Limits...
A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH

Related in: MedlinePlus

Number of malicious nodes isolated with respect to number of nodes.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4127208&req=5

fig9: Number of malicious nodes isolated with respect to number of nodes.

Mentions: The secure routing through LA, A-LA, and B-LA is evaluated with number of malicious nodes isolated from network and the number of packets routed through such malicious nodes. The isolated malicious nodes form network depicts the potency of secure routing scheme with detection of intruders in to the network. The Figures 8 and 9 portray the possibility of the proposed protocols to detect the malicious node in the network at higher rate. It is mainly due to the fact that these protocols use the authentication terminologies. When a node fails to meet the authentication terminologies, it is suspect to be a malicious node in the network. Here comparison is made to evaluate the best among LA, A-LA, and B-LA in secure transmission. In these protocols as the authentication scheme uses sharing process, when the number of nodes is increased in the network, more malicious nodes are detected. Figures 10 and 11 say the ratio of the protocols in detecting the presence of malicious nodes in the network with respect to mobility and number of nodes. B-LA detects at a rate of 78% (approx), A-LA detects at a rate of 76% (approx) whereas LA detects at 66% (approx) with respect to mobility. B-LA detects at a rate of 75% (approx), A-LA detects at a rate of 72% (approx) whereas LA detects at 69.66% (approx) with respect to number of nodes. This result proves that B-LA detects the malicious nodes in the network in an efficient way compared to LA and A-LA.


A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

Sekaran R, Parasuraman GK - ScientificWorldJournal (2014)

Number of malicious nodes isolated with respect to number of nodes.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4127208&req=5

fig9: Number of malicious nodes isolated with respect to number of nodes.
Mentions: The secure routing through LA, A-LA, and B-LA is evaluated with number of malicious nodes isolated from network and the number of packets routed through such malicious nodes. The isolated malicious nodes form network depicts the potency of secure routing scheme with detection of intruders in to the network. The Figures 8 and 9 portray the possibility of the proposed protocols to detect the malicious node in the network at higher rate. It is mainly due to the fact that these protocols use the authentication terminologies. When a node fails to meet the authentication terminologies, it is suspect to be a malicious node in the network. Here comparison is made to evaluate the best among LA, A-LA, and B-LA in secure transmission. In these protocols as the authentication scheme uses sharing process, when the number of nodes is increased in the network, more malicious nodes are detected. Figures 10 and 11 say the ratio of the protocols in detecting the presence of malicious nodes in the network with respect to mobility and number of nodes. B-LA detects at a rate of 78% (approx), A-LA detects at a rate of 76% (approx) whereas LA detects at 66% (approx) with respect to mobility. B-LA detects at a rate of 75% (approx), A-LA detects at a rate of 72% (approx) whereas LA detects at 69.66% (approx) with respect to number of nodes. This result proves that B-LA detects the malicious nodes in the network in an efficient way compared to LA and A-LA.

Bottom Line: These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth.Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters.This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

View Article: PubMed Central - PubMed

Affiliation: Anna University Regional Centre, Madurai, Tamil Nadu 625007, India.

ABSTRACT
The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

Show MeSH
Related in: MedlinePlus