A Mobile Ad hoc NETwork (MANET) is a dynamically formed self-configured network by an autonomous system of mobile nodes connected by wireless links. With the advancements of wireless technology, the necessity of Quality of Service (QoS) is increasing rapidly. Developing QoS constraint routing protocol for MANETs is still a challenging task. As the nodes are free to move randomly, most routing protocols for MANETs are susceptible to node mobility. As routing protocol has to decide which route is able to fulfill the requirement of the desired QoS, routing is the most important part to accomplish the specified application with desired QoS metrics. This paper is based on design of such a kind of proposed MANET algorithm that will estimate the available bandwidth throughout the path by assigning priority. Based on available bandwidth, packets are transferred from source to destination of the applications in queue based on priority. The proposed algorithm is implemented and simulated using NS-2 simulator. Results of our approach show that new protocol can significantly reduce overheads and decrease overall end-to-end delay.
Background/Objectives: To mitigate network from amalgam attacks, this study is focussed on designing an efficient approach that can prevent the networks from intruders and secure the communication. Methods: A crossbreed approach, named 'MOpt Shield,' is proposed in this study. This proposed protocol utilizes the efficacy of the existing Cuckoo Search and Firefly Optimization Algorithm on basic AODV protocol along with the promising factors of the Intrusion Detection System. The proposed protocol is simulated using an NS-2 simulator with two different simulation scenarios, and PDR, Throughput, PLR, and Delay parameters are considered performance measures for the same. Findings: The proposed protocol finds the best selected nodes for communication and prepare separate list for the doubted nodes which further analyzed for attacker or non-attacker nodes. This will help to identify the best path with high energy and other capabilities for the efficient transmission of data. The performance of this proposed protocol is analyzed under 5 attacker nodes in which 2 are blackhole and 3 are DoS attacker nodes. For simulation, the scenario includes minimum 5 connections and maximum 25 connections between the 50 nodes with CBR traffic and 20m/s speed. The evaluated results show the astounding performance of the proposed protocol over the other existed protocols in terms of PDR, Throughput and Delay, and hence it reveals its capabilities. Novelty/Applications: The proposed protocol effectively handles the amalgam attacks and its novelty lie in its features of hybrid optimization and intrusion detection approach to find the route of transmission and the trusty nodes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.