21
A Project on A SURVEY ON DISASTER RECOVERY USING MANET DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY AND MANAGEMENT Department of Computer Science MASTER OF SCIENCE INCOMPUTER SCIENCE By Ritwik Mukherjee Roll no: 15499016012

Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

A Project on

A SURVEY ON DISASTER RECOVERY USING MANET

DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY AND

MANAGEMENT

Department of Computer Science

MASTER OF SCIENCE INCOMPUTER SCIENCE

By

Ritwik Mukherjee

Roll no: 15499016012

Page 2: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

A Project on

A survey on Disaster recovery using Manet

By

Ritwik Mukherjee

UNDER THE GUIDANCE OF

Mr. TANUMOY NAG

Assistant Professor

Dinabandhu Andrews Institute of Technology & Management

THESIS REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE

REQUIREMENTS FOR THE POST GRADUATE DEGREE

OF

MASTER OF SCIENCE IN COMPUTER SCIENCE

DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY & MANAGEMENT

Session: 2016– 2018.

Roll Number: 15499016012

Registration Number: 16154181001

Page 3: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

ACKNOWLEDGEMENT

I am extremely grateful and remain indebted to our guide Mr. Tanumoy Nag and Mrs. Paromita Roy for being a source of inspiration and for their constant support in the Design, Implementation and Evaluation of the project. We are thankful to them for their constant constrictive criticism and individual suggestions, which benefited us a lot while developing the project on “A Survey on disaster recovery using

MANET”. They have been a constant source of inspiration and motivation for hard work. They have been very co-operative throughout this project work. Through this column, it would be our utmost pleasure to express our warm thanks to them for their encouragement, co-operation and consent without which we mightn’t be able to accomplish this project. We also express our gratitude to

other technical and non technical staff for providing us the infrastructure to carry out the project and to all staff members who were directly and indirectly instrument in enabling us to stay committed for the project.

(Ritwik Mukherjee)

Page 4: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

CERTIFICATE

This is to certify that this Dissertation entitled as........................... ................................. Is done by .......................................... registration / roll number .......................................... of DINABANDHU ANDREWS INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KOLKATA, WESTBENGAL independently under my guidance and supervision for the partial fulfillment of ........................ ................................

Mr. Tanumoy Nag Mrs. Paromita Roy (Assistant professor) (H.O.D)

Page 5: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

TABLE OF CONTENTS 1. Abstract 1

2. Introduction 2

3. Literature survey 5

4. Disaster recovery using routing protocol 9

5. Advantages and disadvantages 12

6. Diagram 13

7. Conclusion & future scope 14

8. Reference 15

Page 6: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

1

1. ABSTRACT

MANET or (Mobile Ad hoc network) is infrastructure less network which posses

characteristics like decentralized administration and very less efforts for setup and

it is also self configuring . Due to this, it is most suitable for many applications like

military opearations, disaster area rescue operation, collaborative computing and

conference meeting where it is not possible to setup wired network or

infrastructure based wireless network. Such as like disaster rescue operation or

disaster recovery model when a disaster occurs it becomes difficult to provide

services in the affected areas due to the lack of communication. All modes of

communication system get damaged and it takes a lot of time to establish an

infrastructure network, this is where ad hoc network comes to play there are certain

features of ad hoc network like infrastructure less architecture, routing protocols,

broadcast method, and energy saving when it is applied to such disaster scenario.

It is necessary to propose a possible practical communication model for developing

ad hoc network configuration technologies.

.

.

Page 7: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

2

2. INTRODUCTION

In this paper we will discuss about modifing a complex existing MANET

architecture to improve communication capabilities and to make a better disaster

recovery model during any disaster which can be natural or man-made.

The wireless network can be categorised as Infrastructured and Infrastructure less.

In Infrastructured wireless networks , the mobile nodes will have mobility during

communication but the base stations are fixed. When the nodes move out of range

of a particular base station, they eventually get into range of another base station.

In Infrastructure less or ad hoc wireless network, the mobile nodes itself will act as

routers and will move while communicating, there will not be fixed base stations

and these mobile nodes can dynamically create new routing channels among

themselves and form their own network on the move.

In catastrophe situations, robust communication systems are needed to rescue the

public and to ensure safety.[3] Instant speedy rescue should be enforced by the

rescue team as the disaster area may further be affected our moto is to ensure that

information should reach the destination timely manner as well as without loss of

any data. So this task is accomplished by improving routing protocols.

Information should reach the destination timely manner as well as without loss of

any data. This task can be done by routing protocols in other words we can say the

routing is the process of it simply carries information about the best path from

router to router instead of not to move data from one end to another therefore

routing is the process of directing packets from source node to destination node

tables. To transfer a packet to next hop certain operations should be needed to

perform like first of all is Packet switching which involves changing a packet's

physical destination address to that of the next hop and the next one is Path

determination which is the process of choosing an optimal route from all the

available routes typically from all the routing information stored in the respective

routing table , routing protocols can be classified as proactive routing protocol ,

reactive routing protocol and hybrid routing protocol.

Page 8: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

3

Proactive Routing Protocols:

A proactive approach to MANET routing implies in this form of routing each

node in the network keeps information of all the nodes contained in the network

seeks to maintain a constantly updation in the topology. The whole network

should, at all times, be known to all nodes. This results in a constant congestion of

routing traffic, but no initial delay in communication. In this routing system those

protocols that require the nodes to continuously evaluate and update the routes.

Eg:

OLSR (Optimized Link State routing):

[5]OLSR is an type of proactive routing protocol used in mobile adhoc network, in

olsr only nodes which are selected as multipoint relay are used for controlling

traffic. It is one of the main system of proactive routing, it working type is that

each node uses its local information to route packets.

Reactive Routing Protocols

Reactive protocols seek to set up routes on-demand. If a node wants to

communicate with a node to which it has no route, the routing protocol will try to

establish secure connection. Reactive Routing Protocols are those routing protocols

in which the nodes does not keep record of other node in the same network. Data is

sent to the destination using the valid route. This type of routing is efficient if the

routes are not often used routes are created only when needed. This requires two

signals called “route discovery” and “route maintenance”.

AODV (Ad-Hoc On-Demand Distance Vector routing protocol):

[6]The Ad-Hoc On-Demand Distance Vector routing protocol is a reactive routing

protocols, and in this protocol the topology information is only transmitted by

nodes when demand. When a node wishes to transmit traffic to a host to which it

has no route, it will generate a route request message that will be spread in a

limited way to other nodes. This causes control traffic overhead, when initiating

such communication, A route is considered found when the route request message

Page 9: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

4

reaches either the destination itself, or an intermediate node with a valid route

entry for the destination is found,

and the last one is

Hybrid routing protocol:

[7]Here, each node maintains the network topology information. Protocols

belonging to this category combine the best features of the above two categories.

In this feature nodes within a certain distance from the node or within a particular

geographical location is concerned,these distance is said to be as routing zone of

the given node. For accomplishing routing within this zone, a table-driven

approach is used, an on-demand approach is used for nodes which are located

beyond this zone.

Zone routing protocol (ZRP) :

It is a hybrid routing protocol which effectively

combines the best features of both proactive and reactive routing protocols. It

divides the network into zones ,It requires extra memory because it built a

hierarchical architecture where it has to keep its each and every network

topological information it keeps routing relation in a specified region called zones

which is done like other routing system of query and reply mechanism.

This different protocols have their own role in rescue operation on the basis of

analyzing the disaster affected area in many ways one way is by the

communication system maintenance in post disaster area in case the

communication system was not damaged still there arises some problem like

network congestion which occurs when a network has to carry more data that

actually it can afford there is a chance of network break down .

It is essential to restore communication networks in large scale disasters

earthquake ,floods, avalanches and landslides by repairing the infrastructure as

Page 10: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

5

quickly as possible and taking appropriate measures to control congestion.

Communication and sharing of information in emergencies are also possible via ad

hoc networks, which take full advantage of the features of wireless communication

including rapid and temporary setup and outstanding terminal portability and

mobility.

Ad hoc networks can enable communication among temporarily assembled user

terminals without relying on the conventional communication infrastructure. [8] In

these types of cases we need to setup a (DAA) disaster area architecture model

which includes several basic facilities like Lighting Arrangement and Generator

Set, Water Facilities, sanitation, Food- Storage & Distribution, Clothing and

Medical Facilities & Psycho-social Support

3.LITERATURE SURVEY

[9] shows the complete difference between the proactive ,reactive and hybrid

routing protocol with their features

Like in case of reactive routing protocol, If a node wants to send a packet to

another node then this protocol searches for the route in an on-demand manner and

establishes the connection between sender and receiver so that they can

communicate with each other it does not keep information about all the nodes and

in case of proactive routing protocol In this every node maintain routing table

which contains the full information of all the nodes present in the network. The

routing tables are updated periodically after a small time interval.

Proactive protocols have large overhead and less latency while reactive protocols

have less overhead and more latency. So a Hybrid protocol is invented to

overcome the shortcomings of both proactive and reactive routing protocols.

A hybrid protocol is suitable for large networks.

Page 11: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

6

[10] Distinguishes between different routing protocols such as Ad-hoc on demand

distance vector routing (AODV) routing is a packet routing protocol used for

dynamic wireless network. It is one of most popular reactive protocol. It is a

collection of mobile nodes without any centralized access point or existing

infrastructure. It provides a free loop, self starting and large number of mobile

nodes. Where, every node maintains the routing information of the every node in

the network by using routing table. In routing table destination address, next level

address and destination sequence number is recorded. Route request (RREQ),

Route reply (RREP) and Route error (RERR) are three types of messages used in

AODV protocol.

The Zone Routing protocol (ZRP) which is an example of hybrid routing protocols

combines the advantages of both reactive and proactive protocol, taking advantage

of proactive discovery within a node's local neighborhood and using a reactive

protocol scheme for communication between this specified neighborhood are

called zones and each node may be of multiple overlapping zones and each zone

may be of different sizes.

Dynamic state routing protocol (DSR) allows the network to be completely self-

organizing and self-configuring, without the need for any existing network

infrastructure or administration. The protocol is composed of the two main

functions called Route Discovery and Route Maintenance, which work together to

allow nodes to discover and maintain routes to arbitrary destinations in the ad hoc

network. In these protocol source is discovered in on demand basis, the sender first

determines the route from source to destination and also it contains the address of

the required node.

DSR protocol comes under proactive routing include easily used for loop-free

routing, operation in networks containing unidirectional links use of only soft state

in routing, and very rapid recovery when routes in the network change. The DSR

protocol is designed mainly for mobile ad hoc networks of up to multiple number

of node and is designed to work well even with very high rates of mobility.

Page 12: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

7

So among these it shows that hybrid routing protocol is better then the rest of two.

In catastrophe situations, robust communication systems are needed to rescue the

public and to ensure safety. Instant speedy rescuing should be enforced by the

rescue team as the disaster area may further be affected by disaster which can be

man made or natural. Due to the fact that preinstalled infrastructure may have been

destroyed by the catastrophe, there is a demand for instant communication systems

independent of such infrastructure. The concept of MANET fills this drawback due

to their infrastructureless and decentralized network system they provide a better

backup than wired system. In these disaster area situations, the users of the newly

developed communication systems need reliable communication. The base station

may be either temporarily fixed and mobile stations can be used. The users will be

civil protection forces or the civil defence forces.

like ambulances ,couches, fire fighters, rescue team, paramedics and many others,

the total function of these area is monitored by routing protocols like AODV

protocol

The main objectives of AODV protocol is to quickly

and dynamically adapt to topological changes .Thus AODV is a pure on-demand

routing protocol. The Control messages used in AODV are: Route Request

Messages, Route Reply Messages, Route Error Message and Route Reply

acknowledgement

In these cases the main working principle is AODV maintains

its path by using control messages in certain types of word such as “HELLO”

messages which in turn is used

to detect the neighbours in connectivity range. If there is a link failure, the route

maintenance scheme was engaged. The control messages are sent at one second

interval and the nodes can tolerate a loss of only 2 control messages and will

declare that link is lost. When a source node has to communicate with destination

node, and it does not have a valid route to the destination, it initiates a path

Page 13: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

8

discovery process to locate the node. It broadcasts a RREQ which is called route

request control packet to its corresponding neighbours,

which in turn forward the request to their corresponding neighbours, and so on, this

technique carries out until the required destination or an intermediate node with a

new route to the destination is located .

Then comes clustering based AODV routing protocol :

[11] [4] A cluster head is represented by an identifier . Clusters are created for the

proposed network disaster model because when network size increases which

causes the number of nodes to be increased causing network overhead the usage of

clustering procedure reduces this problem by the method of localizing route

discovery and maintenance, and a cluster head is elected in order to reduce routing

control overhead and improves network flexibility and scalability. After that the

performance of Clustered AODV is analysed. Cluster or zonal heads are the

important strategy for the routing ,resource allocations and network

managements. The following are the basic working procedure of clustering based

routing :

Internal cluster routing: In this step each node deploys a routing information

about its particular cluster. When a node sends request to its neighbouring

cluster which is its destination using a route request signal and dose not get

a reply the node which sends request understands that the route is broken

or is down. So it maintains a own path among themselves.

Simulation procedure : step by step procedure from creating a network to

accomplish the work of AODV protocol.

Performance analysis using ZBMRP protocol

ZBMRP comes under hybrid routing protocol it works on the besis of two

completely different protocol s that is working in same working zone. The two

Page 14: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

9

routing protocols are Intrazone and the interzone routing protocol the first one

operates inside the specific routing zone internally and learns the minimum

distance and routes to all the nodes within that particular specified zone, and the

second one is based on reactive routing scheme and is used for finding the specific

routes between different routing zones Here the border nodes are referred as

peripheral nodes

Mobility models in MANET:

[12]Mobility models in MANET determine the movements of the nodes in the

considered ad-hoc network. Reference group mobility(RPGM): In this mobility model it has a group leader which determines the group motional behavior the nodes in this group is distributed randomly and the different nodes use their own mobility model, this is generally used movement of crews in disastrous situation.

Random Waypoint Mobility model (RWP): The model is very simple and it is widely used for measuring the performance of MANET, it contains the feature of change in direction and speed and in between them it contains the pause feature of controlling the entire process , after a specific paused time the MANET selects the specific direction in that particular simplified area then another pause time when the time is elapsed it selects another destination.

4.DISASTER RECOVERY USING ROUTING PROTOCOLS

In [13] the recovery model is mentioned as a disaster area is treated as an empty

and open-space area. This assumption is behind

the oversimplified scenarios when studying disaster recovery situations with

MANETs. First, the proposed model will split the disaster area into grids. The area

is going to

be divided into a hexagonal grids, since transmission areas for the node is circular

and the hexagonal is the closer shape to cover circular areas .

Page 15: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

10

Three common algorithms are known in finding the paths in such emergency

situations:

The first algorithm explores in all directions equally. The second

algorithm that seeks the lower cost paths by avoiding

the blocked ways due to the disaster, the trees, enemies near places and others

obstacles.

Lastly, the third one is a modified algorithm of the second. Where it was optimized

for a single location. The first algorithms are Breadth first search algorithm, the

second is Dijkstra’s algorithm and the third one is A* algorithm.

Using such algorithms to filter the locked neighbouring cells that are impossible to

pass.And finally a heuristic function is to be applied to find the distance between

two grids/areas

In the other the recovery model is based on simulation model . The main purpose

of the simulation model is to estimate the performance of four different routing

protocols (AODV, DSR, and ZRP) based on various performance metrics for

MANET in realistic environment scenarios. We have considered a simulation

model based on the concept of mobility models. A disaster affected area has been

considered, three different groups for varying number of nodes are taken. Here in

first, the random movement of the nodes in a single group (Rescue relief

helicopters) is considered RWP and in the second and third group people struck

under the disaster affected areas are taken and RPGM model is applied.

Both of the groups are considered with group mobility with same network

condition. One wireless subnet is taken to provide wireless routes between single

group and multiple groups.

Page 16: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

11

Phases of disaster management:

[14][15] Now a the disaster recovery scenario is developed but for those who

does not own any modern communication device which can be equipped

with mobile ad hoc technology and can be used as a MANET the main phases

of disaster management are

In a pre disaster scenario is also called mitigation it the process of making

people aware about the upcoming situation of the disaster that includes

reducing loss of life and properties and also to locate places where there can

be mass destruction which is accomplished through satellite ,a satellite

surveys about the disaster proned areas and the transevers of the satellite

forward the information to the nearest base station and from there the

message is delivered to the rescue teams and also by announcing through

radio and television to alert the people

In a post disaster scenario the deployed nodes keep informed about the

places where people are trapped does not matter if the communication

system is damaged or not, the active nodes sends the information to to the

nearest base station and from there it is transmitted to the satellite to the

disaster recovery team. And in many places if the mobile adhoc devices

which are detected such as smartphones, tablets and pda the emergency

response team tries to communicate through it .

Immediate response when disaster is approaching: Immediate response is

carried out by the emergency group such as warning and evacuating people ,

search and rescue, providing immediate assistance and also cleared the

affected area. The adhoc network informs the servivors and emergency

response team to locate the survivors and assist the survivors to save

themselves

Page 17: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

12

Preparedness enables the people about how the disaster might affect the

society and the nature of the disaster and to keep them ready about the

disaster .

5.Advantages and disadvantages of MANET:

Advantages:

MANET has infrastructureless , decentralized , shareable , dynamic and

self-organised network.

It is robust, flexible and mobile in nature.

It supports multi hop routing.

It is light weighted terminal.

It does not need to connect with internet to function.

It supports fault tolerance.

It reduces cost since it is free in some cases and works in low power.

Disadvantages:

The power of the battery is limited in some case and needs to renew battery

frequently’

The bandwidth is much lower than wired structure.

The delay may happen when no operation is done by the nodes that means

the nodes are in sleeping mode and suddenly they get the instruction which

requires time to set up.

Certain transmission errors like loss of signal, attenuation, some signals are

consumed by the earth and while passing through building walls the signal

strength gets weak.

Page 18: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

13

6.Diagram

This diagram specifies the necessary disaster recovery model.

Page 19: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

14

7.Conclusion &Future scope:

As an upcoming technology in the field of wireless communication MANET

plays a vital role when there arises certain emergency situation like disasters ,

catastrophies which can be natural like earthquake, tsunami , building collisions

and man made disasters like terrorism the technology of mobile adhoc network

fixes these problems ,it uses different types of disaster recovery scenario and

mobility models like using applications of different routing protocols, mobile

detection nodes which will able to detect and sent signals to satellite to warn

people but still there arises some problem like the energy utilization because the

nodes which are run by batteries cannot retain its power for long time, it doesnot

provide high bandwidth and sometimes provide high attenuation . These are the

problems which is needed to solve.

Page 20: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

15

8.References:

[1]Sam, C. Ramakristanaiah1 R. Praveen. "A Survey on MANETs in Disaster

Rescue Operations."

[2]Boukerche, Azzedine, et al. "Routing protocols in ad hoc networks: A survey."

Computer networks 55.13 (2011): 3032-3080.

[3]Sivagurunathan, S., and K. Prathapchandran. "BEHAVIOUR OF ROUTING

PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR

EMERGENCY AND RESCUE SITUATION IN INDIA."

[4]Kaushik, Gaurav, and Saumya Goyal. "An Clustering based AODV approach

for MANET." Proceeding of International Conference on Emerging Trends in

Engineering and Technology. 2013.

[5]Ruengsatra, Tanapat, et al. "A hybrid communication approach for disaster

recovery system." Software Engineering, Artificial Intelligence, Networking and

Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International

Conference on. IEEE, 2015.

[6] KJ, ABHILASH, and SARIKA TALE. "Energy Efficient MANET based

Emergency Communication Module for Post Disaster Recovery."

[7]Gondaliya, Nikhil, and Dhaval Kathiriya. "An application of ad hoc networks in

disaster area for search and rescue operation: a survery and challenges." International Journal of Advanced Research in Computer and Communication

Engineering 3.3 (2014): 5711-5714.

[8] Mahapatra, R. P., Tanvir Ahmad Abbasi, and Mohd Suhaib Abbasi. "A propose

architecture of manet for disaster area architecture." International journal of

computer theory and engineering 2.1 (2010): 31.

Page 21: Department of Computer Science · Ritwik Mukherjee UNDER THE GUIDANCE OF Mr. TANUMOY NAG Assistant Professor Dinabandhu Andrews Institute of Technology & Management THESIS REPORT

16

[9]Kaur, Prabhleen. "An Overview on MANET-Advantages, Characteristics and

Security Attacks." International Journal of Computer Applications, 4th

International Conference on Advancements in Engineering & Technology (ICAET

2016).

[10] Dhenakaran, Dr SS, and A. Parvathavarthini. "An overview of routing

protocols in mobile ad-hoc network." International Journal of Advanced Research

in Computer Science and Software Engineering 3.2 (2013).

[11]Preetha, V., and K. Chitra. "Performance Evaluation of ZBMRP protocol in

Disaster Recovery Scenario."

[12]Pant, Stuti, et al. "Performance Analysis of Various MANET Routing

Protocols with Change in Number of Nodes over Different Mobility Models."

(2016).

[13]Manaseer, Saher, and AfnanAlawneh. "A New Mobility Model for Ad Hoc

Networks in Disaster Recovery Areas." International Journal of Online

Engineering (iJOE) 13.06 (2017): 113-120.

[14]Anjum, Shaik Shabana, Rafidah Md Noor, and Mohammad Hossein Anisi.

"Survey on MANET based communication scenarios for search and rescue

operations." IT Convergence and Security (ICITCS), 2015 5th International

Conference on. IEEE, 2015.

[15]Dr Deepshikha Aggarwal A Smartphone based Framework for Disaster ManagementIJETSRwww.ijetsr.com ISSN 2394 – 3386Volume 4, Issue 7July

2017