

Dynamic Source Reactive Routing Protocol for MANET
Abstract
As the nodes are mobile so topology changes frequently that leads to link failure and lack of infrastructure support and resource constraint is the key issue that causes dishonest and non co-operative nodes. As the nodes square measure mobile thus topology changes oft that ends up in link failure and lack of infrastructure support and resource constraint is that the key issue that causes dishonest and non co-operative nodes. There square measure finding a route to destination, new route discovery is initiated. The frequent discoveries result in a lot of network congestion. To avoid this multipath routing protocols are planned to seek out multiple routes to destination and put on to alternate secondary path just in case of route broken and its offer higher routing performance and security. In this developed research paper attempt to compare the performance of two reactive routing protocols for MANETs that is Secure Dynamic Source Routing (SDSR) and Dynamic Source Routing (DSR), on-demand gateway discovery protocol where a mobile device of MANET gets connected to gateway. SDSR using the Intrusion Detection system (IDS) and trust based routing, the performance results are analysed by varying simulation time. Furthermore, all the above mentioned protocols are compared based on several important performance metrics which are packet delivery ratio, end-to-end delay and average energy.
References
Das, et al (2000) “An implementation study of AODV routing protocol”, WirelessCommunication and Networking Conference, Vol. 3, pp. 1003-1008.
4. Lal, et al (2012) “A node disjoint multipath routing method based on AODV protocol for MANET” IEEE 26th international Conference on Data Object Identifier, pp. 309-405.
Ayyasamy, Venkatachalapathy (2012) “Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths”, International Journal of Computer Applications, Vol. 40, No. 2, pp. 20-23.
Mitchell, Chen (2012) "Specification based intrusion detection for unmanned aircraft systems", Proceedings of the first ACM MANET workshop on Airborne Networks and Communications, pp. 31-36.
Tayal, Gupta (2013) "A Survey of Attacks on MANET Routing Protocols", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, No. 6, pp. 2280-2285.
Habib, et al (2013) “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCORED, pp. 529-533.
Mitchell, Chen, (2014) "A survey of intrusion detection in wireless network applications", Computer Communications, Vol. 42, pp. 1-23.
Mitchell, Chen (2015) "Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems," in Dependable and Secure Computing, IEEE Transactions, Vol. 12, No. 1, pp. 16-30.
Abrar Omar Alkhamisi, Seyed M Buhari (2016) “Trusted Secure Ad hoc On-Demand Multipath Distance Vector Routing in MANET”, IEEE 30th International Conference on Advanced Information Networking and Applications.
Yin-jun Yang, Xue-ming Wang (2016) “Improvement and analysis of multipath routing protocol AOMDVbased on CMMBCR”, Wireless Communications, Network and Mobile Computing, 7thInternational Conference on Digital Object Identifier, pp.1-4.
Refbacks
- There are currently no refbacks.