A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Parminder
- Reputation Based Routing Protocol with Improved Performance
Authors
1 ECE Department, SSIET, Derabassi, Punjab, IN
Source
Indian Journal of Innovations and Developments, Vol 5, No 12 (2016), Pagination: 1-7Abstract
Objectives: Due to the advancements in the technology, security while transmission becomes a crucial part. So there is a need to design a new protocol that is more efficient than the traditional protocol, and should consider both security and packet delivery ratio along with some other parameters. With this intention, a new technique is proposed which considered the data rates and the security issues.
Methods/Statistical analysis: An improved version of HRARAN protocol is used in order to obtain a secure and reputed transmission in a network which is based on public key cryptography and reputation techniques. Reputation value of a node is used to know whether the node is able to cooperate in a network or not which is calculated by the past behavior of individual nodes. Thus, in such case a cooperative node in the network has highest reputation value. Value in the routing table upgrades after packet reaches at the destination.
Findings: Traditional approach does not perform accordingly in terms of accuracy and packet delivery ratio, which is only 62.3 as compared to the proposed approach in which PDR is high i.e. 76.3. Moreover, PDR defines the number of packet reach at the destination and it can be concluded that in the proposed approach packets reach more in improved HRARAN. Considering another parameter i.e. packet loss in the existing and proposed HRARAN is 754 and 474 respectively which concludes that accuracy of the improved HRARAN is high.
Improvements/Applications: The protocols can be improved by:
• Increasing number of quality parameters in order to selecting the best path.
• Optimization algorithms can be employed for finding out the optimized path for routing.
Keywords
Reputation Value, Packet Loss, MANET, HRARAN, Routing Protocols, Path Loss.References
- C. Atheeq, M.M.A Rabbani. Secure data transmission in integrated internet MANETs based on effective trusted knowledge algorithm. Indian Journal of Science and Technology. 2016; 9(47), 1-7.
- A. Vangili, K. Thangadurai. Detection of black hole attack in mobile ad-hoc networks using ant colony optimization – simulation analysis. Indian Journal of Science and Technology. 2015; 8(13), 1-10.
- C. Joseph, P.C. Kishoreraja, R. Baskar, M. Reji. Performance evaluation of MANETs under black hole attack for different network scenarios. Indian Journal of Science and Technology. 2015; 8(29), 1-10.
- A. Shitalkumar, V.T. Raisinghani. LUNAR: Working and performance evaluation in MANETs. Indian Journal of Science and Technology. 2016; 9(45), 1-18.
- J. Deny, M. Sundhararajan. Multi modal biometric security for mobile ad-hoc networks and its applications. Indian Journal of Science and Technology. 2016; 9(42), 1-6.
- K. Vijayakumar, K. Somasundaram. Study on Reliable and Secure Routing Protocols on Manet. Indian Journal of Science and Technology. 2016; 9(14), 1-10.
- A. Hinds, M. Ngulube, S. Zhu, H. Al-Aqrabi. A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET). International Journal of Information and Education Technology. 2013; 3(1), 1-5.
- P.T. Kasthuri, M. Sundararajan. Performance efficiency of OLSR and AODV protocols in Manets. International Journal of Information and Education Technology. 2015; 8(14), 1-4.
- V. Kärpijoki. Security in Ad Hoc Networks. Seminar on Network Security. 2000, 1-16.
- G. Usha, S. Kannimuthu, G. D. Karthik. Survey of single and cross layer security in MANET. International Journal of Information and Education Technology. 2016; 9(41), 1-9.
- S.S. Jabamani, E. Rajinikanth. Integrity key based mechanism to debase packet dropping in MANETs. International Journal of Information and Education Technology. 2016; 9(14), 1-4.
- I. Vijaya, A.K. Rath, B. Puthal. Exploration of security threat analysis in Wireless Mobile Adhoc Network. International Journal of Information and Education Technology. 2016; 9(35), 1-11.
- D. Bandral, R. Aggarwal. Simulation analysis of AODV and DSDV routing protocols for improving quality of service in MANET. International Journal of Information and Education Technology. 2016; 9(32), 1-5.
- A. Nedumaran, V. Jeyalakshmi. CAERP: A congestion and energy aware routing protocol for Mobile Ad Hoc Network. International Journal of Information and Education Technology. 2015; 8(35), 1-6.
- T. Ahamad , A. Aljumah. Detection and defense mechanism against DDoS in MANET. International Journal of Information and Education Technology. 2015; 8(33), 1-4.
- D.S. Kumari, K.T. Sikamani. Communication based clustering to detect selfish nodes in MANET. International Journal of Information and Education Technology. 2015; 8(20), 1-6.
- S.J. Sultanuddin, A. Hussain. Shortest and efficient multipath routing in Mobile ad hoc Network (MANET). International Journal of Information and Education Technology. 2016; 9(45), 1-9.
- M. Vinoth, S. Omkumar. LOMAN – A new design for implementation of the MANET protocol over IOT environment. International Journal of Information and Education Technology. 2016; 9(35), 1-7.
- G. Suseendran, A. Sasikumar. Secure intrusion-detection system in Mobile Adhoc Networks. International Journal of Information and Education Technology. 2016; 9(19), 1-6.
- M. Angu, S. Anand. Detection and avoidance of gray hole attack in Mobile Ad-Hoc Network. International Journal of Information and Education Technology. 2016; 9(47), 1-6.