Different Parameters of Topology-Based Wireless Acknowledgements in MANETS

K. Thamizhmaran*
Department of Electronics and Communications Engineering, Government College of Engineering, Bodinayakkanur, Theni, India.
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jwcn.10.2.18933

Abstract

The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed system. Different topology sizes and node sets were used, and the results were compared to those of some closely related IDS mechanisms.

Keywords

MANET, Watchdog, EAACK, S-EA3ACK, MRA, MARS4.

How to Cite this Article?

Thamizhmaran, K. (2022). Different Parameters of Topology-Based Wireless Acknowledgements in MANETS. i-manager’s Journal on Wireless Communication Networks, 10(2), 1-7. https://doi.org/10.26634/jwcn.10.2.18933

References

[1]. Basabaa, A., Sheltami, T., & Shakshuki, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Computer Science, 32, 571-578. https://doi.org/10.1016/j.procs.2014.05.462
[2]. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109-120.
[3]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536-550. https://doi.org/10.1109/TMC.2007.1036
[4]. Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.
[5]. Thamizhmaran, K. (2012). Secure Routing Protocol in MANET–A Survey. International Journal of Advance Research in Technologs, 3(3), 9-14.
[6]. Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. imanager's Journal on Information Technology, 5(4), 5-10. https://doi.org/10.26634/jit.5.4.10332
[7]. Thamizhmaran, K. (2020). Cluster based data collection scheme for VANET. Journal on Software Engineering, 14(4), 34-38.
[8]. Thamizhmaran, K. Anitha, M. & Nachippan, A. (2017). Comparison and parameter adjustment of topology based (S-EA3ACK) for MANETs. International Journal of Control Theory and Application, 10(30), 423-436.
[9]. Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues, 7(4), 12-17.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.