Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Hybrid Approach for Anonymity based Secured Routing in MANET with Effective Resource Utilization  
  Authors : Charulata Ahir; Dr. Hemant Deshmukh
  Cite as:

 

In current scenario MANET are the upcoming solution for communication in various fields, but the problem of security lays a prime issue. Due to the infrastructure less mode of communication such networks have good utilization in future, but due to resource constraint these network find limitation in utilization. Due to dynamic nature of nodes and variant routing property, any fixed approach for anonymity based security or resource utilization is not applicable. Hence to optimize the utilization of MANET for real time a hybrid approach is to be developed. In this paper anonymous location based routing protocol ‘ALERT’ and a spectrum sensing based coding in cognitive radio network called ‘LAUNCH’ protocol are studied and compared so as to propose a hybrid approach of providing anonymity based security with optimal resource allocation using cognitive radio network approach.

 

Published In : IJCSN Journal Volume 5, Issue 3

Date of Publication : June 2016

Pages : 454-457

Figures :--

Tables : 01

Publication Link : Hybrid Approach for Anonymity based Secured Routing in MANET with Effective Resource Utilization

 

 

 

Charulata Ahir : I/C Head IT dept. Govt. Polytechnic, Murtizapur.

Dr. Hemant Deshmukh : Head Computer Science and Engg. IBSS college of Engg., Amravati, Maharashtra , India.

 

 

 

 

 

 

 

MANET (Mobile Adhoc Network), Anonymity, ALERT(Anonymity Location Based Efficient Routing Protocol), LAUNCH(A Location-Aided Routing Protocol for Cognitive Radio Networks)

To optimize the utilization of MANET for real time this paper suggest a hybrid approach of providing anonymity based security with optimal resource allocation using cognitive radio network approach. The approach of security is developed by the improvement in anonymous routing protocol, where in the computational overhead during data trafficking is focused. This coding is integrated with dynamic resource allocation based on the user allocation pattern as used in CRN. In this approach the nodes are defined as primary or secondary user based on node and link weight factor. By this development adhoc network will be made more secure with higher quality of service in data communication.

 

 

 

 

 

 

 

 

 

[1] [K. E. Defrawy et al, 2011]”ALARM: anonymous location aided routing in suspicious MANETs," IEEE Trans. Mobile Compute., vol. 10, no. 9, pp. 1345-1358, 2011. [2] [Xiaoxin Wu et al,2008 ] “Anonymous Geo- Forwarding in MANETs through Location Cloaking”, IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 10, October 2008.doi 1297- 1309. [3] [Z. Zhang et al, 2006 ] "MASK: Anonymous On- Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Communication, vol. 5, pp. 2376- 2385, Sept. 2006. [4] [D. Sy, R. Chen et al,2006 ] “ODAR: On-Demand Anonymous Routing in Ad-hoc Networks,” in IEEE Conference on Mobile Adhoc and Sensor Systems., vol.4,pp. 721-730,2006, [5] [X. Wu et al,2005 ] “AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,” IEEE Trans. Mobile Computing, vol. 4, no. 4,pp. 335-348, July/Aug. 2005. [6] [Cadger et al,2013 ] "A survey of geographical routing in wireless ad-hoc networks." Communications Surveys & Tutorials, IEEE 15, no. 2 (2013): 621-653. [7] [Gunasekaran et al,2013 ] "SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks."EURASIP Journal on Wireless Communications and Networking 2013, no. 1 (2013): 1-12 [8] [Karim El Defrawy et al,2011 ] “Privacy-Preserving Location-Based On-Demand Routing in MANETs”, IEEE Journal On Selected Areas in Communications, Vol. 29, No. 10, December 2011.doi: 1926-1934. [9] [Muthumanickam Gunasekaran1 et al,2013 ] “TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks”, IET Information Security, IET Inf. Secur., 2013, Vol. 7, Iss. 3, pp. 203– 211 203 doi: 10.1049/iet-ifs.2013 [10] [Agrawal et al,2011 ] "A survey of routing attacks and security measures in mobile ad-hoc networks." Journal of computing,vol.3,issue 1,jan- 2011, ISSN 2151-9617. [11] [Haiying Shen et al,2013 ] “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6,pp.304-313, June 2013. [12] [M. Elena Renda et al,2012 ] “Load Balancing Hashing in Geographic Hash Tables”, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, no. 8, August 2012. doi 1508-1519. [13] [ X. Wu,2006] “DISPOSER: Distributed Secure Position Service in Mobile Ad Hoc Networks: Research Articles,” Wireless Comm. and Mobile Computing, vol. 6, pp. 357-373. [14] [Dutta et al, 2013]”A Routing Protocol for Cognitive Networks in presence of Co-operative Primary user."Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on, pp. 143-148. IEEE -2013. [15] [Kamruzzaman et al, 2012] ”Energy-aware routing protocol for cognitive radio ad hoc networks." IET communications 6, no. 14 (2012): 2159-2168. [16] [Robert J. Hall, 2011], “An Improved Geocast for Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 10, No. 2, February 2011: 254-266. [17] [Chowdhury et al,2009 ] "Search: A routing protocol for mobile cognitive radio ad-hoc networks." Computer Communications 32, no. 18 (2009): 1983-1997. [18] [Akyildiz, Ian F et al,2009 ] "CRAHNs: Cognitive radio ad hoc networks." Ad Hoc Networks 7, no. 5 (2009): 810-836. [19] [Karim Habak et al,2013 ] “A Location-Aided Routing Protocol for Cognitive Radio Networks”, International Conference on Computing, Networking and Communications, IEEE, pp. 729-733,Jan- 2013,doi-978-1-4673-5288-8/13.