A Secure Path Selection Scheme for Mobile Ad Hoc Network

2017 ◽  
Vol 97 (2) ◽  
pp. 2087-2096 ◽  
Author(s):  
Sachin D. Ubarhande ◽  
Dharmpal D. Doye ◽  
Prakash S. Nalwade
2018 ◽  
Vol 27 (4) ◽  
pp. 523-536 ◽  
Author(s):  
Rahul K. Ambekar ◽  
Uttam D. Kolekar

Abstract Due to the dynamic nature of the mobile ad hoc network (MANET), all the nodes are mobile and generously connected to other nodes without the use of any fixed communications. Because of the random movement of nodes, the network topology is not predicted easily. Therefore, routing is one of the major challenging tasks in MANET. Significantly, the topology-hiding multipath routing protocol (TOHIP) is used to eliminate the topological exposure problem by transmitting the information through disjoint paths from the source to the destination. To select the optimal routing path, we have proposed the fractional lion algorithm to TOHIP (FL-TOHIP). Initially, the routing path is designed in MANET based on the existing TOHIP, which generates the number of disjoint routing paths. Then, the optimal path selection is done by the proposed fractional lion algorithm. To improve the solution searching, the fractional lion algorithm is adapted to the mathematical theory called fractional calculus. Finally, the performance of the proposed protocol is compared to the existing protocol using the delay, energy, and cost.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document