Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET

A Mobile Adhoc NETwork (MANET) is an independent wireless network in which mobile nodes can communicate with each other by forwarding the packets without support of any infrastructure. Since it is a dynamic mobile network, it cannot assure seamless packet transmission between the mobile nodes; makin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2016-09, Vol.90 (2), p.861-873
Hauptverfasser: Malathi, M., Jayashri, S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A Mobile Adhoc NETwork (MANET) is an independent wireless network in which mobile nodes can communicate with each other by forwarding the packets without support of any infrastructure. Since it is a dynamic mobile network, it cannot assure seamless packet transmission between the mobile nodes; making the open network vulnerable to various malicious attacks. MANET uses acknowledgement based schemes, for the assurance of packet transmission by overriding the malicious attacks. Since most of the existing intrusion detection systems (IDS) use two hop information for acknowledging the packets, flooding over multiple outgoing paths and acknowledgement (ACK) overhead occurs when transmitted over a long distance and finally it doesn’t have any prevention system to solve the malicious attacks. In this paper, Modified Bi-directional Routing Abstraction method is proposed to resolve these problems by reducing the ACK overhead and eliminating the malicious attacks. The Best Afford Path using cluster heads is embraced with the proposed technique which utilizes the maximum bandwidth to transfer the packets by routing the nodes around clockwise and anticlockwise routing procedures that detects and overcomes the malicious attacks with an IDS/IPS coupled mechanism. This technique utilizes the cluster heads that are used to get the ACK from the cluster nodes when the packets are sent through it. The proposed technique reduces the ACK overhead, eliminates the malicious attack, increases the bandwidth utilization and improves the delivery of packet with minimum delay compared with the existing schemes.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-016-3233-9