scholarly journals Secure Energy Trade-off Analysis in Wireless Ad-Hoc Networks using Novel Scalable & Secure Management Procedure

Wireless Mobile ad-hoc networks are increased with respect to communication and computation in data transmission between different nodes. Node relay configurations overlay routing is a complex task which improve the properties of routing hierarchy without change basic standards of communication routing scenarios. Sensitivity of different potentials of ad-hoc networks, security concerns is a challenging task in wireless ad-hoc networks. Because of resource limitations present in data management via key scenario with transmission is one of the basic design to support secure data transmission and improve network performance with respect to scalability and efficiency. So that, in this paper, we propose and implement high level security concern i.e. Novel Scalable & Secure Management Schema (NSSMS) for wireless ad-hoc networks. For the first time we extend approach to support unital key-distribution methodology to support high network security formalisms to improve network scalability and key based data sharing probability between different nodes for wireless network communications. Obtained results of proposed approach give better improvement to improve network scalability with overall network performance; we also show significant results with comparison of existing results.

Secure data transmission in ad hoc related wireless networks is an aggressive concept in present node to node communication. Secure energy trade-off between different node communication is also major challenge in wireless ad hoc networks. To provide efficient communication with secure data aware between nodes in ad hoc wireless networks. So that in this paper proposes and introduces Advanced Secure Energy Aware Trade-off Model (ASEATM) for energy trade results in wireless ad hoc networks, also use Elliptic curve cryptography to describe/ provide source authentication with respect to efficient communication in wireless networks. Our experimental results show efficient secure communication in wireless ad hoc networks with comparison to existing approaches in real time scenario


Author(s):  
Essam Natsheh ◽  
Adznan B. Jantan ◽  
Sabira Khatun ◽  
Shamala Subramaniam

Routing is an important functional aspect in wireless ad hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes’ mobility, the efficiency of a dynamic ad hoc routing protocol depends highly on updating speed of network topology changes. To achieve continuous updated routing tables, the nodes periodically broadcast short Hello messages to their neighbors. Although benefits of these messages have been proven, many studies show some drawbacks for these messages. In this paper, we adaptively optimize the frequent needs of those messages using a fuzzy logic system. The proposed fuzzy algorithm is used to model the uncertainty measurements for updating local connectivity successfully in time. Extensive performance analysis via simulation proves the effectiveness of the proposed method to improve the accuracy of neighborhood information and, hence, overall network performance.


Author(s):  
Abdalrazak Tareq Rahem ◽  
Mahamod Ismail ◽  
Nor Fadzilah Abdullah ◽  
Mohammed Balfaqih

<p><span>The resent application of wireless ad hoc networks (WANET) demands a high and reliable data load. The simultaneous transfer of large amounts of data different nearby sources to nearby destinations in a massive network under these circumstances results in the possibility of network congestion. Congestion is an extremely unwanted condition because it creates extra overhead to the already deeply loaded environment, which ultimately leads to resource exhaustion, and can lead to packet drops and retransmission at either the MAC or upper layers. We present a lightweight congestion control and early avoidance congestion control scheme, which can effective control congestion while keeping overhead to a minimum. This scheme is based on the Cross-layer between the MAC and network layers lead to early detection of congestion. With the help of node cooperation the sender node is triggered to find an alternative route based on TMT. This mechanism controls the network resources rather than the data traffic. Detailed performance results show enhancement in the throughput and packet delivery ratio, as well as a reduction in packet drop. Generally, network performance increases.</span></p>


Sign in / Sign up

Export Citation Format

Share Document