Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique

2020 ◽  
Vol 69 (3) ◽  
pp. 1077-1086 ◽  
Author(s):  
Mohamed Elhoseny ◽  
K. Shankar
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Mohammad Sirajuddin ◽  
Ch. Rupa ◽  
Celestine Iwendi ◽  
Cresantus Biamba

Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.


2021 ◽  
Vol 297 ◽  
pp. 01065
Author(s):  
K. Saravanan ◽  
S. Anthoniraj ◽  
S. Kumarganesh ◽  
T. Senthil Kumar ◽  
K. Martin Sagayam

Mobile Ad Hoc Network (MANET) is an Emergency transportable Ad-Hoc network, which is a significant module of the Internet of Effects and has been extensively practiced in smart transportation systems in new existences. In this proposed system using Web-based Multi-Layer protocols for Emergency Data Transmission (WMLP), Dynamic multi-priority message order management method it is used to reduce the data transmission delay in entire networks. To fulfill the real-time limitations of emergency data, we proposed WMLP, a novel Networks web-like transmission mechanism for emergency data. We create a spiderweb-like perfect to limit the exact area. Source nodes send out demand terminus nodes send confirmed host in this controlled area to develop well-organized broadcast paths. The dynamic multi-priority file administration method it is managed some of packets level by level. In this protocols mining, necessary packs and giving the first importance emergency messages are function and considered for transmission failed packages also. When transmitting packets, we are using restricted containers strategy to choose the next hop.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 305
Author(s):  
W Ancy Breen ◽  
S Durga Devi ◽  
E Sushmitha ◽  
V Suveetha

MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANETS are highly vulnerable and are prone to malicious attack. Security issue is highly challenging in MANET. Understanding the different form of possible attacks and providing good security solutions is important for secure data transmission between nodes. The most dangerous attack among these attacks is Gray-hole attack. In this paper, it proposed a method for reducing the Gray-hole attack. Our proposed algorithm MAODV identifies the malicious node before the data transmission process and it greatly reduces the dropping of data packets. 


Sign in / Sign up

Export Citation Format

Share Document