Limits...
A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH

Related in: MedlinePlus

Working of agent.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4127208&req=5

fig1: Working of agent.

Mentions: From Figure 1 the architecture and working of agent set at each node. When a secondary node receives a message packet from a primary node, the node analyzer tests whether the node belongs to the home network or not. The node analyzer selects one of the parameters randomly and checks for the authorized node from the data aggregator.


A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Working of agent.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4127208&req=5

fig1: Working of agent.
Mentions: From Figure 1 the architecture and working of agent set at each node. When a secondary node receives a message packet from a primary node, the node analyzer tests whether the node belongs to the home network or not. The node analyzer selects one of the parameters randomly and checks for the authorized node from the data aggregator.

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH
Related in: MedlinePlus