Secure Topology updates using PSO in MANET for Reducing Mobility Delay for Tactical Networks using TORA

Subburaj V*, K. Chitra**, S. Venkateswaran***
* Assistant Professor, Department of MCA, Thiagarajar School of Management, Madurai, Tamilnadu, India, & Ph. D Research Scholar, Manonmaniam Sundaranar University, Tirunelveli.
** Assistant Professor, Department of Computer Science, Government Arts College, Melur, Sivagangai Dist, Tamilnadu, India
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jcs.3.2.2935

Abstract

The topologies used in mobile network tend to change depending on the routing protocol. The concept of this paper is to propose two routing protocols to increase the mobility rate and to provide reliable secure route using a PSO fitness value that predicts the topology changes and thus adapts to the tactical network. To do so, the authors have compared AODV and TORA protocols that assume the failure and provide efficient route to balance it. The trace file is created as the result of implementing the protocol which stands as an example. The concept of mobile boundary set mechanism implemented in these protocols predicts the mobile location and provides region information based on the topology used. The simulated work was done with NS2 wireless scenario and gave us better performance.

Keywords

Temporally Ordered Routing Algorithmic Roule (TORA), Ad-hoc On-demand Distance Vector (AODV), Mobility Rate, Mobile Topology, Tactical Networks

How to Cite this Article?

Subburaj, V., Chitra, K., and Venkateswaran, S. (2014). Secure Topology Updates Using PSO in Manet for Reducing Mobility Delay for Tactical Networks using Tora. i-manager’s Journal on Communication Engineering and Systems, 3(2), 27-32. https://doi.org/10.26634/jcs.3.2.2935

References

[1]. Vincent D. Park and M. Scott Corson. (2001). "Temporally-Ordered Routing Algorithm (TORA) version 4: Functional specification". Internet-Draft, draft-ietfmanet- TORA-spec- 04.txt, (DOI:10.5120/1018-59).
[2]. Jha, R. K., Limkar, S. V., & Dalal, D. U. (2010). A Performance Comparison of Routing Protocols (DSR and TORA) for Security Issue In MANET (Mobile Ad Hoc Networks). IJCA Special Issue on MANETs (2), pp.78-83. Chicago.
[3]. Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46-55. Chicago.
[4]. Perkins, C.E.; Royer, E.M., (1999). "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, Vol., No., pp.90,100, 25-26 doi: 10.1109/ MCSA. 749281
[5]. David B. Johnson and David A. Maltz, (1996). "Dynamic Source Routing in Ad Hoc Wireless Networks", in Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pp. 153-181, Kluwer Academic Publishers, Invited paper.
[6]. J. Broch et al, (1998). "A Performance Comparison of Multi-Hop Wireless Ad-hoc Network Routing Protocols," Proceedings of the MOBICOM'98, pp. 85-97.
[7]. Royer, Elizabeth M., and Chai-Keong Toh. (1999). "A review of current routing protocols for ad hoc mobile wireless networks." Personal Communications, IEEE 6.2 : 46- 55.
[8]. Basagni, S., Chlamtac, I., & Syrotiuk, V. R. (1999). Dynamic source routing for ad hoc networks using the global positioning system. In Wireless Communications and Networking Conference, WCNC. 1999 IEEE (pp. 301- 305). IEEE.
[9]. Basagni, S., Chlamtac, I., Farago, A., Syrotiuk, V. R., & Talebi, R. (1999). Route selection in mobile multimedia ad hoc networks. In Mobile Multimedia Communications, 1999.(MoMuC'99) IEEE International Workshop on (pp. 97- 103). IEEE.
[10]. Park, Vincent Douglas, and M. Scott Corson. (1997). "A highly adaptive distributed routing algorithm for mobile wireless networks." INFOCOM'97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE. Vol. 3. IEEE.
[11]. Subburaj, V., & Chitra, K. (2012). Mobile node dynamism using particle swarm optimization to fight against vulnerability exploitations. International Journal of Computer Applications, 41(13), pp.1-4.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.