Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks 

Abstract

A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other types of wireless networks, the infractureless nature of this type of network makes it provide various advantages with some numerous problems of course. One problematical approach toward routing in MANET is the security issues, which, combined with reliable data transfer problems make some MANET’s users unsatisfied. This security problem is explained in the fact that as participating nodes regularly communicate and exchange information; there must be a level of trust between them. Some weak protocols are designed in such a way nodes randomly exchange messages without any control due to the lack of trust management mechanisms which may be required to prevent such unsecure information exchanges; thus opening a way to unwanted malicious nodes and intruders compromising the security in MANET, and in turn, resulting in unreliable data transmission. This paper conducts a performance evaluation of various security-aware algorithms based on trustworthy schemes namely trust evaluation with direct observation and trust evaluation with indirect observation. These two schemes are evaluated against the existing one while varying the routing metrics available for MANETs; throughput, hacked packet ratio, end-to-end delay ratio, and the overall trust valuation metrics. This performance evaluation is conducted for the Optimized Link State Routing Protocol version2 (OLSR v2), the successor and enhancement of OLSR v1. It has been chosen thanks to its capability to efficiently extend MANET’s neighborhood discovering process, a feature which makes it easy to detect malicious neighbor and distant nodes in the network. The simulations are carried out using NS-2 while varying the number of nodes, the outcomes show that the trust evaluation with indirect observation approach outperforms the other schemes; the direct observation scheme mediumly performs while the existing one is always worsened except with the end-to-end delay parameter.

Authors and Affiliations

GATETE MARCEL , Dr. N. Vetrivelan

Keywords

Related Articles

A HYBRID FRAGILE HIGH CAPACITY WATERMARKING TECHNIQUE WITH TEMPLATE MATCHING DETECTION SCHEME.

With the rapid growth in the development of digital content, the terms security and privacy are very challenging issues. Watermarking is a broad interesting field which provides way in hiding an informal or formal data i...

An overview of Object Oriented Metrics A complete Survey

Object oriented metrics have become more important in software engineering field. They are used to measure software quality and to estimate the cost, to enhance the reliability, maintainability and effort of software pro...

Privacy Preserving Data Mining in Electronic Health Record using Kanonymity and Decision Tree 

In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical r...

A NOVEL APPROACH FOR COMMUNITY DISCOVERY IN DYNAMIC NETWORKS 

Recently, discovering aggressive communities has become an increasingly critical task. Many conclusion have been expected, most of which only use correlation structure. However, rich information is cipher in the content...

Improving Geographical Data Finder Using Tokenize Approach from GIS Map API

This Paper presents a novel approach to geographical data finder by combining the tokenize algorithm. Improper correctness of Geo location data lapse performance of GIS based applications. In this work, Geo location data...

Download PDF file
  • EP ID EP106644
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

GATETE MARCEL, Dr. N. Vetrivelan (2015). Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks . International Journal of Computer Science & Engineering Technology, 6(12), 664-670. https://europub.co.uk/articles/-A-106644