Energy-Efficient Dynamic Wireless Communication for Wireless Mobile Ad-hoc Networks using Hybrid Cryptography-Based Acknowledgement Method

T. Priyanka*
Department of Electrical Communication Engineering, Annamalai University, Chidambaram, Tamil Nadu, India.
Periodicity:July - December'2022
DOI : https://doi.org/10.26634/jwcn.11.1.18948

Abstract

Energy efficiency continues to be a key factor limiting the ability to deploy ad-hoc networks. Deploying an energyefficient system that maximizes network lifetime has been a major challenge for many years. Many algorithms have been proposed to solve this problem. This paper proposes a new intrusion detection system—Enhanced Adaptive 3 Acknowledgment (EA3ACK)—using the Energy Efficiency Dynamic State (EEDS) algorithm. This algorithm is designed to increase network lifetime and residual energy by constantly monitoring individual nodes in the network, thereby improving the network's quality of service. The Network Simulator (NS2) is used to implement and test the proposed system.

Keywords

MANET, IDS, EEDS, Network Lifetime, Dynamic.

How to Cite this Article?

Priyanka, T. (2022). Energy-Efficient Dynamic Wireless Communication for Wireless Mobile Ad-hoc Networks using Hybrid Cryptography-Based Acknowledgement Method. i-manager’s Journal on Wireless Communication Networks, 11(1), 17-25. https://doi.org/10.26634/jwcn.11.1.18948

References

[1]. Ahmed, T., Chaudhary, M., Kaleem, M., &Nazir, S. (2016, December). Optimized depth-based routing protocol for underwater wireless sensor networks. In 2016, International Conference on Open Source Systems & Technologies (ICOSST), (pp. 147-150). IEEE. https://doi.org/10.1109/ICOSST.2016.7838592
[2]. Datatracker. (n.d.). Mobile Ad-Hoc Networks (MANET). Retrieved from https://datatracker.ietf.org/wg/manet/about/
[3]. Frodigh, M., Johansson, P., & Larsson, P. (2000). Wireless ad hoc networking: the art of networking without a network. Ericsson Review, 4(4), 248-263.
[4]. Javaid, N., Ejaz, M., Abdul, W., Alamri, A., Almogren, A., Niaz, I. A., & Guizani, N. (2017). Cooperative position aware mobility pattern of AUVs for avoiding void zones in underwater WSNs. Sensors, 17(3), 580. https://doi.org/10.3390/s17030580
[5]. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile Computing, (pp. 153-181). https://doi.org/10.1007/978-0-585-29603-6_5
[6]. Lee, J. S. (2008). A Petri net design of command filters for semiautonomous mobile sensor networks. IEEE Transactions on Industrial Electronics, 55(4), 1835-1841. https://doi.org/10.1109/TIE.2007.911926
[7]. Liu, K., Deng, J., Varshney, P. K., &Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536-550. https://doi.org/10.1109/TMC.2007.1036
[8]. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, (pp. 255-265). https://doi.org/10.1145/345910.345955
[9]. Patcha, A., & Mishra, A. (2003, August). Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Radio and Wireless Conference, 2003. RAWCON'03. Proceedings, (pp. 75-78). IEEE. https://doi.org/10.1109/RAWCON.2003.1227896
[10]. Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46-55. https://doi.org/10.1109/98.760423
[11]. Shakshuki, E. M., Kang, N., &Sheltami, T. R. (2013). EAACK-a secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089-1098. https://doi.org/10.1109/TIE.2012.2196010
[12]. Sun, B. (2003). Intrusion Detection in Mobile Ad Hoc Networks. (Doctoral dissertation, Texas A&M University. Texas A&M University).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.