ad hoc routing protocol
Recently Published Documents


TOTAL DOCUMENTS

120
(FIVE YEARS 6)

H-INDEX

11
(FIVE YEARS 1)

2021 ◽  
Vol 14 (3) ◽  
pp. 87-103
Author(s):  
Karan Singh ◽  
Rajeev Gupta

MANET has emerged as an eager field for supporting disaster response and prevention applications like climate and weather observation, tracking, tsunamis, wildfire and emergency rescue operations, underwater level navigation, etc. In this paper, a new ad-hoc routing protocol named SO-AODV (Secured and Optimized Ad-Hoc On-Demand Distance Vector) is proposed for secured and optimized communication in any disaster like situations. For shortest route selection a technique called pigeons swarm optimization (PiSO) is used that also leads to minimize the hop count in selected optimal route. Lightweight digital watermarking (LDW) is used that ensures the authenticity of “hello” packets. For security of event messages, cyphertext stealing technique (CST) is used with encryption qu-Vanstone elliptic curve cryptography (qV-ECC) based public key cryptography. The qV-ECC generates public key. Experiments are conducted using NS2 and performance is evaluated and compared over AODV for several metrics (i.e., packet delivery ration, throughput, end-to-end delay, security, and hop count).


2018 ◽  
Vol 7 (3.4) ◽  
pp. 17
Author(s):  
Roshan Ulla Khan ◽  
Vijayalakshmi A. PhD

Background and Objective: Most of the research that are carried in ad hoc routing protocol is through simulation. While working with a simulator, the codes are enclosed in a component that is accessible to all the developers. The difficulty arises as there is no enough documentation and users find it difficult to modify different C++ and TCL files. Even if one component is modified then the entire Network Simulator-2 (NS-2) suite must be reconfigured. Cloning the protocol manually takes a lot of time and prone to error. Our objective is to ease the work of developers and researchers by showing the procedure to clone the AODV protocol automatically using a script. Methodology: In this study, a shell script is developed that will clone the AODV protocol by modifying 18 C++ and TCL files of the protocol and NS-2 suite by automatically inserting the code in exact files at exact position. It also configures the NS-2 and installs the entire NS-2 suite along with setting the path in .bash files. Results: In this research work, a comparison of cloned protocol with AODV protocol is done based on throughput time and packet loss metrics and the results generated are exactly same for both the protocols. The results of the study reveal that the proposed script clones the AODV protocol successfully. Conclusion: This work proves that the proposed script can clone the AODV protocol faster with just one execution of shell script. This methodology will save the time and help the developers or research to focus more on their study on the protocol. 


Author(s):  
K. Vinayakan ◽  
M. V. Srinath

There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.


Sign in / Sign up

Export Citation Format

Share Document