SE-AODV-Secured and Energy Efficient Routing in Mobile Ad-hoc Network
Journal Title: Engineering and Scientific International Journal - Year 2014, Vol 1, Issue 1
Abstract
Mobile ad hoc network (MANET) is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. Mobile ad hoc networks consist of nodes that cooperate to provide connectivity and are free to move and organize randomly. Every node is router or an end host, in general autonomous and should be capable of routing traffic as destination nodes sometimes might be out of range. Nodes are mobile since topology is very dynamic and they have limited energy and computing resources. These nodes are often vulnerable to failure thus making mobile ad hoc networks open to threats and attacks. Communication in MANET relies on mutual trust between the participating nodes but the features of MANET make this hard. Nodes sometimes fail to transmit and start dropping packets during the transmission. Such nodes are responsible for untrustworthy routing. Nodes should also be considered for sufficient energy levels to make transmission. A secured scheme can be used to track these untrustworthy nodes and isolate them from routing, thus provide trustworthiness. In this paper a secured and energy based AODV (SE-AODV) protocol is presented which implements a message digest algorithm for every transmission. Energy is introduced and nodes are considered for routing only if they have energy level higher than the threshold (Average energy value of nodes considered for routing). The SE-AODV increases PDR and decreases delay thereby enhancing the QoS metrics and trustworthiness in AODV based MANET routing. The work is implemented and simulated on NS-2. The simulation result shows the proposed SE-AODV provides more trustworthy routing compared with general AODV.
Authors and Affiliations
Sridhar S
Efficient Term Frequency and Optimal Similarity Measure of Snippet for Web Search Results
All clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. In this paper, we intr...
Efficient Resource Scheduling for Cloud Computing Jobs with Sensitive Deadline Alerts
Cloud computing is one of the fastest growing technologies in the world to storing a huge amount of data. The tenants require from cloud providers whose consistency and network performance as an important object. To incr...
Mobile-to-Mobile Communication using Secured Shared Key
In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network perf...
Randomized Image Password and a QR Code Based Circumnavigation Mechanism for Secure Authentication using caRP
Password is the security primitives used for proving a user identity in online. Many graphical password techniques have been proposed which is used to improve password usability and security. In this paper, we present a...
Security and Efficiency during Data Transmission in Wireless Sensor Networks
Nowadays wireless sensor networks are mostly used for environmental control, surveillance tasks, monitoring, tracking and controlling etc. For this, the wireless sensor network has to be safe and efficient. Clustering is...