Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks 

Abstract

A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other types of wireless networks, the infractureless nature of this type of network makes it provide various advantages with some numerous problems of course. One problematical approach toward routing in MANET is the security issues, which, combined with reliable data transfer problems make some MANET’s users unsatisfied. This security problem is explained in the fact that as participating nodes regularly communicate and exchange information; there must be a level of trust between them. Some weak protocols are designed in such a way nodes randomly exchange messages without any control due to the lack of trust management mechanisms which may be required to prevent such unsecure information exchanges; thus opening a way to unwanted malicious nodes and intruders compromising the security in MANET, and in turn, resulting in unreliable data transmission. This paper conducts a performance evaluation of various security-aware algorithms based on trustworthy schemes namely trust evaluation with direct observation and trust evaluation with indirect observation. These two schemes are evaluated against the existing one while varying the routing metrics available for MANETs; throughput, hacked packet ratio, end-to-end delay ratio, and the overall trust valuation metrics. This performance evaluation is conducted for the Optimized Link State Routing Protocol version2 (OLSR v2), the successor and enhancement of OLSR v1. It has been chosen thanks to its capability to efficiently extend MANET’s neighborhood discovering process, a feature which makes it easy to detect malicious neighbor and distant nodes in the network. The simulations are carried out using NS-2 while varying the number of nodes, the outcomes show that the trust evaluation with indirect observation approach outperforms the other schemes; the direct observation scheme mediumly performs while the existing one is always worsened except with the end-to-end delay parameter.

Authors and Affiliations

GATETE MARCEL , Dr. N. Vetrivelan

Keywords

Related Articles

ICT for Innovative Education

Information and communication Technologies is rapidly advancing and the old model a Teacher - Student has been outdated. This is the era of global learning communities. The main purpose of ICT enabled methods is to creat...

A Taxonomy of High Level Software Clones

The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones a...

A SURVEY ON ENERGY CONSUMPTION IN WIRELESS ROVING APPLICATION

Recent days, the energy consumption of mobile and tablet devices has become most familiar problem in android operating system. Android is an open source code which is easily understandable and handle by the users to get...

Named Entity Recognition in Indian Languages Using Gazetteer Method and Hidden Markov Model: A Hybrid Approach

Named Entity Recognition (NER) is the task of processing text to identify and classify names, which is an important component in many Natural Language Processing (NLP) applications, enabling the extraction of useful info...

Different Algorithms used in Image Encryption: A review

As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. The...

Download PDF file
  • EP ID EP106644
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

GATETE MARCEL, Dr. N. Vetrivelan (2015). Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks . International Journal of Computer Science & Engineering Technology, 6(12), 664-670. https://europub.co.uk./articles/-A-106644