SECURED OPTIMIZATION DISTANCE VECTOR ROUTING FOR QOS WITH MODULAR AGING
DOI:
https://doi.org/10.29121/shodhkosh.v5.i1.2024.3238Keywords:
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.Abstract [English]
Developments in the remote network would significantly affect knowledge sharing via email and the internet.The security plans regarding MANET circumstances face various difficulties because of weak remote links.In this study We examined ,the MRS(Managed Router service ) is intended to find a safe long-term route, allowing the intermediate nodes to decide if the RREQ packets are to be broadcast or dropped according to the speed and load. For this evaluation, MFRS uses the MDP tool to find the right way to maximize the total network performance of the node. MFRS modifies the path discovery process, in particular the dissemination of the initial reactive protocol RREQ packets. The routing is done only based on the mobility behavior on strain where the path that can lead to routing with less energy and link cost would be selected
References
Anubhuti Roda Mohindra, Charu Kumar, 2013, “A Stable Energy- Efficient Location Based Clustering Scheme for Ad Hoc Networks”, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Springer, vol. 115, pp. 75-85 DOI: https://doi.org/10.1007/978-3-642-37949-9_7
Abbas Karimi, Abbas Afsharfarnia, Faraneh Zarafshan, and S. A. R. Al-Haddad, 2014, “A Novel Clustering Algorithm for Mobile Ad Hoc Networks Based on Determination of Virtual Links‟ Weight to Increase Network Stability”, Scientific World Journal, Hindawi, vol 2014, Article ID 432952. DOI: https://doi.org/10.1155/2014/432952
Al-Maqbali, H, Day, K, Ould-Khaoua, M, Touzene, A & Alzeidi, N, 2014, “A New Hybrid Grid-based Routing Approach for Manets’, Procedia Technology, vol. 17, pp.81-89. DOI: https://doi.org/10.1016/j.protcy.2014.10.181
Balasubramanian Paramasivan, Maria Johan Viju Prakash & Madasamy Kaliappan. 2015, ‘Development of a secure routing protocol using game theory model in MANETs’, Journal of Communications and Networks, vol. 17, pp. 75-83. DOI: https://doi.org/10.1109/JCN.2015.000012
Chen, Q., Fadlullah, Z.M., Lin, X. and Kato, N., 2011. A clique-based secure admission control scheme for mobile ad hoc networks (MANETs). Journal of Network and Computer Applications, vol.34, no. 6, pp.1827-1835. DOI: https://doi.org/10.1016/j.jnca.2010.12.012
Cho, JH, Swami, A & Chen, R 2012,‘Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks’, Journal of Network and Computer Applications, vol. 35, no. 3, pp.1001-1012. DOI: https://doi.org/10.1016/j.jnca.2011.03.016
Chang-Woo Ahn, Sang-Hwa Chung, Tae-Hun Kim & Su-Young Kang 2010, ‘A node-disjoint multipath routing protocol based on aodv in mobile ad hoc networks’, Seventh International Conference on Information Technology: New Generations (ITNG), pp.828–833. DOI: https://doi.org/10.1109/ITNG.2010.158
Drira, K, Seba, H & Kheddouci, H 2010,‘ECGK: An efficient clustering scheme for group key management in MANETs’, Computer Communications, vol. 33, no. 9, pp.1094-1107. DOI: https://doi.org/10.1016/j.comcom.2010.02.007
Dilpreet Kaur & Mundra, PS 2012, ‘Ant colony optimization: A technique used for finding shortest path’, International Journal of Engineering and Innovative Technology (IJEIT), vol.1, no.5, pp. 122-124.
Dana, A. Yadegari, M. Hajhosseini and T. Mirfakhraie, 2008, „A Robust Cross-Layer Design of Clustering-Based Routing Protocol for MANET‟, International Conference on Advanced Communication Technology, Gangwon-Do, IEEE, vol. 2, pp. 1055 – 1059, DOI: https://doi.org/10.1109/ICACT.2008.4493948
EiKhin & ThandarPhyu 2014, ‘Mitigating Scheme for Black Hole Attack in AODV Routing Protocol’, Proceedings of the International Conference on Advances in Engineering and Technology, vol. 1, pp. 29-30.
Fubao Yang & Baolin Sun, 2011, ‘Ad hoc on-demand distance vector multipath routing protocol with path selection entropy’, International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.4715–4718. DOI: https://doi.org/10.1109/CECNET.2011.5768227
Gopinath, S & Nagarajan, N 2015,‘Energy based reliable multicast routing protocol for packet forwarding in MANET’, Journal of applied research and technology, vol. 13, no. 3, pp.374-381. DOI: https://doi.org/10.1016/j.jart.2015.07.003
Goff, T, Abu-Ghazaleh, NB, Phatak, DS & Kahvecioglu, R 2003, ‘Preemptive routing in ad hoc networks’, Journal of Parallel Distributed Computing, vol.63, no.2, pp.123–140. DOI: https://doi.org/10.1016/S0743-7315(02)00059-X
Hietalahti, M 2008,‘A clustering-based group key agreement protocol for ad-hoc networks’, Electronic Notes in Theoretical Computer Science, vol. 192, no. 2, pp.43-53. DOI: https://doi.org/10.1016/j.entcs.2008.05.005
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 R. Surya Prabha, Dr. S. Saraswathi

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.