenarios a mobility model can manage soldiers’ movements dynamically especially under enemy attacks. MOBILE armies need mobile communications. Those communications, though, must be secure—and not just from eavesdropping. They also need to be uninterruptible, The battlefield where these equipment are deployed includes a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANETs links. Operational communications tend to provide tactical ad hoc networks some capacities. There is a better broadband radio in UHF band (ex: NATO - 225-400 MHz) and some heterogeneous services such as voice or video are provided. Several Network-layer protocols have been proposed in order to handle inter-domain routing for tactical MANETs. One key factor is the much more dynamic pattern of participation of individual nodes in a MANET. Today’s operations can be much more ad hoc in terms of the use of unmanned vehicles, or airborne assets .This MANET communication networking comes handy in relocating operations, rescue operation and can even be applied in daily civilian usage

References

  1. Papadimitratos, P. Haas, Z.J , “Secure data communication in mobile adhoc networks” , This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: Feb. 2006,Volume: 24, Issue: 2,On page(s): 343- 356.
  2. Reza Curtmola Cristina Nita-Rotaru, “ BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks” , IEEE Transactions on Mobile Computing, vol. 8,Issue. 4,pp. 445 - 459,February 2009.
  3. A.Tsirigos and Z.J.Hass (2004) , “Analysis of mulitipath routing, Part 1: The effects on the packet delivery ratio” IEEETransactions on Wireless Communication., vol.3, no.2,pp:500-511
  4. Banner, R. Orda, A , “Multipath Routing Algorithms for Congestion Minimization”. This paper appears in: Networking,IEEE/ACM Transactions on Publication Date: April 2007 Volume: 15, Issue: 2,On page(s): 413-424.
  5. P.Papadimitratos and Z.J.Hass, “ Secure Routing For Mobile Ad-Hoc Networks”, in proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS-2002).
  6. Papadimitratos, P. Haas, Z.J and E.G.Sirer , “ Path set selection in mobile ad hoc Networks” ,in Proc 3rd ACM MobiHoc , Lausanne, Switzerland, Jun 2002 ,pp 1-11.
  7. C.Siva Ram Murthy and B.S Manoj.,(2004), “Ad Hoc Wireless Networks- Architecutres and Protocols” , Pearson Education.
  8. Kołodziej J, Khan SU, Wang L, Min-Allah N, Madani SA, Ghani N, Li H (2011) An application of markov jump process model for activity-based indoor mobility prediction in wireless networks.In: 9th IEEE international conference on frontiers of information technology (FIT). Islamabad, pp 51–56 Mobile Netw Appl
  9. Musolesi M, Mascolo C (2009) Mobility models for systems evaluation. A survey. State of the art on middleware for network eccentric and mobile applications (MINEMA).Springer
  10. Mostafi Y (2011) Compressive sensing on mobile computing.IEEE Trans Mob Comput 10(10):1769– 1784
  11. Niewiadomska-Szynkiewicz E, Sikora A (2011) Simulation-based design of self-organising and cooperative networks. Int J Space Based Situated Comput 1(1):68–75
  12. A. Altay Yavuz, F. Alag¨oz , E. Anarım, A new satellite multicast security protocol based on elliptic curve signatures, IEEE International Conference on Information Communication Technologies (ICTTA) , April 2006, Syria.
  13. A. Altay Yavuz, F. Alag¨oz, E. Anarım, Three- Tiers satellite multicast security protocol based on ECMQV and IMC methods, Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD’06),April 2006, Italy.
  14. A. Altay Yavuz, F. Alag¨oz, E. Anarım, NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes, IEEE Globecom Conference, San Francisco, November 2006.
  15. W. Diffie, M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, Vol:.22, No.6, pp. 644–654, Nov. 1976.

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Goutham S Tantri, Manjunatha M J, " Army Security Communication Network - An Review on Inter Tactical Mobile Ad Hoc Network Routing Protocol, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.01-08, September-October-2019.