Problem statement:In mobile ad hoc networks there are a number of challenges in providing quality of service routing with energy efficiency and load balancing. Most routing protocols do not consider the problem of load balance. A routing protocol called energy Efficient Ad-hoc on Demand Vector (E 2 AODV) is proposed. It addresses the quality of service issues such as throughput, end to end delay, load distribution and energy. Approach: This study presents a scheme to balance the load with energy efficiency considering both congestion and the nodes energy usage. A threshold value was used to judge if intermediate node was overloaded, variable and changing along with nodes interface queue length around the backward path. Results: The routing protocol called energy Efficient Ad hoc on Demand Vector (E 2 AODV) that is intended to provide a reliable transmission with low energy consumption was compared with Ad-hoc on Demand Vector (AODV) in terms of the packet delivery ratio, average end to end delay, load distribution and node energy consumption. Conclusion/Recommendation: E 2 AODV protocol chooses an optimum path with low energy usage. It provides a better scheme to balance the load with energy efficiency and packet delivery ratio. It can be further enhanced as a secure routing protocol for mobile ad-hoc networks.
Secure routing is the process of selecting safe and unthreatened paths in a network along which to send network traffic. There is a strong need for routing security in wireless networks, because there is a dramatic increase in routing attacks in recent years and directly affects the performance of the network. In this paper we present a Transactions Based Secure Routing (TBSR) protocol for data transmission. Here Cognitive Agents (CAs) with Behaviors-Beliefs (BB) model are placed on routers to generate beliefs over the routers functionalities w.r.t. genuinity and various transactions are classified based on the Transaction Subtlety Levels (TSL). These two factors are used in determining secure paths for data transmission of varied security levels and there by enhancing the network performance. The results are presented to demonstrate the routing delay, latency, Quality of Service(QoS), and throughput.intention of flooding request to the router affecting the availability. Packet mistreating attacks: In this type of attack, the router is injected with malicious codes, which simply mistreats the packets. This type of attack is very difficult to find and debug. Routing table poisoning: Routing table poisoning means the unwanted or malicious change in routing tables. This is carried out by editing the routing information update packets that are advertised by routers. This attack can cause severe damage in the network by entering wrong routing table entries in the routing table.Hit-and-run attacks: This attack is also called test attack where the attacker injects malicious packets into the router and sees if the network is on line and functioning or not. If yes, an attacker sends further more malicious packets to harm the router. This type of attack is hard to identify and can cause severe damage to the routers work. Persistent attacks: Unlike hit-and-run attack, in this attack, an attacker repeatedly injects malicious packets into the router causing the router to exploit vulnerabilities. This type of attack is a bit easier to detect compared with other router attacks.
Routing in Mobile Ad hoc Networks (MANETs) is a complex one due to the absence of any central coordinator and infrastructure. Congestion is one of the prominent reasons for link-failure in network due to the heavy traffic which leads to failure of nodes, network partition and topology change. Due to power drainage among nodes, network topology changes and the nodes should be well adaptive to respond quickly to the changes. Various existing routing protocols forward the data packets towards the destination through the path having less number of hop counts. However, these protocols do not minimize the traffic load in the network and thus causes congestion which reduces the network operation. A routing protocol called Efficient Path Selection (EPS) is proposed which enhances the quality of services' issues such as Packet Delivery Ratio, End to End delay, Energy Consumption and also provide secure transmission of data packets. This paper provides secure and efficient path routing. The simulation signifies that proposed protocol provides reliable secure transmission than the existing Implicit Source Routing (ISR) protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.