Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID’s Using Fake ID Detection Protocol

نویسندگان

  • S. Gopalakrishnan
  • P. Ganeshkumar
چکیده

Corresponding Author: Gopalakrishnan, S. Department of ECE, PSNA College of Engineering and Technology, Dindigul, India Email: [email protected] Abstract: Mobile Ad hoc Network (MANET) is a frequent infrastructure less selfcoordinating network, in which each and every mobile node works as a source, destination and a wireless relay. Such pattern of wireless network is produced by dynamic mobile nodes without any centralized or fixed or existing network infrastructure. In MANET, however, there is no static network infrastructure and mobile nodes do not possess accession to a centralized host to assume IDs or IP addresses. Moreover, owing to mobility of node, network partitions and combines are quick occurrences. These occurrences produce the possibility of fake addresses inside the network. Thus, a centralized scheme cannot be employed in those networks; a dispersed and dynamic mechanism is required for mobile nodes to adopt and preserve a unique ID or IP address in mobile networks. In this study, we proposed two protocols namely Fake ID Detection (FIDD) and Path Selection Routing protocol (PSR) in which the FIDD protocol is used to detect the fake id i.e., the duplicate packets and PSR protocol is used to select the alternate path when the current path became busy or failure and it frequently chooses an alternate path to continue the transmission without any interruption. Hence, the efficiency and life-time of the network can be increased. Finally, the overall performance of the network can be increased.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Detection of Fake Accounts in Social Networks Based on One Class Classification

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Wormhole Attack Detection and Prevention in Mobile Ad-hoc Network Using Authentication Based Delphi

As Mobile Ad-hoc network is infrastructure less network in which every node can take part in data transmission and reception process. Various kinds of attacks have been arises in the network during transmission, which affects on the performance of the network. Wormhole attack is one attack from them which is created by collaborative attackers. Different techniques have developed to detect & pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCS

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2015