Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 12
Abstract
A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other types of wireless networks, the infractureless nature of this type of network makes it provide various advantages with some numerous problems of course. One problematical approach toward routing in MANET is the security issues, which, combined with reliable data transfer problems make some MANET’s users unsatisfied. This security problem is explained in the fact that as participating nodes regularly communicate and exchange information; there must be a level of trust between them. Some weak protocols are designed in such a way nodes randomly exchange messages without any control due to the lack of trust management mechanisms which may be required to prevent such unsecure information exchanges; thus opening a way to unwanted malicious nodes and intruders compromising the security in MANET, and in turn, resulting in unreliable data transmission. This paper conducts a performance evaluation of various security-aware algorithms based on trustworthy schemes namely trust evaluation with direct observation and trust evaluation with indirect observation. These two schemes are evaluated against the existing one while varying the routing metrics available for MANETs; throughput, hacked packet ratio, end-to-end delay ratio, and the overall trust valuation metrics. This performance evaluation is conducted for the Optimized Link State Routing Protocol version2 (OLSR v2), the successor and enhancement of OLSR v1. It has been chosen thanks to its capability to efficiently extend MANET’s neighborhood discovering process, a feature which makes it easy to detect malicious neighbor and distant nodes in the network. The simulations are carried out using NS-2 while varying the number of nodes, the outcomes show that the trust evaluation with indirect observation approach outperforms the other schemes; the direct observation scheme mediumly performs while the existing one is always worsened except with the end-to-end delay parameter.
Authors and Affiliations
GATETE MARCEL , Dr. N. Vetrivelan
Automatic System For Brain Tumor Detection And Classification Using Level Set And ANN
Even with increasing popularity of MRI imaging techniques, the assessment of lesions in brain area is still performed manually or semi-manually. The major drawbacks to manual image segmentation are time consuming and sub...
Cloud computing for mobile trauma care
Cloud computing is the newly evolved next generation’s technology , emphasizes on sharing and virtualization concept, caries a solution for providing more secured, economic on air services. Involves software, platform, i...
System for Devices mobile based in recognition facial
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...
Surface Reconstruction and Time Calculation using Crust Algorithm
The Crust Algorithm is an algorithm for the surface reconstruction from unorganized cloud points in 3D. This is the first algorithm which is developed for this problem. For a given point cloud from a smooth surface, the...
A Cooperative Approach for Opportunistic Routing In Mobile Ad Hoc Networks
Cooperative Communication, a new research area, has revealed a recent origin in the wireless networks, which combines the link-quality and the broadcasting nature of the wireless channels. It is a pure network layer sche...