Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 12
Abstract
A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other types of wireless networks, the infractureless nature of this type of network makes it provide various advantages with some numerous problems of course. One problematical approach toward routing in MANET is the security issues, which, combined with reliable data transfer problems make some MANET’s users unsatisfied. This security problem is explained in the fact that as participating nodes regularly communicate and exchange information; there must be a level of trust between them. Some weak protocols are designed in such a way nodes randomly exchange messages without any control due to the lack of trust management mechanisms which may be required to prevent such unsecure information exchanges; thus opening a way to unwanted malicious nodes and intruders compromising the security in MANET, and in turn, resulting in unreliable data transmission. This paper conducts a performance evaluation of various security-aware algorithms based on trustworthy schemes namely trust evaluation with direct observation and trust evaluation with indirect observation. These two schemes are evaluated against the existing one while varying the routing metrics available for MANETs; throughput, hacked packet ratio, end-to-end delay ratio, and the overall trust valuation metrics. This performance evaluation is conducted for the Optimized Link State Routing Protocol version2 (OLSR v2), the successor and enhancement of OLSR v1. It has been chosen thanks to its capability to efficiently extend MANET’s neighborhood discovering process, a feature which makes it easy to detect malicious neighbor and distant nodes in the network. The simulations are carried out using NS-2 while varying the number of nodes, the outcomes show that the trust evaluation with indirect observation approach outperforms the other schemes; the direct observation scheme mediumly performs while the existing one is always worsened except with the end-to-end delay parameter.
Authors and Affiliations
GATETE MARCEL , Dr. N. Vetrivelan
Design and Realization of Digital FIR Filter using Dolph-Chebysheb Window
In Digital Signal Processing, one of the most important filter type is the FIR filter which can be designed via various methods. Window technique is the most important technique that is used to design the FIR filter. Apa...
Routing protocols in underground coalmine environment: A Review
Researchers have worked on routing issues for adhoc-networks, VANET’s, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and prop...
Web User Session Cluster Discovery Based on k-Means and k-Medoids Techniques
The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To rev...
Text Extraction from Image Using MSER Approach
The automated understanding of textual information in images is an important problem to solve for the Computer Vision and Document Analysis for extracting that information for processing. This needs to generate required...
A Survey on Feedback base Trust Evaluation for Cloud Environment
Cloud computing widely adopted by enterprises and individuals. Cloud computing provide several advantages but still there are many obstacles in cloud. Trust plays major role in commercial cloud environments. In the envir...