i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 3 Issue 3 October - December 2014

Article

Comparative Study Of Proactive, Reactive and Hierarchical Routing Protocols

Thangaraj K* , R. Thirumalaiselvi**
* Research Scholar, Department of Computer Science, Govt.Arts College, Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Govt.Arts College, Nandanam, Chennai, India.
Thangaraj, K., and Selvi, R.T. (2014). Comparative Study Of Proactive, Reactive And Hierarchical Routing Protocols. i-manager's Journal on Wireless Communication Networks, 3(3), 1-6. https://doi.org/10.26634/jwcn.3.3.3078

Abstract

Mobile Ad Hoc Network (MANET) is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for Mobile Ad hoc Networks and prominent among them are DSR (Dynamic Source Routing), AODV (Ad hoc On-demand Distance Vector) and TORA (Temporary Ordered Routing Algorithm). This paper provides an overview of these protocols by presenting their advantages and disadvantages of the proactive, reactive and hierarchical protocols and then make a comparative analysis of their advantages and disadvantages. The objective is to make observations about how the advantages and disadvantages of these protocols can be improved.

Research Paper

Selection of Forwarding Area With Itrust Assortment Used In Geographical Forwarding In Wireless Ad hoc Network

V.Vallinayagi* , G.M. Nasira**
* Assistant Professor, Sri Sarada College for Women, Tamil Nadu, India.
** Assistant Professor, Chikkanna Government Arts College, TamilNadu, India.
Vallinayagi, V., and Nasira, G.M. (2014). Selection of Forwarding Area With Itrust Assortment Used In Geographical Forwarding In Wireless Ad hoc Network. i-manager's Journal on Wireless Communication Networks, 3(3), 7-11. https://doi.org/10.26634/jwcn.3.3.3079

Abstract

Itrust assortment forwarding technique is a state free forwarding technique. But in geographic routing there is a lack of holistic design to be more efficient and robust. This paper present an overview of the Adhoc Routing Protocol which selects its forward based on the geographical position of packet destinations. In this topology each node knows its one hop locality in order to forward the packets. Maintenance of routes is not obligatory. It is a position based opportunistic routing protocol (Triviño-Cabrera,& Cañadas-Hurtado, 2011) in which several forwarding candidates supply the packet that has been acknowledged and if the best forwarder does not forward the packet in a particular time slot, then suboptimal candidate will take turn to forward the packet and it is highly forceful. The main request is the sender can obtain the current position of the destinations. In this paper, recently revealed protocols are discussed. and the authors probe the blow of several important hypothesis on our methodical results. This study provides brief description about all the position based routing protocols. Their performance was calculated and a graph was drawn on their result. The authors also propose a new technique to reduce the packet delay and drop.

Research Paper

Enhancing The Life Time Of Wireless Sensor Networks Using SOBAS

K. Dhana Bhavithra* , S. Anandamurugan**
* PG Student, Kongu Engineering College, Perundurai, India.
** Assistant Professor (SLG), Kongu Engineering College, Perundurai, India.
Bhavithra, K.D., and Anandamurugan, S. (2014). Enhancing The Life Time Of Wireless Sensor Networks Using SOBAS. i-manager's Journal on Wireless Communication Networks, 3(3), 12-17. https://doi.org/10.26634/jwcn.3.3.3080

Abstract

The Secure Source-BAsed loose Synchronization (SOBAS) protocol is introduced, to securely synchronize the events in the network, without the transmission of explicit synchronization control messages. Nodes use their local time value and initial vector value as a one-time dynamic key to encrypt each message. SOBAS provides an effective dynamic en-route filtering mechanism, where the malicious data is filtered from the network. Instead of synchronizing each sensor globally, SOBAS focuses on ensuring that each source node is synchronized with the sink such that event reports generated by the sink are ordered properly. Hence, the objective of the SOBAS protocol is to provide a loose synchronization protocol for WSNs rather than a perfect synchronization among the nodes. With loose synchronization, it reduces the number of control messages needed for a WSN to operate providing the key benefits of reduced energy consumption as well as reducing the opportunity for malicious nodes to eavesdrop, intercept, or be made aware of the presence of the network. Thus, SOBAS (Source-BAsed loose Synchronization) provides energy efficient and an effective technique to securely synchronize the nodes on the data delivery path in the network.

Research Paper

Performance Analysis Of Implicit Trust Based Security In OLSR Routing Protocol

H. Muthukrishnan* , K. Akila**
* Assistant Professor, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
** PG Scholar, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
Muthukrishnan, H., and Akila, K. (2014). Performance Analysis Of Implicit Trust Based Security In OLSR Routing Protocol. i-manager's Journal on Wireless Communication Networks, 3(3), 18-24. https://doi.org/10.26634/jwcn.3.3.3081

Abstract

In Adhoc networks, nodes will be trusted implicitly based on cooperation between the entities involved in routing operations. As wireless ranges of nodes are limited, the nodes cooperate with their neighbors in order to extend the entire size of the network. Trust is taken as security solution for OLSR protocol which fits particularly with characteristics of ad hoc networks. The explicit trust management allows entities to reason with about trust and to take decisions regarding other entities. In this paper, analysis of implicit trust for the OLSR protocol using trust specification language have been done and it is shown how trust based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, the prevention and countermeasure have been proposed to resolve the inconsistency. The same analysis of implicit trust using trust specification language can be implemented in other protocols.

Research Paper

RSSI Improvement of WiMAX In Dhaka City, Bangladesh

Md.Tarek Uz Zaman* , Md. Taslim Arefin**
*Researcher, Department of Electronics & Telecommunication Engineering, Daffodil International University, Bangladesh.
** Assistant Professor, Department of Electronics & Telecommunication Engineering, Daffodil International University, Bangladesh.
Zaman, T.U., and Arefin, T. (2014). RSSI Improvement of WiMAX In Dhaka City, Bangladesh. i-manager's Journal on Wireless Communication Networks, 3(3), 25-34. https://doi.org/10.26634/jwcn.3.3.3082

Abstract

WiMAX (Worldwide Interoperability for Microwave Access) is a long-range wireless networking standard developed by IEEE to solve the point to multipoint broadband outdoor wireless network problem. WiMAX provides wireless communication to areas where cable infrastructure is inadequate. It is designed to provide higher data rates. WiMAX forum promised to provide better service in means of better coverage and quality but at present in Dhaka city Bangladesh, WiMAX technology is unable to support the coverage or throughput recommended by WiMAX forum. End user subscribers are not getting their assigned bandwidth due to poor network arrangement, tall building density and vast population density. The essential necessity for this research is to improve coverage and quality and thereby making WiMAX technology as the best for wireless and mobile broadband communications. This paper focuses on the RSSI improvement of WiMAX network in Dhaka city, Bangladesh by making a site survey in real life and then analyzing with collecting data with theoretical data to evaluate the end user improvement by applying research solution.

Research Paper

Duplicate Node Detection In Wireless Sensor Network Using Detection Algorithms

S. Anandamurugan* , M. Divya**
* Assistant Professor (SLG), Department of IT, Kongu Engineering College, Perundurai, India.
** PG Scholar, Department of IT, Kongu Engineering College, Perundurai, India.
Anandamurugan, S., and Divya, M. (2014). Duplicate Node Detection In Wireless Sensor Network Using Detection Algorithms. i-manager's Journal on Wireless Communication Networks, 3(3), 35-41. https://doi.org/10.26634/jwcn.3.3.3083

Abstract

Wireless Sensor Network is a collection of many sensor nodes and is more vulnerable to node replica attack. Among many physical attacks to sensor networks, the node clone is a serious and dangerous one because sensor nodes are generally short of tamper-resistance hardware components. An adversary can capture few nodes, extract code and all secret information to replica many nodes. That replica nodes act as a original node, and can freely enter the sensor network and then extend the adversary's capacities to perform the network maliciously and have whole control over the network. In the existing system, even though private keys are used for both identity and location of the sensor node, still the nodes are compromised by the attacker and also those methods are based on centralized system, and it increases communication burden and increases complexity to detect the clone node. To overcome these problems, two detection algorithms are proposed. Distributed Hash Table (DHT) is a decentralized, key-based caching and checking system to detect the clone node. DHT-based detection algorithm can use chord overlay network to detect node clone with high security level. Randomly Directed Exploration (RDE), a distributed system providing good communication performance, uses two methods probabilistic directed forwarding with random initial direction and border determination for detecting the clone node. RDE has high detection probability compared to DHT-based detection algorithms.