An Adaptable Secure Scheme in Mobile Ad hoc Network to Protect the Communication Channel From Malicious Behaviours

An Adaptable Secure Scheme in Mobile Ad hoc Network to Protect the Communication Channel From Malicious Behaviours

Srilakshmi R., Jaya Bhaskar M.
DOI: 10.4018/IJITWE.2021070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Mobile ad-hoc network (MANET) is a trending field in the smart digital world; it is effectively utilized for communication sharing purposes. Besides this communication, it has numerous advances like a personal computer. However, the packet drop and low throughput ratio became serious issues. Several algorithms are implemented to increase the throughput ratio by developing multipath routing. But in some cases, the multipath routing ends in routing overhead and takes more time to transfer the data because of data load in the same path. To end this problem, this research aimed to develop a novel temporary ordered route energy migration (TOREM). Here, the migration approach balanced the data load equally and enhanced the communication channel; also, the reference node creation strategy reduced the routing overhead and packet drop ratio. Finally, the outcome of the proposed model is validated with recent existing works and earned better results by minimizing packet drop and maximizing throughput ratio.
Article Preview
Top

1. Introduction

In the past decade, there is rapid improvement in mobile computing technology, because it contains many facilities (Elmahdi et al., 2020). In an infrastructure-less wireless networks, there is the possibility to send the data or information directly to the user, it is known as mobile ad hoc network, or MANET (Abdel-Fattah et al., 2019). It has no static infrastructure to transform the data. Moreover, the Nodes range is distributed to other node, to make the communication directly (Dhindsa & Bhushan, 2020). Also in MANET the nodes are arranged in a dynamic manner (Mishra & Mittal, 2020). This kind of network model is utilized in many claims such as the Internet of Things (IoT), military (Shrestha, 2020), vehicle traffic system, etc. Owing to its extensive range of appliance, the MANETs have become a lively research theme. However, the restricted battery lifespan and the flexibility of the arrangement of the nodes became an important challenge (Dhage & Vemuru, 2018). Because in MANET the nodes are movable, based on that movement the topology is changed. Also, the nodes in the MANET framework are moving freely without any restriction (Arage & Satyanarayana, 2019).

In MANET the lifetime of node estimation is important metrics because of its moving behavior (Balu Narsimharao, 2018). Some researchers presented the work in the awareness of network or node lifetime by introducing the load balancing strategy (Jayanthi & Ali Hussain, 2018) but still, the suitable solution is not found. Because of freely moved nodes, each node has specific energy and speed to transfer the message (Rao et al., 2018).Furthermore, a faulty or energy drained node causes link failure it tends to data loss. Also, the malicious node makes the good node as a faulty node (Sunita, 2019). So detecting and preventing the attack is key metrics in mobile computing. In MANET, some specific features are enacting several challenges to network designs on entire frames of the protocol heap (Sultanuddin, 2019). Thus the physical section should deal with the rapid variations in connection features. Consequently, the media access control (MAC) layer permits fair channel entree to reduce data collisions or crashes, and also with exposed and hidden terminals (Rao, 2018). Then in the network layer, hubs want to cooperate to estimate the paths. Moreover, the transport layer section handles the delay features and packet loss (Sai Harika et al., 2019). Also, the layer of application concentrates on connection and disconnection process in the communication channel. To preserve the communication in MANET, proficient routing procedures are required to create communication routes between all nodes.

All hubs in the ad-hoc network support several ways of routing to transfer the data. For the selection of an optimal path, the node power accessing strategy is performed to maintain the communication channel without any interruption (Chavan & Srikanth, 2019). In recent, Some of the efficient strategies were developed like demand vector (Anand & Sasikala, 2019), dynamic routing (Babu, 2019), Busyness load balancing (Aouiz et al., 2019), etc., still preventing attack and providing better communication channels is a challengeable task. Thus an efficient protocol with load balancing can improve the communication channel of MANET. Moreover, all wireless movable nodes need a nonstop power preserving to guarantee node effectiveness and availability. The key contribution of this research work is summarized below,

  • Initially a novel TOREM protocol is developed

  • Source and destination nodes are specified

  • Base on the nodes energy the path is selected, if there is any less energy node then the protocol create reference node to avoid packet drop.

  • If the node suffers from data overhead then it equally shares the data to other node to reduce routing overhead.

Complete Article List

Search this Journal:
Reset
Volume 19: 1 Issue (2024)
Volume 18: 1 Issue (2023)
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing