Limits...
A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH

Related in: MedlinePlus

Overhead with respect to transmission range.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4127208&req=5

fig5: Overhead with respect to transmission range.

Mentions: Transmission range has a greater impact in the behaviour of routing protocols. The three protocols LA, A-LA and B-LA are evaluated varying the transmission range from 50 to 250. The transmission range illustrates the coverage region of particular node to transmit the data packet. The metrics latency, delivery ratio and overhead are measured and compared for evaluating the higher performance among three protocols LA, A-LA, and B-LA. On varying the transmission range, the protocols show the behaviour as depicted in Figure 5. Among the three proposed protocols, B-LA wield minimum overhead compared to LA and A-LA. They vary periodically in the ratios described in subsequent. LA and A-LA have an overhead of 36.9% (approx) and 34.005% (approx). B-LA has overhead ratio at an average rate of 29.66% (approx). Hence B-LA shows minimum overhead when compared with LA and A-LA.


A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Overhead with respect to transmission range.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4127208&req=5

fig5: Overhead with respect to transmission range.
Mentions: Transmission range has a greater impact in the behaviour of routing protocols. The three protocols LA, A-LA and B-LA are evaluated varying the transmission range from 50 to 250. The transmission range illustrates the coverage region of particular node to transmit the data packet. The metrics latency, delivery ratio and overhead are measured and compared for evaluating the higher performance among three protocols LA, A-LA, and B-LA. On varying the transmission range, the protocols show the behaviour as depicted in Figure 5. Among the three proposed protocols, B-LA wield minimum overhead compared to LA and A-LA. They vary periodically in the ratios described in subsequent. LA and A-LA have an overhead of 36.9% (approx) and 34.005% (approx). B-LA has overhead ratio at an average rate of 29.66% (approx). Hence B-LA shows minimum overhead when compared with LA and A-LA.

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH
Related in: MedlinePlus