SECURED OPTIMIZATION DISTANCE VECTOR ROUTING FOR QOS WITH MODULAR AGING

Authors

  • R. Surya Prabha Assistant Professor Department of Computer Science, Sri Krishna Arts & Science College, India
  • Dr. S. Saraswathi Associate Professor, Dean-Academic affairs, Nehru arts and Science college, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i1.2024.3238

Keywords:

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Abstract [English]

Developments in the remote network would significantly affect knowledge sharing via email and the internet.The security plans regarding MANET circumstances face various difficulties because of weak remote links.In this study   We examined ,the MRS(Managed Router service ) is intended to find a safe long-term route, allowing the intermediate nodes to decide if the RREQ packets are to be broadcast or dropped according to the speed and load. For this evaluation, MFRS uses the MDP tool to find the right way to maximize the total network performance of the node. MFRS modifies the path discovery process, in particular the dissemination of the initial reactive protocol RREQ packets.  The  routing is done only based on the mobility behavior on strain where the path that can lead to routing with less energy and link cost would be selected

References

Anubhuti Roda Mohindra, Charu Kumar, 2013, “A Stable Energy- Efficient Location Based Clustering Scheme for Ad Hoc Networks”, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Springer, vol. 115, pp. 75-85 DOI: https://doi.org/10.1007/978-3-642-37949-9_7

Abbas Karimi, Abbas Afsharfarnia, Faraneh Zarafshan, and S. A. R. Al-Haddad, 2014, “A Novel Clustering Algorithm for Mobile Ad Hoc Networks Based on Determination of Virtual Links‟ Weight to Increase Network Stability”, Scientific World Journal, Hindawi, vol 2014, Article ID 432952. DOI: https://doi.org/10.1155/2014/432952

Al-Maqbali, H, Day, K, Ould-Khaoua, M, Touzene, A & Alzeidi, N, 2014, “A New Hybrid Grid-based Routing Approach for Manets’, Procedia Technology, vol. 17, pp.81-89. DOI: https://doi.org/10.1016/j.protcy.2014.10.181

Balasubramanian Paramasivan, Maria Johan Viju Prakash & Madasamy Kaliappan. 2015, ‘Development of a secure routing protocol using game theory model in MANETs’, Journal of Communications and Networks, vol. 17, pp. 75-83. DOI: https://doi.org/10.1109/JCN.2015.000012

Chen, Q., Fadlullah, Z.M., Lin, X. and Kato, N., 2011. A clique-based secure admission control scheme for mobile ad hoc networks (MANETs). Journal of Network and Computer Applications, vol.34, no. 6, pp.1827-1835. DOI: https://doi.org/10.1016/j.jnca.2010.12.012

Cho, JH, Swami, A & Chen, R 2012,‘Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks’, Journal of Network and Computer Applications, vol. 35, no. 3, pp.1001-1012. DOI: https://doi.org/10.1016/j.jnca.2011.03.016

Chang-Woo Ahn, Sang-Hwa Chung, Tae-Hun Kim & Su-Young Kang 2010, ‘A node-disjoint multipath routing protocol based on aodv in mobile ad hoc networks’, Seventh International Conference on Information Technology: New Generations (ITNG), pp.828–833. DOI: https://doi.org/10.1109/ITNG.2010.158

Drira, K, Seba, H & Kheddouci, H 2010,‘ECGK: An efficient clustering scheme for group key management in MANETs’, Computer Communications, vol. 33, no. 9, pp.1094-1107. DOI: https://doi.org/10.1016/j.comcom.2010.02.007

Dilpreet Kaur & Mundra, PS 2012, ‘Ant colony optimization: A technique used for finding shortest path’, International Journal of Engineering and Innovative Technology (IJEIT), vol.1, no.5, pp. 122-124.

Dana, A. Yadegari, M. Hajhosseini and T. Mirfakhraie, 2008, „A Robust Cross-Layer Design of Clustering-Based Routing Protocol for MANET‟, International Conference on Advanced Communication Technology, Gangwon-Do, IEEE, vol. 2, pp. 1055 – 1059, DOI: https://doi.org/10.1109/ICACT.2008.4493948

EiKhin & ThandarPhyu 2014, ‘Mitigating Scheme for Black Hole Attack in AODV Routing Protocol’, Proceedings of the International Conference on Advances in Engineering and Technology, vol. 1, pp. 29-30.

Fubao Yang & Baolin Sun, 2011, ‘Ad hoc on-demand distance vector multipath routing protocol with path selection entropy’, International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.4715–4718. DOI: https://doi.org/10.1109/CECNET.2011.5768227

Gopinath, S & Nagarajan, N 2015,‘Energy based reliable multicast routing protocol for packet forwarding in MANET’, Journal of applied research and technology, vol. 13, no. 3, pp.374-381. DOI: https://doi.org/10.1016/j.jart.2015.07.003

Goff, T, Abu-Ghazaleh, NB, Phatak, DS & Kahvecioglu, R 2003, ‘Preemptive routing in ad hoc networks’, Journal of Parallel Distributed Computing, vol.63, no.2, pp.123–140. DOI: https://doi.org/10.1016/S0743-7315(02)00059-X

Hietalahti, M 2008,‘A clustering-based group key agreement protocol for ad-hoc networks’, Electronic Notes in Theoretical Computer Science, vol. 192, no. 2, pp.43-53. DOI: https://doi.org/10.1016/j.entcs.2008.05.005

Downloads

Published

2024-01-31

How to Cite

Prabha, R. S., & Saraswathi, S. (2024). SECURED OPTIMIZATION DISTANCE VECTOR ROUTING FOR QOS WITH MODULAR AGING. ShodhKosh: Journal of Visual and Performing Arts, 5(1), 1344–1349. https://doi.org/10.29121/shodhkosh.v5.i1.2024.3238