Available online at ScienceDirect. Procedia Computer Science 58 (2015 )
|
|
- Robert Lane
- 5 years ago
- Views:
Transcription
1 Available online at ScienceDirect Procedia Computer Science 58 (2015 ) Second International Symposium on Computer Vision and the Internet (VisionNet 15) Mathematical Analysis of Trust Computing Algorithms Thangakumar Jeyaprakash a, Rajeswari Mukesh b a.b Department of Computer Science and Engineering, Hindustan University No.1, RajivGandhi Salai, Padur, Chennai, Tamilnadu, India Abstract To overcome a frequent occurrence of routing loops due to communication link failure and to provide an ensured packet delivery among the Vehicular Ad-hoc Networks (VANET), an Optimized Node Selection Routing Protocol (ONSRP) of VANET has been implemented using a Trust Computing Algorithm. Basically, the time efficiency indicates how fast the algorithm runs. In this paper, the Trust Computing algorithm has been analyzed mathematically to find the time complexity of the algorithm currently chosen and hence achieved trusted communication and high packet delivery ratio of data transmission among the Vehicular Adhoc Networks. We could confirm that the ONSRP is optimal by comparing it to the Scalable Hybrid Routing (SHR) communication overhead and packet delivery ratio of the network from both analysis and simulation in the presence of link failures. Keywords: Mathematical Analysis; Routing protocol ; trust ; Vehicular Adhoc Networks; 1. Main text Vehicle to Vehicle Communication (V2V) is an active wireless transmission of data between neighbor vehicles that offers services for important safety improvements. The aim for V2V is essentially that each vehicle on the highway will be able to communicate with each other through Dedicated Short Range Communication (DSRC) for exchanging the messages dynamically. This V2V communications will provide active safety measurements that can assist and alert drivers in preventing 76 percent of the crashes on the roadway, thereby reducing fatalities, injuries and major damages that occur each year in the country. This is achieved by an efficient routing protocol without overhead communication which may lead to frequent communication link failure. In this paper, we analyzed the trust computing algorithm mathematically to find the time complexity of the algorithm to achieve a trusted communication and high packet delivery ratio. Martin et al 1 stated a topology-based routing protocol which discovers the position of the destination. Patroklos et al 2 evaluated a secure routing for Adhoc networks. Maxim Raya et al 3 provide a detailed threat analysis such as false information and Denial of Service etc. They also analyzed the robustness and carried out a quantitative assessment. Harsch et al 4 a security mechanism model and evaluated in Car to Car Consortium. Feilong Tang et al 5 proposed a protocol which reduce the number of hops between the source and the destination and increase the life time of networks. Jalali et al 6 proposed a system to identify the source node is selfish or not. The proposed fuzzy reputation system eliminates the selfish node from the network to maximize the performance of the networks. Khaleel et al 7 proposed a system with carry and forward messages for the utility of Road Side Units efficiently to route packets in VANETs. Vinayakra Jani 8 described the comparative analysis of MANET and VANET based on various design factors. Mahmoud Hashem Eiza and Qiang Niused 9 stated the determination of the reliable routes pre-emptively. Mohammad et al 10 proposed a scalable hybrid routing protocol which combines the protocols in such a way that, if the location information is The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license ( Peer-review under responsibility of organizing committee of the Second International Symposium on Computer Vision and the Internet (VisionNet 15) doi: /j.procs
2 106 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) degraded, it automatically uses the reactive routing. It starts with location-based routing and route discovery will be initiated, if the location routing is degraded. Albert Wasef et al 11 proposed a Validation Protocol (EMAP) for an efficient revocation checking process. Zhengming Li 12 has proposed a VANET based Ad-dissemination scheme to support secure packet transmission of data. ChiragBhalodia et al 13 stated when route break occurs, at the same time, the intermediate node will send a route error packet to source and source node reestablish an another route. Wafa Ben Jaballah et al 14 describes the attacks to the state-of-the-art IVC-based safety application and lead them to design a fast and secure multihop broadcast algorithm for vehicular communication. Mushtak Y. Gadkari et al 15 made an attempt to identify the different VANET protocols. 2. Proposed Work To avoid communication link failure and routing loops, we implemented an Optimized node selection routing protocol algorithm Vehicular Ad-hoc Networks; each node keeps a Flag Trust value in its routing table based on distance 17, direction and velocity of the nodes to calculate the trust value for transmission of data. 3.1 Distance of Nodes: N4 N1 N2 N5 N3 Fig. 1. Instance formation of VANET. In figure 1, Assume that in this example node N1, N2, N3, N4, N5 are moving in same direction and velocity. Distance (Do) = (Minimum (D1 D2 D3..Dn)) (1) D1 = Distance between the Last node of path 1 routing table and the Destination node, D2 = Distance between the Last node of path 2 routing table and the Destination node, DN = Distance between the Last node of path N routing table and the Destination node. (2) 3.2. Direction of Nodes: In Figure 1, N1 is a source node and N5 is a destination node. To identify the direction of nodes movement, a node calculates the direction of the neighbor node as follows.
3 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) Direction in degrees (Ao) = D (RWP (i, j) & Min (D1 D2 Dn) (i, j)) (3) D1 = Distance between the Last node of path 1 routing table and the Destination node, D2 = Distance between the Last node of path 2 routing table and the Destination node, DN = Distance between the Last node of path N routing table and the Destination node, D = Destination, RWP = Random way points in the network are. i, j = two successive random way points. 3.3 Velocity of nodes: We utilized the velocity of nodes as a performance parameter to develop our Flag Trust model. The velocity of nodes helps to determines the network topology mobility. It also plays a significant role in determining the estimated communication time between vehicles. At Time T1, Velocity (Vo) = V (Dn) V (N1 N2 N3 Nn) (4) Dn = Destination node, N1 = Velocity of Neighbor node 1 of Dn, N2 = Velocity of Neighbour Node 1 of Dn, Nn = Velocity of Neighbour Node 1 of Dn, Vo = Optimized Velocity. 3. Mathematical Analysis of Trust Computing Algorithm Trust Computing Algorithms are remarkably efficient for searching in an array of nodes. It works by comparing nodes for A[0.n-1]. If an optimized node is found to transmit the data packet from the source to the destination, the algorithm stops, otherwise the same operation is repeated to find the Optimized node. Algorithm: Trust Computing & Optimized Node O(n) : Let Do Minimum distance of the node (i,j), Ơ Direction of the node move towards the destination node and Ѵ Velocity of the neighbor node similar to the destination node //Implements the Trust Computing for the Optimised Node O(n) //Input: An Array of nodes [(A[0.n-1]] nearer to the destination //Output: Calculates the trust value to set the flag of the node 0 or 1 to find the Optimized nodes O(n). i 0; j 0; k 0 t_count α; d_threshold β; No of times data forwarded ɠ count 0; trust 0; for i 0 to n-1 && Do β do Do=Minimum_Distance_of_Node (i,j); Swap A[j]=A[i]; return A[j]; for j i+1 to (n-1-i) && Ơ A[n-1] do Ơ = ((Xi,Yi) (A[j], (A[n-1])));
4 108 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) swap A[k]=A[j]; return A[k]; for k i+j+1 to (n-1-i-j) && Ѵ A[n-1] do if V(A[k]) V (A[n-1]) return V(A[k]); swap O(n) = V(A[k]); α(o(n))= count ++; else return -1 if (α(o(n) ɠ )) SET flag (O(n)) = 1 else SET 0; Algorithm: To find the distance (i,j) : //Implements the Minimum_Distance_of _Node(i,j) //Input: An Array of nodes [(A[0.n-1]] nearer to the destination //Output: Calculates the distance value from node 0 n-1 i 0; j 0; vertex 0; distance 0; for i 0 to n 1 do{ for j 1 to n 2 do{ if (j!=i){ set x_pos1 [n(i) set X]; set x_pos2 [n(j) set X]; set y_pos1 [n(i) set Y]; set y_pos2 [n(j) set Y]; vertex = x_pos1*x_pos2 + y_pos1*$y_pos2; distance (i,j) = sqrt(vertex); print dist "Node i to j: ds(i,j) } } } 4.1 Mathematical Analysis of finding the Optimized node Algorithm: Let us denote C(n) 16, as the number of times the basic operation is to be executed to find the formula with the input size of n. The algorithm makes one basic operation with initial conditions with each loops executed which is repeated for the variable i within the bounds between 0 and n-1. Therefore we get the following sum for C(n). C(n) = (5)
5 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) Using standard formulas and some Manipulation, (6) and (7) follows (6) (7) General Plan for analyzing the efficiency of Algorithms 16 : 1. Find and decide the input size parameter 2. Identify the algorithm s basic operation to be executed C(n) 3. Find the properties such as worst case, best case and average case efficiency. 4. Find out the sum of basic operation. 5. Using standard formulae and rules of sum manipulation, find the time complexity of the algorithm and establish its order of growth According to the equation (7), Equation (8) becomes (8) (9) According to the equation (2)
6 110 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) (10) 2 (11) According to Equation (11), let us compare n (n-1)/2 and n 2 2 ½ = +ve Constant 16 (12) Thus, the Trust Computing algorithm has been analyzed mathematically to find the time complexity of the algorithm and finding the optimized node for the transmission of data from the source node to the destination to achieve a trusted communication and high packet delivery ratio. 4. Results & Comparisons More specifically, we can confirm that the ONSRP is optimal 18 by comparing to the Scalable Hybrid Routing (SHR) communication overhead and packet delivery ratio. Fig. 2 & 3, shows the performance of ONSRP and Scalable hybrid routing protocols. The graph shows a raise in the transmission of packets of ONSRP compared to SHR. On the other scenario, for ONSRP, the increasing density is reducing the communication overhead also by avoiding the frequent route discovery process. Fig. 2.Performance - Packet Delivery Ratio
7 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) a. Fig. 3. Performance - Delay Performance Metrics Node Density SHR ONSRP Delay (Sec) PDR Delay(Sec) PDR Delay (Sec) PDR Delay(Sec) PDR Table 1: Performance Measures In Table 1, the performance metrics such as delay and packet delivery ratio for the node density up to 100 of ONSRP and SHR has been compared and the result analysis shows the ONSRP is optimal in the presence of link failures with efficient packet delivery ratio. Conclusions In this paper, we have analyzed mathematically to find the time complexity of the algorithm in finding the optimized node in the vehicular Adhoc networks for the data dissemination from the source node to the destination to achieve a trusted communication and high packet delivery ratio. Hereby, we could confirm the optimality of the ONSRP by comparing to the Scalable Hybrid Routing (SHR) communication overhead and packet delivery ratio of the network from both analysis and simulation in the presence of link failures.
8 112 Thangakumar Jeyaprakash and Rajeswari Mukesh / Procedia Computer Science 58 ( 2015 ) References 1. M Mauve and Jörg Widmer,"A Survey on Position-Based Routing in Mobile Adhoc Networks", IEEE Network, pp 30-40, December P Argyroudis et al, "Secure Routing for Mobile Adhoc Networks", IEEE communication Surveys, Third Quarter, Volume 7, No 3, pp 2-20, M Raya and JeanPierre Hubaux ",The Security of Vehicular Ad Hoc Networks",SASN 05,ACM, November 7, 2005, Alexandria, Virginia, USA. 4. C Harsch et al "Secure Position-Based Routing for VANETs",IEEE Computer Society, pp 26-31, F Tang, Minyi GUO, Minglu LI, Cho-Li WANG and Mianxiong Dong, "Secure Routing for Wireless Mesh Sensor Networks in Pervasive Environments",International Journal Of Intelligent Control And Systems Vol. 12, No. 4, ,December M Jalali et al,"a Fuzzy Reputation System in Vehicular Ad hoc Networks", Procedia Computer Science,5 (2011) K Mershad, Hassan Artail, and Mario Gerla,"We Can Deliver Messages to Far Vehicles", IEEE Transactions On Intelligent Transportation Systems, Vol. 13, No. 3, September P Vinayakray Jani,"Routing Protocols For Mobile And Vehicular Ad Hoc Networks: A Comparative Analysis", ACTA Technica Corviniensis, September M Hashem Eiza and Qiang Ni, "An Evolving Graph-Based Reliable Routing Scheme for VANETs", IEEE Transactions On Vehicular Technology, Vol. 62, No. 4, May M Al-Rabayah and Robert Malaney, Member, IEEE, A New Scalable Hybrid Routing Protocol for VANETs, IEEE Transactions On Vehicular Technology, Vol. 61, No. 6, July A Wasef and Xuemin (Sherman) Shen,"EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks", IEEE Transactions On Mobile Computing, Vol. 12, No. 1,,pp 78 90,January Z Li, Congyi Liu, and Chunxiao Chigan,"On Secure VANET-Based AdDissemination With Pragmatic Cost and Effect Control",IEEE Transactions On Intelligent Transportation Systems, Vol. 14, No. 1, March 2013, pp C Bhalodia et al,"modified Route Maintenance in AODV Routing Protocol",International Journal of Advance Engineering and Research Development (IJAERD),Volume 1,Issue 5,May 2014, e-issn: ,pp W Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E. Palazzi, "Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication",IEEE Transactions On Intelligent Transportation Systems, Vol. 15, No. 1, February M Gadkari et al," VANET: Routing Protocols, Security Issues and Simulation Tools", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 3, Issue 3 (July-Aug. 2012), PP A Levitin, Introduction to the design and analysis of Algorithms, Villanova University, Pearson, J Thangakumar, Nancy Vinoliya, Appraising Vehicular Adhoc Network Routing Protocols using NS2, International Journal of Information & Computation Technology, pp , J Thangakumar, Rajeswari Mukesh A survey of Mobility Models of Vehicular Adhoc Networks and Simulators, International Journal of Electronics and Information Engineering(IJEIE), Vol.2, No.2, pp , June 2015.
An Optimized Node Selection Routing Protocol for Vehicular Ad-hoc Networks A Hybrid Model
8 JOURAL OF COMMUICATIOS SOFTWARE AD SYSTEMS, VOL., O., JUE An Optimized ode Selection Routing Protocol for Vehicular Ad-hoc etworks A Hybrid Model Thangakumar Jeyaprakash, and Rajeswari Mukesh Original
More informationAppraising Vehicular ADHOC Networks Routing Protocols Using NS2
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 491-498 International Research Publications House http://www. irphouse.com /ijict.htm Appraising
More informationAvailable online at ScienceDirect. Procedia Computer Science 46 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the
More informationA Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs
A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationASurveyonTopologybasedReactiveRoutingProtocolsinVanets
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 18 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More informationPerformance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,
More informationEigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet
Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet Chidambar P.Inamdar Research Scholar, Bharathiar Uniniversity, Coimabatore Abstract-Mobile node communication
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 288 295 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) M-DART based Asynchronous
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationGSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationSybil Attack Detection and Prevention Using AODV in VANET
Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationImpact of Hello Interval on Performance of AODV Protocol
Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive
More informationSimulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET
International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ISSN 2277 8322 Simulation and Performance Analysis of and on Varying and Number of Nodes in MANET Arun Jain 1, Ramesh Bharti
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationPerformance Evaluation in MANET by Using NCPR Scheme with Cluster Technique
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR
More informationA Dynamic Time Scalable Hybrid Location based Ad hoc Routing Protocol
A Dynamic Time Scalable Hybrid Location based Ad hoc Routing Protocol Priyanka P Jadhav 1, Manoj M. Dongre 2 1, 2 Electronics and Telecommunication Department, Ramrao Adik Institute of Technology, Navi
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationSIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationAvailable online at ScienceDirect. Procedia Computer Science 94 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 94 (2016 ) 353 358 The 11th International Conference on Future Networks and Communications (FNC-2016) Impact of Varying
More informationA Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet
A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India
More informationCongestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network
Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Bhagyashri P. Deshpande 1, Dr.A.S.Alvi 2 1 M.E(CSE) PRMIT&R, Badnera, Amravati 2 Professor,Dept. of CSE PRMIT&R,Badnera,
More informationDetection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack
More informationPerformance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario
Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationQUANTITATIVE ANALYSIS OF VANET ROUTING PROTOCOLS IN URBAN AND HIGHWAY SCENARIOS
ISSN: 0976-1353 Volume 23 Issue 6 OCTOBER 2016 (SPECIAL ISSUE) QUANTITATIVE ANALYSIS OF VANET ROUTING PROTOCOLS IN URBAN AND HIGHWAY SCENARIOS Rachana #1 # MTech, Computer Science and Engineering, P.D.A
More informationEFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS
EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationAvailable online at ScienceDirect. Procedia Computer Science 89 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 162 169 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) A Distributed Minimum
More informationSimulation of Vehicular Ad-hoc Network Routing Protocols with a Performance Analysis
86 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 11, NO. 2, JUNE 2015 Simulation of Vehicular Ad-hoc Network Protocols with a Performance Analysis Thangakumar Jeyaprakash, and Rajeswari Mukesh Original
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More informationCluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS M. A. Berlin Department of computer science and engineering R. M. D Engineering College
More informationPERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET
PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,
More informationA Review on Vehicular Ad-Hoc Network
A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,
More informationA Survey on Path Weight Based routing Over Wireless Mesh Networks
A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationRegression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique
Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationII. ROUTING CATEGORIES
ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses
More informationQoS Based Evaluation of Multipath Routing Protocols in Manets
Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationSEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS
SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara
More informationDetection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
More informationA Survey on Wireless Routing Protocols (AODV, DSR, DSDV)
RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum
More informationUnderstanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol
IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationPerformance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
More informationImproving Performance in Ad hoc Networks through Location based Multi Hop Forwarding
Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer
More informationSelfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets
Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42
More informationENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationAn Efficient Vehicle-to-Vehicle communication protocol to avoid the congestion in VANETs.
An Efficient Vehicle-to-Vehicle communication protocol to avoid the congestion in VANETs. kaveri G 1, Sujata M 2 1 PG Student, Dept. of CSE, GECW, Kalaburagi, India 2 Professor and Head, Dept. of ISE,
More informationImplementation: Detection of Blackhole Mechanism on MANET
Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,
More informationAnalysis the Performance of Vehicles Ad Hoc Network
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 124 (2017) 682 690 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationPerformance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationStudy of Route Reconstruction Mechanism in DSDV Based Routing Protocols
Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationAN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationCOMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK
International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationDISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam
More informationPERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS
PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationOVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS
OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS 1 Anupam Jain, 2 Minakshi Halder 1 M.E. Scholar, 2 Assistant Professor Electronics and Communication Engineering (ECE) Acropolis Institute of Technology
More informationPrevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing
Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based
More informationA Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes
A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,
More information