Open Access Open Access  Restricted Access Subscription Access

REACTIVE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK

K. Thamizhmaran

Abstract


Since the nodes are mobile, the topology changes often, which results in link failure. The main cause of dishonest and non-cooperative nodes is resource constraints and a lack of infrastructure support. As the nodes square measure mobile thus topology changes oft that ends up in link failure and lack of infrastructure support and resource constraint is that the key issue that causes dishonest and non co-operative nodes. There square measure finding a route to destination, new route discovery is initiated. The frequent discoveries result in a lot of network congestion. In order to prevent this, multipath routing protocols are designed to find several routes to the destination and switch to a backup secondary path in case the primary route is broken. This provides improved routing security and performance. In this developed research paper attempt to compare the performance of two reactive routing protocols for MANETs that is Secure Dynamic Source Routing (SDSR) and Dynamic Source Routing (DSR), on-demand gateway discovery protocol where a mobile device of MANET gets connected to gateway. Through the use of trust-based routing and the Intrusion Detection System (IDS), SDSR analyzes performance outcomes by adjusting simulation time. Additionally, a number of crucial performance metrics, including packet delivery ratio, end-to-end delay, and average energy, are used to compare all of the aforementioned protocols.


Full Text:

PDF

References


Das, et al (2000) “An implementation study of AODV routing protocol”, WirelessCommunication and Networking Conference, Vol. 3, pp. 1003-1008.

4. Lal, et al (2012) “A node disjoint multipath routing method based on AODV protocol for MANET” IEEE 26th international Conference on Data Object Identifier, pp. 309-405.

Ayyasamy, Venkatachalapathy (2012) “Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths”, International Journal of Computer Applications, Vol. 40, No. 2, pp. 20-23.

Mitchell, Chen (2012) "Specification based intrusion detection for unmanned aircraft systems", Proceedings of the first ACM MANET workshop on Airborne Networks and Communications, pp. 31-36.

Tayal, Gupta (2013) "A Survey of Attacks on MANET Routing Protocols", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, No. 6, pp. 2280-2285.

Habib, et al (2013) “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCORED, pp. 529-533.

Mitchell, Chen, (2014) "A survey of intrusion detection in wireless network applications", Computer Communications, Vol. 42, pp. 1-23.

Mitchell, Chen (2015) "Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems," in Dependable and Secure Computing, IEEE Transactions, Vol. 12, No. 1, pp. 16-30.

Abrar Omar Alkhamisi, Seyed M Buhari (2016) “Trusted Secure Ad hoc On-Demand Multipath Distance Vector Routing in MANET”, IEEE 30th International Conference on Advanced Information Networking and Applications.

Yin-jun Yang, Xue-ming Wang (2016) “Improvement and analysis of multipath routing protocol AOMDVbased on CMMBCR”, Wireless Communications, Network and Mobile Computing, 7thInternational Conference on Digital Object Identifier, pp.1-4.


Refbacks

  • There are currently no refbacks.