Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model

2019 ◽  
Vol 66 ◽  
pp. 103358 ◽  
Author(s):  
Subramanian Balaji ◽  
Eanoch Golden Julie ◽  
Yesudhas Harold Robinson ◽  
Raghvendra Kumar ◽  
Pham Huy Thong ◽  
...  
2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Sungwook Kim

Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. Due to characteristics like temporary topology and absence of centralized authority, routing is one of the major issues in ad hoc networks. In this paper, a new multipath routing scheme is proposed by employing simulated annealing approach. The proposed metaheuristic approach can achieve greater and reciprocal advantages in a hostile dynamic real world network situation. Therefore, the proposed routing scheme is a powerful method for finding an effective solution into the conflict mobile ad hoc network routing problem. Simulation results indicate that the proposed paradigm adapts best to the variation of dynamic network situations. The average remaining energy, network throughput, packet loss probability, and traffic load distribution are improved by about 10%, 10%, 5%, and 10%, respectively, more than the existing schemes.


2013 ◽  
Vol 798-799 ◽  
pp. 407-410
Author(s):  
Hong Song Chen ◽  
Xue Wei Shang ◽  
Fei Ye

With the rapid development of mobile ad hoc network, energy and trust are important to the network. Energy consumption and trust routing scheme are the main issues in mobile ad hoc network. Trust routing is related to many factors such as hop numbernode residual energy and node behavior. To use the multi-source information, multi-agent information fusion method is used to design trust routing scheme. The definition of trust routing is proposed. Ad hoc On-Demand Distance Vector (AODV) routing protocol is used to validate trust routing scheme, Route Reply (RREP) Message is extended to record node residual energy and behavior information. NS-2 simulator is used to simulate different network scenarios. Simulation results show that low power trust routing scheme can improve the security and efficiency of network, the scheme is sensitive to node residual energy, so it extends the service lifetime of the network.


Sign in / Sign up

Export Citation Format

Share Document