Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks

Author(s):  
GeMing Xia ◽  
ZunGuo Huang ◽  
ZhiYing Wang
2019 ◽  
Vol 26 (4) ◽  
pp. 251-265

In mobile ad hoc networks (MANET), the location-based multipath routing protocols involves less routing overhead compared to non-location-based protocols. This paper proposes two location-based algorithms, Enhanced Location-aided Level-based node Disjoint Multipath routing (ELLDMR) and Secure Location-aided Level-based node Disjoint Multipath routing (SLLDMR), to enhance the link lifetime and the security of the MANET. The objective of ELLDMR is to build multiple paths with non-critical nodes so that the lifetime of the routing path is significantly increased. It also hides the source, destination and path identity in intermediate nodes to avoid intrusion of routing attacks in the routing path. The SLLDMR is an enhancement over ELLDMR where it aims to overcome rushing attack and exhibit secure data transmission using two-level cryptographic processes. The performances of ELLDMR and SLLDMR are simulated using NS2 where it shows a minimum routing overhead, less end to end delay and high packet delivery compared to existing Location-aided Level-based node Disjoint Multipath routing (LLDMR) algorithm and Topology Hiding multipath protocol (TOHIP).


2019 ◽  
Vol 01 (01) ◽  
pp. 62-68
Author(s):  
Balaji S ◽  
Harold Robinson Y ◽  
Golden Julie Y

Multimedia file transmission with quality of service is the important issue in Mobile Ad-hoc Networks. The real-time data is in the form of audio file and the video file. These kinds of files can be divided into several data packets and the data packet is delivered from the begining node to the recipient node within the limited amount of time. The increase of throughput is possible only by means of secure data transmission. So, the secure data transmission methodology is used to implement the quality delivery of the multimedia files. The sequence of data packets are encoded and decoded using the encryption and the decryption process. The simulation results proved that the proposed method has the highest amount of throughput, delivery ratio and also improving the quality of service compared to all the other related methods.


Sign in / Sign up

Export Citation Format

Share Document