Quality of Service (QoS) Based Wireless Network for Mobile Ad Hoc Networks

A. Charles*
Department of Electronics and Communication Engineering, Annamalai University, Chidambaram, Tamil Nadu, India.
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jwcn.10.2.18934


Quality of Service (QoS) requirements are possible with actual transmission of updates for wireless applications typically included in mission critical applications such as military use or disaster recovery. This research paper proposes an efficient Secure Quality Oriented Distributed (S-QOD) Secure Enhanced Adaptive 3 Acknowledgment (S-EA3ACK) and implements a new on-demand wireless intrusion detection system. S-QOD can improve a best performance of output quality (QoS) to reduce transmission delay, transmission time and also increase network communication throughput for S-EA3ACK using Enhanced Adaptive Acknowledgement (EAACK) DSA (Digital Signature Algorithm) with MAJE4 symmetric cryptography specially designed for MANET through Network Simulator-2.34 (NS2) to implement it.


Painter, Quality of Service (QoS), Quality Oriented Distribution (QOD), Enhanced Adaptive ACKnowledgement (EAACK), Enhanced Adaptive 3 ACKnowledgment (EA3ACK), Cryptography, MAJE4 Algorithm.

How to Cite this Article?

Charles, A. (2022). Quality of Service (QoS) Based Wireless Network for Mobile Ad Hoc Networks. i-manager’s Journal on Wireless Communication Networks, 10(2), 20-25. https://doi.org/10.26634/jwcn.10.2.18934


[1]. Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175-192.
[2]. Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc networks. In Resource Management in Wireless Networking (pp. 365-400). MA: Springer.
[3]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536-550.
[4]. Reddy, T. B., Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2006). Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Ad Hoc Networks, 4(1), 83-124.
[5]. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089-1098.
[6]. Sheena, M., & Jacob, P. K. (2008). Use of novel algorithms MAJE4 and MACJER-320 for achieving confidentiality and message authentication in SSL & TLS. International Science Index, Computer and Information Engineering, 2(3), 730-736.
[7]. Shen, Z., & Thomas, J. P. (2008). Security and QoS selfoptimization in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 7(9), 1138-1151.
[8]. Thamizhmaran, K. (2016). Performance evaluation of EA3ACK in different topology's using EAACK for MANET, i-manager's Journal of Information Technology, 5(4), 5-10. https://doi.org/10.26634/jit.5.4.10332
[9]. Thamizhmaran, K., Anitha, M., & Nachiappan, A. (2018). Reduced end-to-end delay for MANETs using SHSP-EA3ACK algorithm, i-manager's Journal on Communication Engineering and Systems, 7(3), 9-15. https://doi.org/10.26634/jcs.7.3.14309
[10]. Thamizhmaran, K. (2020a). Acknowledgement based topology control using hybrid cryptography for MANETs, i-manager's Journal on Information Technology, 9(2), 36-44. https://doi.org/10.26634/jit.9.2.17852
[11]. Thamizhmaran, K. (2020b). Cluster based data collection scheme for VANET, i-manager's Journal on Software Engineering, 14(4), 34-38. https://doi.org/10.26634/jse.14.4.17822
[12]. Zhang, Y., & Gulliver, T. A. (2005, August). Quality of service for ad hoc on-demand distance vector routing. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, (Vol. 3, pp. 192-196). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.