Secure Dynamic Wireless Communication in MANET

V. Rajesh Kannan *
Department of Electronics and Communications Engineering, Annamalai University, Tamil Nadu, India.
Periodicity:July - December'2022
DOI : https://doi.org/10.26634/jwcn.11.1.18936

Abstract

Due to the mobility of the nodes, the topology often changes, causing the link to fail. Lack of infrastructure support and limited resources are the main causes of dishonest and uncooperative nodes, and in finding a route to a destination and opening new routes. As a result of the frequent discovery, there is large network congestion that occurs. Multipath routing protocols are designed to find multiple routes to a target, and switch to a backup secondary path if the primary route is violated to avoid this. These protocols also provide better routing performance and security. This paper examines two ondemand MANET protocols, a Trusted Secure Dynamic Source Routing (TS-DSR) and a Modified Trusted Secure Dynamic Source Routing (MTS-DSR), as well as a mechanism for gateway discovery on demand.

Keywords

MANET, IDS, DSR, PDR, Delay, Energy, TS-DSR, MTS-DSR.

How to Cite this Article?

Kannan, V. R. (2022). Secure Dynamic Wireless Communication in MANET. i-manager’s Journal on Wireless Communication Networks, 11(1), 26-31. https://doi.org/10.26634/jwcn.11.1.18936

References

[1]. Arivazhagan, A., & Thamizhmaran, K. (2015). Performance comparison of proactive and reactive routing protocol under wormhole for MANET. International Journal of Applied Engineering Research, 10(46), 32193-32198.
[2]. Baliga, J., Ayre, R., Hinton, K., & Tucker, R. S. (2011). Energy consumption in wired and wireless access networks. IEEE Communications Magazine, 49(6), 70-77. https://doi.org/10.1109/MCOM.2011.5783987
[3]. Borsc, M., & Shinde, H. (2005, January). Wireless security & privacy. In 2005, IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005, (pp. 424-428). IEEE. https://doi.org/10.1109/ICPWC.2005.1431380
[4]. Clausen, T., & Jacquet, P. (2003). Optimized Link State Routing Protocol (OLSR) (No. rfc3626). Retrieved from https://www.rfc-editor.org/rfc/rfc3626
[5]. Feng, D., Jiang, C., Lim, G., Cimini, L. J., Feng, G., & Li, G. Y. (2012). A survey of energy-efficient wireless communications. IEEE Communications Surveys & Tutorials, 15(1), 167-178. https://doi.org/10.1109/SURV.2012.020212.00049
[6]. Kargl, F., Geis, A., Schlott, S., & Weber, M. (2005, Januar y). Secure dynamic source routing. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, (pp. 320c-320c). IEEE. https://doi.org/10.1109/HICSS.2005.531
[7]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015, January). Energy efficient routing protocol with ad hoc on-demand distance vector for MANET. In 2015. IEEE 9th International Conference on Intelligent Systems and Control (ISCO), (pp. 1-6). IEEE. https://doi.org/10.1109/ISCO.2015.7282309
[8]. Lee, C. C. (2020). Security and privacy in wireless sensor networks: Advances and challenges. Sensors, 20(3), 744. https://doi.org/10.3390/s20030744
[9]. Nedić, A., Olshevsky, A., & Rabbat, M. G. (2018). Network topology and communication-computation tradeoffs in decentralized optimization. Proceedings of the IEEE, 106(5), 953-976. https://doi.org/10.1109/JPROC.2018.2817461
[10]. Shandilya, S. K., & Sahu, S. (2010). A trust based security scheme for RREQ flooding attack in MANET. International Journal of Computer Applications, 5(12), 4-8.
[11]. Thamizhmaran, K. & Girishkumar, G. (2019). ACO of energy efficient clustering routing method. Journal of Gujarat Research Society, 21(7), 66-71.
[12]. Thamizhmaran, K. (2018). Comparison of AODV and M-AODV in MANET. IOSR Journal of Engineering, 8(5), 11-14.
[13]. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.
[14]. Tsitsigkos, A., Entezami, F., Ramrekha, T. A., Politis, C., & Panaousis, E. (2012, April). A case study of internet of things based on wireless sensor networks and smart phones. In 28th Wireless World Research Forum Meeting, (pp. 1-10).
[15]. Wu, J., & Fan, P. (2016). A survey on high mobility wireless communications: Challenges, opportunities and solutions. IEEE Access, 4, 450-476. https://doi.org/10.1109/ACCESS.2016.2518085
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.