Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

14.08.2017

STFDR: Architecture of Competent Protocol for Efficient Route Discovery and Reliable Transmission in CEAACK MANETs

verfasst von: J. Sathiamoorthy, B. Ramakrishnan, M. Usha

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Efficiency can be achieved in CEAACK MANETs by implementing clustering technique into the network. Using this strategy the cluster head can monitor the members and also take the responsibility of routing the data packets to their destination. The cluster head has to coordinate with the base station for packet transmission. Generally route maintenance and route discovery is a very important mechanism for maintaining route life. In a route discovery, normally we are using flooding scheme for sending and receiving the route request and route reply message. Based on the route discovery, the routing methods are categorized into Proactive and Reactive methods. Reactive Routing Protocol is also called On Demand Routing Protocol like AODV and DSR. These two protocols help to reduce the overhead involved in routing. We propose a novel protocol STFDR (Secure Three Fish Dynamic Routing), which provides an efficient route discovery technique along with a competent dynamic broadcast algorithm. The overhead in routing can further be reduced by gaining knowledge about the neighbouring nodes. The proposed algorithm will help fix a route for packet forwarding and also utilize the information of the neighbouring nodes effectively. This algorithm is a unique dynamic routing protocol that provides a secure and a reliable network environment. The aim of our proposed protocol is to provide an environment where only the trusted nodes participate in route discovery and secure packet transmission.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Deverapalli, C., Joiner, L., Yoo, S.-M., & Choo, H. (2002). Performance comparison of various routing protocols in mobile ad hoc networks. In International conference on wireless networks, LasVegas, Nevada, USA. Deverapalli, C., Joiner, L., Yoo, S.-M., & Choo, H. (2002). Performance comparison of various routing protocols in mobile ad hoc networks. In International conference on wireless networks, LasVegas, Nevada, USA.
2.
Zurück zum Zitat Toh (2007). Ad hoc mobile wireless networks: Protocols and systems. Pearson Education India. Toh (2007). Ad hoc mobile wireless networks: Protocols and systems. Pearson Education India.
3.
Zurück zum Zitat Hussien, O. H., Saadawi, T. N., & Lee, M. J. (2005). Probability routing algorithm for mobile ad hoc networks’ resources management. IEEE Journal on Selected Areas in Communications, 23, 2248–2259.CrossRef Hussien, O. H., Saadawi, T. N., & Lee, M. J. (2005). Probability routing algorithm for mobile ad hoc networks’ resources management. IEEE Journal on Selected Areas in Communications, 23, 2248–2259.CrossRef
4.
Zurück zum Zitat Zeng, Yuanyuan., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef Zeng, Yuanyuan., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef
5.
Zurück zum Zitat Zhou, Jun., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef Zhou, Jun., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef
6.
Zurück zum Zitat Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Mobile ad-hoc and sensor systems (pp. 182–190). Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Mobile ad-hoc and sensor systems (pp. 182–190).
7.
Zurück zum Zitat Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
8.
Zurück zum Zitat Yang, Mao., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.CrossRef Yang, Mao., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.CrossRef
9.
Zurück zum Zitat Zhou, L., Naixue, Xi., Shu, L., Vasilakos, A., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47. Zhou, L., Naixue, Xi., Shu, L., Vasilakos, A., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.
10.
Zurück zum Zitat Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215–1224.CrossRef Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215–1224.CrossRef
11.
Zurück zum Zitat Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef
12.
Zurück zum Zitat Song, Y., Liu, L., Ma, H., Vasilakos, A. V., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.CrossRef Song, Y., Liu, L., Ma, H., Vasilakos, A. V., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.CrossRef
13.
Zurück zum Zitat Xiong, N., et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.CrossRef Xiong, N., et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.CrossRef
15.
Zurück zum Zitat Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2012). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11, 402–413.CrossRef Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2012). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11, 402–413.CrossRef
16.
Zurück zum Zitat Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and bounded transmission redundancy. IEEE Transactions on Computers, 57(8), 1072–1086.MathSciNetCrossRef Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and bounded transmission redundancy. IEEE Transactions on Computers, 57(8), 1072–1086.MathSciNetCrossRef
17.
Zurück zum Zitat Joe, M. M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.CrossRef Joe, M. M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.CrossRef
18.
Zurück zum Zitat Joe, M. M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for Vehicular network. Wireless Personal Communications, 85(4), 1987–2001.CrossRef Joe, M. M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for Vehicular network. Wireless Personal Communications, 85(4), 1987–2001.CrossRef
19.
Zurück zum Zitat Ramakrishnan, B. (2010). Analytical study of cluster and sans cluster vehicular ad hoc network. International Journal of Computer Engineering and Information Technology, ISSN 0974-2034 2010/9. Ramakrishnan, B. (2010). Analytical study of cluster and sans cluster vehicular ad hoc network. International Journal of Computer Engineering and Information Technology, ISSN 0974-2034 2010/9.
20.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.
21.
Zurück zum Zitat Salama, D., Kader, H. A., & Hadhoud, M. (2011). Studying the effects of most common encryption algorithms. International Arab Journal of e-Technology, 2(1), 1–10. Salama, D., Kader, H. A., & Hadhoud, M. (2011). Studying the effects of most common encryption algorithms. International Arab Journal of e-Technology, 2(1), 1–10.
22.
Zurück zum Zitat Jeeva, A. L., Palanisamy, V., & Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033–3037. ISSN: 2248-9622. Jeeva, A. L., Palanisamy, V., & Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033–3037. ISSN: 2248-9622.
23.
Zurück zum Zitat Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocols. In Proceedings of 5th annual postgraduate symposium on the convergence of telecommunications, Networking & Broadcasting, PGNET 2004. Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocols. In Proceedings of 5th annual postgraduate symposium on the convergence of telecommunications, Networking & Broadcasting, PGNET 2004.
24.
Zurück zum Zitat Mandal, P. C. (2012). Evaluation of performance of the symmetric key algorithms: DES, 3DES, AES and blowfish. Journal of Global Research in Computer Science, 3(8), 67–70. Mandal, P. C. (2012). Evaluation of performance of the symmetric key algorithms: DES, 3DES, AES and blowfish. Journal of Global Research in Computer Science, 3(8), 67–70.
25.
Zurück zum Zitat Singh, G., Singla, A. K., & Sandha, K. S. (2011). Throughput analysis of various encryption algorithms. International Journal of Computer Science and Technology, IJCST, 2(3), 527–528. Singh, G., Singla, A. K., & Sandha, K. S. (2011). Throughput analysis of various encryption algorithms. International Journal of Computer Science and Technology, IJCST, 2(3), 527–528.
26.
Zurück zum Zitat Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Management in Education, 2(7), 123–128. Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Management in Education, 2(7), 123–128.
27.
Zurück zum Zitat Kumar, G., Rai, M., & Lee, G.-S. (2012). Implementation of cipher block chaining in wireless sensor networks for security enhancement. International Journal of Security and its Applications, 6(1), 57–72. Kumar, G., Rai, M., & Lee, G.-S. (2012). Implementation of cipher block chaining in wireless sensor networks for security enhancement. International Journal of Security and its Applications, 6(1), 57–72.
28.
Zurück zum Zitat Singh, G. (2011). Security threats and maintenance in mobile ad hoc networks. International Journal on Electronics and Communication Technology, IJECT, 2(3), 68–70. Singh, G. (2011). Security threats and maintenance in mobile ad hoc networks. International Journal on Electronics and Communication Technology, IJECT, 2(3), 68–70.
29.
Zurück zum Zitat Li, W., & Joshi, A. (2004). Security issues in mobile ad hoc networks: A survey. In The 17th white house papers graduate research in informatics at Sussex (pp. 1–23). Li, W., & Joshi, A. (2004). Security issues in mobile ad hoc networks: A survey. In The 17th white house papers graduate research in informatics at Sussex (pp. 1–23).
30.
Zurück zum Zitat Wadhwa, E. D. S., & Panag, E. T. S. (2011). Performance comparison of single and multipath routing protocols in ad hoc networks. International Journal of Computer Technology and Applications (IJCTA), 2, 1486–1496. Wadhwa, E. D. S., & Panag, E. T. S. (2011). Performance comparison of single and multipath routing protocols in ad hoc networks. International Journal of Computer Technology and Applications (IJCTA), 2, 1486–1496.
31.
Zurück zum Zitat Keshav, S. (1997). An engineering approach to computer networking: ATM networks, the internet, and the telephone network, Chapter 11. Reading, MA: Addison-Wesley. Keshav, S. (1997). An engineering approach to computer networking: ATM networks, the internet, and the telephone network, Chapter 11. Reading, MA: Addison-Wesley.
32.
Zurück zum Zitat Moy, J. (1991). OSPF version 2. RFC 1247, July 1991. Moy, J. (1991). OSPF version 2. RFC 1247, July 1991.
33.
Zurück zum Zitat Hedrick, C. (1988). Routing information protocol. RFC 1058, June 1988. Hedrick, C. (1988). Routing information protocol. RFC 1058, June 1988.
35.
Zurück zum Zitat Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing. Dordrecht: Kluwer Academic. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing. Dordrecht: Kluwer Academic.
37.
Zurück zum Zitat Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y.-C., & Jetcheva, J. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of MOBICOM’98. Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y.-C., & Jetcheva, J. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of MOBICOM’98.
38.
Zurück zum Zitat Das, S. R., Castaneda, R., Yan, J., & Sengupta, R. (1998). Comparative performance evaluation of routing protocols for mobile, ad hoc networks. In Proceedings of IEEE IC3 N’98. Das, S. R., Castaneda, R., Yan, J., & Sengupta, R. (1998). Comparative performance evaluation of routing protocols for mobile, ad hoc networks. In Proceedings of IEEE IC3 N’98.
40.
Zurück zum Zitat Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27–31, 2002. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27–31, 2002.
41.
Zurück zum Zitat Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002.
42.
Zurück zum Zitat Yi, S., Naldurg, P., & Kravets, R. (2002). Security-aware ad hoc routing protocol for wireless networks. In The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002). Yi, S., Naldurg, P., & Kravets, R. (2002). Security-aware ad hoc routing protocol for wireless networks. In The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002).
43.
Zurück zum Zitat Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–88.CrossRef Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–88.CrossRef
44.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE International Conference on Computing and Communications Technologies (ICCCT), Feb. 2015. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE International Conference on Computing and Communications Technologies (ICCCT), Feb. 2015.
45.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. In Springer Journal of Wireless Networks (pp. 1–15). December 2015. Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. In Springer Journal of Wireless Networks (pp. 1–15). December 2015.
Metadaten
Titel
STFDR: Architecture of Competent Protocol for Efficient Route Discovery and Reliable Transmission in CEAACK MANETs
verfasst von
J. Sathiamoorthy
B. Ramakrishnan
M. Usha
Publikationsdatum
14.08.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4812-0

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt