[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

STFDR: Architecture of Competent Protocol for Efficient Route Discovery and Reliable Transmission in CEAACK MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Efficiency can be achieved in CEAACK MANETs by implementing clustering technique into the network. Using this strategy the cluster head can monitor the members and also take the responsibility of routing the data packets to their destination. The cluster head has to coordinate with the base station for packet transmission. Generally route maintenance and route discovery is a very important mechanism for maintaining route life. In a route discovery, normally we are using flooding scheme for sending and receiving the route request and route reply message. Based on the route discovery, the routing methods are categorized into Proactive and Reactive methods. Reactive Routing Protocol is also called On Demand Routing Protocol like AODV and DSR. These two protocols help to reduce the overhead involved in routing. We propose a novel protocol STFDR (Secure Three Fish Dynamic Routing), which provides an efficient route discovery technique along with a competent dynamic broadcast algorithm. The overhead in routing can further be reduced by gaining knowledge about the neighbouring nodes. The proposed algorithm will help fix a route for packet forwarding and also utilize the information of the neighbouring nodes effectively. This algorithm is a unique dynamic routing protocol that provides a secure and a reliable network environment. The aim of our proposed protocol is to provide an environment where only the trusted nodes participate in route discovery and secure packet transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Deverapalli, C., Joiner, L., Yoo, S.-M., & Choo, H. (2002). Performance comparison of various routing protocols in mobile ad hoc networks. In International conference on wireless networks, LasVegas, Nevada, USA.

  2. Toh (2007). Ad hoc mobile wireless networks: Protocols and systems. Pearson Education India.

  3. Hussien, O. H., Saadawi, T. N., & Lee, M. J. (2005). Probability routing algorithm for mobile ad hoc networks’ resources management. IEEE Journal on Selected Areas in Communications, 23, 2248–2259.

    Article  Google Scholar 

  4. Zeng, Yuanyuan., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  5. Zhou, Jun., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  6. Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In Mobile ad-hoc and sensor systems (pp. 182–190).

  7. Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  8. Yang, Mao., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.

    Article  Google Scholar 

  9. Zhou, L., Naixue, Xi., Shu, L., Vasilakos, A., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

  10. Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215–1224.

    Article  Google Scholar 

  11. Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

    Article  Google Scholar 

  12. Song, Y., Liu, L., Ma, H., Vasilakos, A. V., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.

    Article  Google Scholar 

  13. Xiong, N., et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.

    Article  Google Scholar 

  14. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion + dilation networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283. doi:10.1109/TC.2011.145.

    Article  MathSciNet  MATH  Google Scholar 

  15. Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2012). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11, 402–413.

    Article  Google Scholar 

  16. Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and bounded transmission redundancy. IEEE Transactions on Computers, 57(8), 1072–1086.

    Article  MathSciNet  Google Scholar 

  17. Joe, M. M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.

    Article  Google Scholar 

  18. Joe, M. M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for Vehicular network. Wireless Personal Communications, 85(4), 1987–2001.

    Article  Google Scholar 

  19. Ramakrishnan, B. (2010). Analytical study of cluster and sans cluster vehicular ad hoc network. International Journal of Computer Engineering and Information Technology, ISSN 0974-2034 2010/9.

  20. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.

    Google Scholar 

  21. Salama, D., Kader, H. A., & Hadhoud, M. (2011). Studying the effects of most common encryption algorithms. International Arab Journal of e-Technology, 2(1), 1–10.

    Google Scholar 

  22. Jeeva, A. L., Palanisamy, V., & Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033–3037. ISSN: 2248-9622.

    Google Scholar 

  23. Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocols. In Proceedings of 5th annual postgraduate symposium on the convergence of telecommunications, Networking & Broadcasting, PGNET 2004.

  24. Mandal, P. C. (2012). Evaluation of performance of the symmetric key algorithms: DES, 3DES, AES and blowfish. Journal of Global Research in Computer Science, 3(8), 67–70.

    Google Scholar 

  25. Singh, G., Singla, A. K., & Sandha, K. S. (2011). Throughput analysis of various encryption algorithms. International Journal of Computer Science and Technology, IJCST, 2(3), 527–528.

    Google Scholar 

  26. Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Management in Education, 2(7), 123–128.

    Google Scholar 

  27. Kumar, G., Rai, M., & Lee, G.-S. (2012). Implementation of cipher block chaining in wireless sensor networks for security enhancement. International Journal of Security and its Applications, 6(1), 57–72.

    Google Scholar 

  28. Singh, G. (2011). Security threats and maintenance in mobile ad hoc networks. International Journal on Electronics and Communication Technology, IJECT, 2(3), 68–70.

    Google Scholar 

  29. Li, W., & Joshi, A. (2004). Security issues in mobile ad hoc networks: A survey. In The 17th white house papers graduate research in informatics at Sussex (pp. 1–23).

  30. Wadhwa, E. D. S., & Panag, E. T. S. (2011). Performance comparison of single and multipath routing protocols in ad hoc networks. International Journal of Computer Technology and Applications (IJCTA), 2, 1486–1496.

    Google Scholar 

  31. Keshav, S. (1997). An engineering approach to computer networking: ATM networks, the internet, and the telephone network, Chapter 11. Reading, MA: Addison-Wesley.

    Google Scholar 

  32. Moy, J. (1991). OSPF version 2. RFC 1247, July 1991.

  33. Hedrick, C. (1988). Routing information protocol. RFC 1058, June 1988.

  34. Corson, M., Batsell, S., & Macker, J. (1996). Architectural considerations for mobile mesh networking. http://tonnant.itd.nrl.navy.mil/mmnet/mmnetRFC.txt, May 1996. Request for Comments Draft.

  35. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing. Dordrecht: Kluwer Academic.

    Google Scholar 

  36. Perkins, C. (1997). Ad hoc on demand distance vector (AODV) routing. http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-00.txt. IETF Internet Draft.

  37. Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y.-C., & Jetcheva, J. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of MOBICOM’98.

  38. Das, S. R., Castaneda, R., Yan, J., & Sengupta, R. (1998). Comparative performance evaluation of routing protocols for mobile, ad hoc networks. In Proceedings of IEEE IC3 N’98.

  39. Lundberg, J., Routing security in ad hoc Networks. http://citeseer.nj.nec.com/400961.html.

  40. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27–31, 2002.

  41. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002.

  42. Yi, S., Naldurg, P., & Kravets, R. (2002). Security-aware ad hoc routing protocol for wireless networks. In The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002).

  43. Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–88.

    Article  Google Scholar 

  44. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE International Conference on Computing and Communications Technologies (ICCCT), Feb. 2015.

  45. Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. In Springer Journal of Wireless Networks (pp. 1–15). December 2015.

Download references

Author’s contribution

JS technical and conceptual content, collection of research data and architectural design of the protocol. BR Domain expertise, guidance and counseling on the writing of the paper. MU logical evaluation and technical support, research data collection and evaluation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Sathiamoorthy.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sathiamoorthy, J., Ramakrishnan, B. & Usha, M. STFDR: Architecture of Competent Protocol for Efficient Route Discovery and Reliable Transmission in CEAACK MANETs. Wireless Pers Commun 97, 5817–5839 (2017). https://doi.org/10.1007/s11277-017-4812-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4812-0

Keywords

Navigation