Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kasthuri Bai, P. T.
- Performance Efficiency of OLSR and AODV Protocols in Manets
Abstract Views :269 |
PDF Views:0
Authors
Affiliations
1 Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
1 Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 14 (2015), Pagination:Abstract
Objectives: Comparison of performance efficiency of AODV and OLSR routing protocol in MANETs using NS2 tool. The parameters considered and compared for throughput, packet delivery ratio, energy spent and delays. Methods/Analysis: Using NS2, first a sample of 50 nodes was generated and moved move randomly. Dynamic clustering was done within the sample area of 500x500sq.m. 50 nodes were set up as sink nodes and attached a local agent and loss monitor for each node. These nodes were positioned in the sample area. The nodes 17, 28, 35 were set up as source and nodes were set up as destination for transmission of packets, respectively. Findings: The four performance measures were: Energy spent, PDR, end-to-end delay and throughput with number of nodes as constant (50) and with different speed (time) of node like 2,4,6,8,10s are taken for comparison. Transmission of packet was tested using AODV and the performance metrics are traced. Similarly the performance metrics were tested with OLSR protocol. The values were tabulated and a graph was generated for each metric in Y-axis and time in X-axis. Novelty of the Study: A VMware workstation was installed and tested in unix environment using tool command language the modules were created in vi editor. They were executed using ns command. This paper is main module. Further malicious node detection and elimination was done to still prove OLSR outperforms than AODV. Conclusion: In all the above four metrics the OLSR protocol performance is efficient than AODV when data transmission occurs between nodes in MANETs. From the results obtained we can observe OLSR outperforms AODV in all four parameters irrespective of different speed (time).Keywords
AODV (Adhoc on Demand Distance Vector), MANET (Mobile Adhoc Networks), NS (Network Simulator), OLSR (Optimized Link State Routing Protocol), PDR (Packet Delivery Ratio)- Performance Efficiency of SRP over AODV Enforcing Attacks
Abstract Views :231 |
PDF Views:0
Authors
Affiliations
1 Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
1 Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Mobile ad hoc networks (MANETs) is a suitable environment for unknown or unspecified communications. It is an infra-structureless network. Standard protocols like AODV, OLSR and DSR are used in routing packets. In this paper, we compare AODV protocol with SRP protocol enforcing a Black hole, worm hole and Sybil attacks. Group signature is used to authenticate the route requests and to defend the potential active attacks without exposing the node identities. During the transmission, the intermediary nodes does not know the actual destination since onion routing concept along with route verification message is used. Methods/Analysis: Using NS2, first a sample of 50 nodes is generated and is made to move randomly. Dynamic clustering is done within the sample area of 500 x 500 sq.m. Set up 50 nodes as sink nodes and attach a local agent and loss monitor for each node. Position these nodes in the sample area. The nodes 0,20,22,10 were set up as source and nodes 24, 9, 2, 14 were set up as destinations respectively for transmission of packets. Findings: The four performance measures Energy spent, Packet Delivery ratio, delay and throughput or output with 6 attacker nodes (50, 51, 52, 53, 54 and 55) with different simulation time like 2, 4, 6, 8, 10s are taken for comparison. Transmission of packet is tested using AODV and the performance metrics are traced. Similarly the performance metrics are tested with SRP protocol. The values are tabulated and a graph is generated for each metric in Y-axis and time in X-axis. From the results obtained we can observe SRP outperforms AODV in all four parameters. Novelty of the Study: A VMware workstation is installed and tested in Unix environment using tool command language the modules are created in vi editor. They are executed using ns command. This paper compares the performance of SRP with AODV enforcing attacker nodes. Conclusion: During data transmission between nodes in MANETs the SRP protocol outperforms AODV. The result analysis below shows the four performance measures Energy spent, PDR, end-to-end delay and throughput.Keywords
AODV (Adhoc Ondemand Distance Vector), Group Signature, SRP (Secured Routing Protocol), Unidentifiability, Unlinkability.- RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET
Abstract Views :231 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Thiruthangal Nadar college, Chennai, Tamil Nadu, IN
1 Department of Computer Science, Thiruthangal Nadar college, Chennai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 2 (2022), Pagination: 150-159Abstract
In recent years, the Internet of Things (IoT) has become the most innovative and efficient technology globally. IoT uses physical devices for establishing a real-time interconnection between heterogeneous networks. MANET plays an essential role in IoT-based systems for multi-hop data transmission, rapid setup, dynamic topology, etc. Generally, MANET is structureless and does not require any base station to achieve data transmission. In MANET, routing plays an important role, and modern IoT devices' evolution supports routing efficiency. MANET with IoT is applicable for various applications like emergency operations, disaster management, and environmental monitoring. Several mechanisms evolved to achieve secure routing on MANET with IoT. But still, achieving enhanced MANET performance with satisfying all QoS parameters is a challenge. Most of the existing systems lack a secured routing system, and there is no proper predefined mechanism for handling the packet losses. However, few approaches support multipath routing but fail to obtain the optimal power consumption. We use the routing manager-based secure rate analysis (RMBSRA) mechanism to address these issues. The proposed system is a centralized mechanism built with three major components: routing manager, neighboring table, and routing table. These components are responsible for effective packet transmission in the shortest path without data losses. The proposed system improves the multicast routing system by balancing the bandwidth allocation and eventually traffic on the network. The proposed RMBSRA performance is evaluated in the simulation environment NS-2. The observation obtained from RMBSRA is compared with the existing Trust-Based Secure Multipath Routing Protocol (TBSMR) and real-time secure route analysis (RSRA). The proposed RMBSRA achieves enhanced routing performance compared to the existing mechanisms.Keywords
IoT, MANET, Routing Protocol, Security, Load Balancing, Traffic, Multipath Routing.References
- B. Salah Eddine, S. Omar, B. Meftah, M. Rabbah, and B. Cousin, "An efficient energy-aware link stable multipath routing protocol for mobile ad hoc networks in urban areas," Telford Journal, vol. 12, pp. 2–7, 01 2020.
- S. K. Singh and J. Prakash, “Energy efficiency and load balancing in manet: A survey,” in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020, pp. 832–837.
- A. Parveen and Y. V. S. Sai Pragathi, “A study of routing protocols for energy conservation in manets,” in Advances in Decision sciences, Image Processing, Security and Computer Vision, S. C. Satapathy, K. S. Raju, K. Shyamala, D. R. Krishna, and M. N. Favorskaya, Eds. Cham: Springer International Publishing, 2020, pp. 641–647.
- Z. Chen, W. Zhou, S. Wu, and L. Cheng, “An adaptive on-demand multipath routing protocol with QoS support for high-speed manet," IEEE Access, vol. 8, pp. 44 760–44 773, 2020.
- M. Anand and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (manet) using better-quality aodv protocol,” Cluster Computing, vol. 22, 09 2019.
- L. Atzori, A. Iera, and G. Morabito, ―The internet of things: A survey,‖ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
- P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, ―Convergence of MANET and WSN in IoT urban scenarios,‖ IEEE Sens. J., vol. 13, no. 10,pp. 3558–3567, Oct. 2013.
- Mohit K. and Rashmi Mishra. An Overview of MANET: History, Challenges and Applications. International Journal of Engineering Research and Technology. (2012). vol. 3, no.1.
- Pravin Ghosekar. 2010. Mobile Ad Hoc Networking: Imperatives and Challenges. In proceedings of IJCA, Special issues on “Mobile Ad-hoc Networks” (MANET).
- N. Sah, N. R. Prakash, and D. Bagai “QoS Analysis in Mobile AdHoc Networks Using Bandwidth Utilization Technique”, Dec 2014.
- Karlsson, Jonny, Laurence S. Dooley, and Goran P. Pulkkis. "Secure Routing for MANET Connected Internet of Things Systems." (2018).
- Alameri, I. A. "MANETS and internet of things: the development of a data routing algorithm." Engineering, Technology & Applied Science Research 8, no. 1 (2018): 2604-2608.
- Mohammed Shabaz Hussain and Khaleel Ur Rahman Khan, "Network-based Anomaly Intrusion Detection System in MANETS," Proceedings of the Fourth International Conference on Inventive Systems and Control (ICISC 2020, IEEE Xplore Part Number: CFP20J06-ART; ISBN: 978-1-7281-2813-9
- Hui Lin, Jia Hu, Xiaoding Wang, Mohammed F. Alhamid and Md. Jalil Piran "Towards Secure Data Fusion in Industrial IoT using Transfer Learning", IEEE Transactions on Industrial Informatics 2020, DOI 10.1109/TII.2020.3038780, IEEE
- SIVASHANKARI RAJADURAI, MAMOUN ALAZAB, NEERAJ KUMAR AND THIPPA REDDY GADEKALLU, "Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata", IEEE Acess July 2020, Digital Object Identifier 10.1109/ACCESS.2020.3013013
- Mohammad Sirajuddin, Ch. Rupa , Celestine Iwendi and Cresantus Bamba, "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network",Hindawi Security and Communication Networks Volume 2021, Article ID 5521713, 9 pages https://doi.org/10.1155/2021/5521713
- P. Sathyaraj and D. Rukmani Devi, "Designing the routing protocol with secured IoT devices and QoS over Manet using trust‑based performance evaluation method", Springer-Verlag GmbH Germany, part of Springer Nature 2020, Journal of Ambient Intelligence and Humanized Computing https://doi.org/10.1007/s12652-020-02358-4
- Swetha MS (2019) A novel approach to secure mysterious location based routing for Manet. IJITEE 8(7):2587–2591
- Belgaum MM (2019) Secured approach towards reactive routing protocols using triple factor in mobile ad hoc networks. AETiC 3(2):32–40
- Guaya-Delgado L (2019) A novel dynamic reputation-based source routing protocol for mobile ad hoc networks, vol 77. Springer, New York
- Mukhedkar MM (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545
- Veeraiah N, Krishna BT (2020) An approach for optimal-secure multipath routing and intrusion detection in MANET. Evolutionary intelligence. Springer, New York
- Singh, K., & Gupta, R. (2021). SO-AODV: A Secure and Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol Over AODV With Quality Assurance Metrics for Disaster Response Applications. Journal of Information Technology Research (JITR), 14(3), 87-103. http://doi.org/10.4018/JITR.202107010
- H. Kathiriya, A. Pandya, V. Dubay, and A. Bavaria, "State of art: energy-efficient protocols for self-powered wireless sensor network in IIoT to support industry 4.0,” in Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1311–1314, Noida, India, June 2020.
- V. V. Sarbhukan and L. Ragha, “establishing secure routing path using trust to enhance security in MANET,” Wireless Personal Communications, vol. 110, no. 1, pp. 245–255, 2020
- M. S. Hussain and K. U. R. Khan, “Network-based anomaly intrusion detection system in MANETS,” in Proceedings of the ICISC, pp. 881–886, Coimbatore, India, December 2020.
- H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
- H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
- D. Vasan, M. Alazab, S. Wassan, H. Naeem, B. Safaei, and Q. Zheng, “IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture,” Computer Networks, vol. 171, Article ID 107138, 2020.
- S. Rajadurai, M. Alazab, N. Kumar, and T. R. Gadekallu, “Latency evaluation of SDFGs on heterogeneous processors using timed automata,” Institute of Electrical and Electronics Engineers Access, vol. 8, pp. 140171–140180, 2020.
- C. Iwendi, S. Khan, J. H. Anajemba, M. Mittal, M. Alenezi, and M. Alazab, “)e use of ensemble models for multiple class and binary class classification for improving intrusion detection systems,” Sensors, vol. 20, no. 9, Article ID 2559, 2020
- M. Mittal, C. Iwendi, S. Khan, and J. A. Rehman, “Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system,” Transactions on Emerging Telecommunications Technologies, 32.6, e3997, 2021.