geographic routing protocol
Recently Published Documents


TOTAL DOCUMENTS

100
(FIVE YEARS 20)

H-INDEX

13
(FIVE YEARS 2)

2022 ◽  
Vol 13 (2) ◽  
pp. 0-0

Due to the absence of routing initiation, the routing protocol requires a secure message transition. The key downside is that there are many current routing protocols. The big downside is the inability of the node to give a message when the attackers are routing. The key attack in the proposed routing model is Distributed Denial of Service (DDOS). The Protected Geographic Routing Protocol (SGRP) is the assured routing carried out in the proposed work. The Protected Geographic Routing Protocol (SGRP) will improve the efficiency of the transmission method by choosing a specific source node. The paper suggested that the Protected Spatial Routing Protocol (PSRP) would recognize and isolate such threats. Several modeling time estimation studies have been carried out to analyze the simulation time and the efficiency of the proposed routing technique. The proposed routing technique demonstrates the performance by calculating the Packets Delivery Ratio(PDR) and Energy consumption. The Routing protocol is used in many applications such as the Industrial Internet of Things (IoT)


Author(s):  
Chen Chen ◽  
Huan Li ◽  
Xi’ang Li ◽  
Jianlong Zhang ◽  
Hong Wei ◽  
...  

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Francis H. Shajin ◽  
Paulthurai Rajesh

Purpose This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information. Design/methodology/approach Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security. Findings TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation. Originality/value The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.


2020 ◽  
Vol 13 (3) ◽  
pp. 319-325
Author(s):  
Saravanan Palani ◽  
Logesh Ravi ◽  
Vijayakumar Varadarajan ◽  
Subramaniyaswamy Vairavasundaram ◽  
Xiao-Zhi Gao

Background: Vehicular Ad-hoc Network is the subset of Mobile Ad-hoc Network, Intelligent Transport System and Internet of Things. The acting nodes in VANET are the vehicles on the road at any moment. Objective: The anonymity character of these vehicles is opening the opportunity for malicious attacks. Malicious routes increase the data retransmission and hence, the performance of routing will be degraded. The main objective this work is to identify the malicious routes, avoid the data transmission using these routes and increase the packet delivery ratio. Methods: In the proposed system called Geographic Routing Protocol with Masked data, two binary- codes called mask and share have been generated to identify the malicious route. The original data is encoded using these binary-codes and routed to the destination using the geographic routing protocol. It is reconstructed at the destination node and based on the encoding technique the malicious routes and malicious nodes are identified. Simulations were conducted with varying speed and varying network size in 20 km2 geographical area. Results: The average packet delivery ratio with varying speed is 0.817 and with varying networksize is 0.733. Conclusion: The proposed geographical routing protocol with masked data technique outperforms than traditional geographic protocol and Detection of Malicious Node protocol, by 0.102 and 0.264 respectively with different speeds and by 0.065 and 0.1616 respectively with different network size.


Sign in / Sign up

Export Citation Format

Share Document