Reduced End-To-End Delay for Manets using SHSP-EA3ACK Algorithm

K. Thamizhmaran*, M. Anitha**, Alamelu Nachiappan***
* Assistant Professor, Department of Electronics and Communication Engineering, Annamalai University, Tamil Nadu, India.
** Associate Professor, Department of Electrical and Electronics Engineering, Annamalai University, Tamil Nadu, India.
*** Professor and Head, Department of Electrical and Electronics Engineering, Pondicherry Engineering College, Puducherry, India.
Periodicity:May - July'2018


Mobile Ad-hoc Networks (MANETs) are the significant technologies among various wireless communication technologies, where all the nodes are mobile and can be connected dynamically using wireless link in a random manner. The aim of in this suggested work is to avoid the attacker from forging acknowledgment packets using Enhanced Adaptive 3 Acknowledgment (EA3ACK). So, the authors have introduced a new technique of Intrusion Detection System (IDS) named EA3ACK using EAACK with Secure Hybrid Shortest Path Routing (SHSP), which is designed only for MANETs for reducing delay. Acknowledge method is implemented to rectify any type of attacks on the network with SHSP routing algorithm besides rectifying weekness results of previous work through the Network Simulator-2. Finally in this proposed scheme, a secure communication is provided with reducing overhead, delay, and packet loss using EA3ACK with SHSP algorithm increasing the efficiency of network topology.


Mobile Ad-hoc Networks, Watchdog, Misbehaviour Report Authentication (MRA), EA3ACK, Hybrid Shortest Path Routing, End-to-End Delay, Routing Overhead.

How to Cite this Article?

Thamizhmaran.K., Anitha. M., and Nachiappan.A. (2018). Reduced End-To-End Delay for Manets using SHSP-EA3ACK Algorithm. i-manager’s Journal on Communication Engineering and Systems, 7(3), 9-15.


[1]. Bai, F., Sadagopan, N., Krishnamachari, B., & Helmy, A. (2004). Modeling path duration distributions in MANETs and their impact on reactive routing protocols. IEEE Journal on Selected Areas in Communications, 22(7), 1357-1373.
[2]. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless Communications and Networking Conference, 2005 IEEE (Vol. 4, pp. 2137-2142). IEEE.
[3]. Basabaa, A., Sheltami, T., & Shakshuki, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Computer Science, 32, 571-578.
[4]. Bulut, E., Geyik, S. C., & Szymanski, B. K. (2010, June). Conditional shortest path routing in delay tolerant networks. In World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a (pp. 1-6). IEEE. [5]. Choi, J., Cha,
[5]. Choi, J., Cha, S. H., Park, G., & Song, J. (2005). Malicious nodes detection in AODV-Based Mobile Ad Hoc Networks. GESTS Trans. Comp. Science and Engg, 18(1), 49-55.
[6]. Gayathri, A., & Narayanasamy, P. (2015). Security in MANET's by using detective signature techniques. Journal of Computer Science, 11(3), 526-533.
[7]. Janzadeh, H., Fayazbakhsh, K., Dehghan, M., & Fallah, M. S. (2009). A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Generation Computer Systems, 25(8), 926-934.
[8]. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for
[9]. Liang, G., Agarwal, R., & Vaidya, N. (2010, March). When watchdog meets coding. In INFOCOM, 2010 Proceedings IEEE (pp. 1-9). IEEE.
[10]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536-550.
[11]. Prabu, K., & Subramani, A. (2012). Performance comparison of routing protocol in MANET. Int. J. of Adv. Research in Com. Sci. and Soft Engineering, 2(9), 388- 392.
[12]. Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.
[13]. Sahadevaiah, K., & PVGD, P. R. (2011). Impact of security attacks on a new security protocol for mobile ad hoc networks. Network Protocols and Algorithms, 3(4), 122-140.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.