Neighbor Discovery based Routing in Code Based Mobile Adhoc Networks

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 1
Year of Publication : 2017
Authors : Rajesh Kumar M R, S.P.Malarvizhi

pdf
How to Cite?

Rajesh Kumar M R, S.P.Malarvizhi, "Neighbor Discovery based Routing in Code Based Mobile Adhoc Networks," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 1, pp. 14-18, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I1P103

Abstract:

In this paper trust values should be calculated to find neighbor nodes for each and every node in the networks. Trusted nodes will be used to communicate with the routes and no ACK process is used, so it takes less time for communication. Cryptographic techniques are used to reduce the network overhead caused by digital signature. Key exchange mechanisms will be used to eliminate keys and it is more secure because of key generation concept is introduced it is energy efficient model. Light weight Intrusion detection system is used for estimating the trust and consumes limited computational resources. The performance will be evaluated in the software simulation.

Keywords:

Acknowledgement (ACK); Trust system; Mobile Ad hoc NETwork (MANET).

References:

[1] Hamid Al-Hamadi and Ing-Ray Chen, ”Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE Trans. Networking., vol.10, 2013
[2] jiun-jian liaw,lin-huang chang and hung-chi chu, Improving Lifetime in Heterogeneous Wireless Sensor Networks with The Energy-Efficient Grouping Protocol “In “l J.Inno.Comput.inf. and Ctrl., vol 8,no.9 ,2012.
[3] Kewei Sha,Jegnesh Gehlot and Robert Greve “Multipath Routing Techniques in Wireless Sensor Networks”.
[4] Hoseein Jadidoleslamy,”A hierarchical Intrusion Detection Architecture for Wireless Sensor Networks IJNSA, vol.3, no.5, 2011.
[5] F. Bao, I. R. Chen, M. Chang, and J. Cho, “Hierarchical trust Management for Wireless Sensor Networks and its Application to Trust Based Routing and Intrusion Detection“,IEEE Trans. Netw. Service Manag., vol.9, no.2,pp ,161-183,2012
[6] C.j Fung,z. jie I.Aib and R. Boutaba. “Drichlet-based Trust Management for Effective Collaborative Intrusion Detection networks”, IEEE Trans.Netw.Service Manag., vol.8,no.2,pp.79-91,2011.
[7]] S. Ozdemir,” Secure and reliable data aggregation for Wireless Sensor networks”, Proceedings of the 4th international conference on ubiquitous computing systems, Tokyo, japan, 2007.
[8] Enrique J.Duarate-Melo, Mingyan Liu EECS, University of Michigan,Ann Arbor “ Analysis of Heterogeneous Wireless Sensor Networks”.
[9] Ping Yi,ting Zhu,Qingquan Zhang,Yue Wu,Jianhua Li “School Of Information Security Engineering, China “ Green Firewall: An energy-efficient Intrusion Prevention Mechanism in Wireless Sensor Networks”.
[10] Su Man Nam and Tae Ho Cho, “An Energy Efficient Countermeasure against multiple attacks of the false data injection attack and false hello flood attack in the Sensor Networks
[11] Qurat ul-Ain I.Tarriq, Saneeha Ahmed, Huma Zia “An Objective based Classification of Aggregation Techniques For Wireless Sensor Networks.
[12] Hosamsoleman, Ali Payandeh,Nasser Mozayyani, Saeedsedighiankashi “Detection Collision Attacks in Wireless Sensor Networks usingrule-based Packet Flow rate”, IJERA vol 3, issue 4, 2013.