SlideShare a Scribd company logo
1 of 10
Download to read offline
©IJCERT 44 | P a g e
ISSN (Online): 2349-7084
International Journal of Computer Engineering In Research Trends (IJCERT)
Volume 1, Issue 1, July 2014, PP 44-53
www.ijcert.org
Consistent Data Release in MANET Using Light
Weight Verification
Algorithm with High Node Mobility
B.Natraj Kumar1
,M.Tech Research Scholar,
M.Sri Lakshmi2
, Assistant Professor,
Dr.S.Prem Kumar3
, Head of the Department
Department of CSE, G.Pullaiah College of Engineering and Technology
JNTU Anatapur, Andhra Pradesh, India
ABSTRACT: - This paper addresses data aggregation and data packets problems for extremely
dynamic mobile temporary networks and Wireless sensor Networks thereby resulting in a timely
and reliable reduction in each communication and energy consumption. However there may be
node failures in existing systems Associate in an aggregation framework doesn't address
problems with false sub-aggregate values down to compromised nodes resulting in massive
errors in base station computed aggregates once data is transferred through mobile device
nodes. It cannot conjointly transfer data when nodes fail at the intermediate level. This paper
proposes a completely unique light-weight verification rule and Position primarily based
timeserving Routing (PTR) protocol that reduces node failure and knowledge loss problems.
Theoretical analysis and simulation prove that PTR and also the novel light-weight verification
rule succeed glorious performance below high node quality with acceptable overhead.
Conjointly the new void handling theme performs expeditiously.
Keywords: Geographic routing, opportunistic forwarding, reliable data delivery, void handling, mobile ad hoc
network, Base station, data aggregation, hierarchical aggregation, in-network aggregation, sensor network
security, synopsis diffusion
B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar
International Journal of Computer Engineering In Research Trends (IJCERT ) 45 | P a g e
1. INTRODUCTION
Wireless sensor networks (WSNs) and MOBILE adhoc networks (MANETs) are used more and more in several
applications [1] like wild environment observance, fire detection, and military police work. Once preparation within
the field device nodes organize themselves into a multihop network, the bottom station being the central
management purpose. Sometimes device nodes are greatly hampered by thanks to computation capabilities and
energy reserves. an on the spot detected Information assortment technique from networks would be to forward every
device node’s reading to the bottom station, through alternative intermediate nodes, before the bottom station
processes received knowledge. However its disadvantage is its high value relating to communication overhead (or
energy spent).Wireless networks gained interest thanks to benefits led to by multihop, infrastructure-less
transmission. However, high node quality remains a difficulty thanks to error prone wireless channels and dynamic
configuration, moving even reliable knowledge delivery in MANETs, particularly in challenged environments.
standard topology-based MANET routing protocols (e.g., DSDV, AODV, DSR [1]) are at risk of node quality a
reason being predetermination of associate degree end-to-end route before knowledge transmission. Thanks to
perpetually and quick dynamic configuration, settled route maintenance may be a drawback. Discovery and recovery
procedures client each time and energy. Knowledge packets are either lost or delayed for long once a path break, till
route reconstruction resulting in transmission interruption.
Computing aggregates in-network (combining partial results at intermediate nodes throughout message routing) in
giant WSNs considerably lowers the quantity of communication and also the resultant energy consumed. Knowledge
acquisition systems for WSNs [2], [3] construct a spanning tree unmoving at the bottom station to perform
aggregation on the tree. Necessary aggregates thought-about embrace Count, and Sum. it's simple to generalize
aggregates to predicate Count (e.g., sensors with readings beyond a hundred units) and add. Also, Count and add are
often accustomed pc Average. Add formula also can figure variance and applied math Moment of any order. Tree-
based aggregation approaches don't settle for communication losses thanks to node and transmission failures,
common in WSNs.Location data is employed by geographic routing (GR) [2] to forward knowledge packets, in hop-
by-hop Routing fashion. Greedy forwarding selects following hop forwarder with biggest progress toward
destination whereas void handling mechanism to route around communication voids [3]. there ought no to maintain
end-to-end routes, resulting in GR’s potency and quantifiability; however it's sensitive to location data [4] quality.
In greedy forwarding operations, a comparatively isolated neighbor is chosen because the next hop. Once the node
goes far away from the Sender’s coverage space, transmission fails. In GPSR [5] (a noted geographic routing
protocol), the mackintosh layer Failure feedback offers packet another reroute probability. However simulation
reveals that it's incapable of maintaining performance once node quality will increase. One packet transmission
ends up in multiple receptions thanks to the printed nature of the wireless medium. Once such transmission is that
the backup, the routing protocol’s hardiness is greatly increased. Time serving routing [6], [7], [8] incontestable
multicast-like routing strategy. This paper addresses this drawback. The analysis community planned exploitation
multipath routing techniques to forward sub-aggregates [2]. Aggregates like Min and liquid ecstasy are duplicate-
insensitive and then this approach provides a fault-tolerant resolution. a unique Position-based timeserving Routing
(PTR) protocol wherever many forwarding candidates’ cache packets exploitation mackintosh interception was
Consistent Data Release in MANET Using Light Weight Verification
Algorithm with High Node Mobility
©IJCERT 46 | P a g e
planned. once the simplest forwarder fails to forward packets insure time slots, suboptimal candidates forward them
in turns in an exceedingly domestically fashioned order. So, as long in concert candidate with success receives and
forwards packets, knowledge transmission is uninterrupted. Doable multipath is exploited on a per packet basis on
the fly, resulting in glorious hardiness for PTR.
The rest of this paper is organized as follows: we have a tendency to gift the protocol style of PTR and
complementary mechanisms in Section a pair of. VDVH is pictured in Section three. Section four analyses the
impact of node quality on packet delivery and divulges the advantages led to by the participation of forwarding
candidates. Redundancy in PTR, including memory consumption and duplicate relaying thanks to timeserving
forwarding also will be mentioned. In Section five, we have a tendency to appraise the performance of planned
schemes by simulation and compare them with alternative routing protocols. Section vi reviews the connected work
and conclusions are given in Section seven.
2. POSITION-BASED OPPTRTUNISTIC ROUTING
2.1 Overview
PTR style is predicated on geographic routing and opportunistic forwarding. The nodes area unit thought to
remember of their location and their direct neighbor’s positions. Neighborhood location data is changed through a
one-hop beacon or through riding piggyback within the knowledge packet header. It’s thought that location
registration and search service that map node addresses to locations is obtainable as in [5] for the destination
position. this could be accomplished through use of the many styles of location service [11],[12]. During this
situation, economical and reliable ways that are accessible. Destination location will be transmitted by low bit rate
and long vary radios, that area unit enforced as periodic beacons, additionally through replies once the supply
requests it.
When a supply node plans to transmit a packet, it gets destination location 1st once that it's connected to the packet
header. Due to the destination node’s movement, a multihop path could diverge from the ultimate location’s true
location with a packet being born although it's been delivered within the destination neighborhood. Further
destination node checks area unit introduced to handle such problems. The packet forwarding node checks the
neighbor list at each hop to examine whether or not destination is inside transmission vary. If so, the packet is
directly forwarded to the destination, almost like destination location prediction theme delineated in [4]. Although
such identification checks before greedy forwarding supported location data, path divergence result will be relieved.
For a packet to be received by multiple candidates in standard expedient forwarding either informatics broadcast or a
routing integration and Macintosh protocol is adopted. the previous is liable to Macintosh collision thanks to lack of
collision turning away support for broadcast packet in current 802.11, whereas for the latter it wants complicated
coordination that isn't straightforward to implement. PTR uses a theme almost like the Macintosh multicast mode
delineated in [13]. The packet is transmitted asunicast (the best forwarder creating the most important positive
B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar
International Journal of Computer Engineering In Research Trends (IJCERT ) 47 | P a g e
progress towards destination becomes subsequent hop) in informatics layer and multiple reception is thru Macintosh
interception. Use of RTS/CTS/DATA/ACK greatly lowers the collision and nodes inside the sender’s transmission
vary may snoop on a packet with success with smart likelihood thanks to medium reservation.
As knowledge packets area unit transmitted multicast-like every is known with a novel tuple (src_ip, seq_no)
wherever src_ip becomes the informatics address of supply node and seq_no the corresponding sequence variety.
Every node encompasses a monotonically increasing sequence variety, associate degrees an ID Cache-to record
packets ID (src_ip,seq_no) that were received recently. Receipt of a packet with same ID ends up in it being
discarded. Otherwise, it's forwarded to the receiver to subsequent hop, or keep in a very Packet List if received by a
forwarding candidate. It’s born once the receiver isn't given. The packet within the Packet List is shipped out once
awaiting a selected variety of your time slots or discarded if identical packet is received once more throughout the
waiting amount (this suggests that a much better forwarder has already meted out the task).PTR’s routing situation is
illustrated in Fig. 1. in a very traditional scenario sans link break, the packet is forwarded by subsequent hop node
(nodes A, E) and forwarding candidates (nodes B, C; nodes F, G) area unit suppressed (the same packet in Packet
List is dropped) by subsequent hop node’s transmission. If node A fails to deliver the packet (node A has taken away
and then cannot receive the packet), node B, the forwarding candidate with high priority relays packet and
suppresses the lower priority candidate’s forwarding (node C) and node S. By mistreatment Macintosh layer
feedback, node S removes node A from neighbors list and selects a replacement next hop node for the next packets.
The interface queue packets taking node A because the next hop get a second likelihood to reroute. A packet force
back from Macintosh layer won't be rerouted if node S overhears node B’s forwarding.
Figure 1: Position-Based Opportunistic Routing
2.2 Selection and Prioritization of Forwarding Candidates
One of PTR’s main issues is choice and prioritization of forwarding candidates. only forwarding space nodes [14]
would be backup nodes. The sender decides the forwarding space and also the next hop node. A forward space node
meets the subsequent 2 conditions: 1) it makes positive progress toward the destination; and 2) its distance to future
hop node mustn't be over a wireless node’s 0.5 transmissions vary (i.e., R=2) in order that all forwarding will didates
can hear from each other. In Fig. 1, the forwarding space is that self-enclosed by the daring curve. the realm nodes
Consistent Data Release in MANET Using Light Weight Verification
Algorithm with High Node Mobility
©IJCERT 48 | P a g e
beside node A (i.e., nodes B, C), area unit potential candidates. Of the specified variety of backup nodes, some are
going to be chosen as forwarding candidates. A forwarding candidate’s priority is set by its distance to the
destination. The nearer the destination, higher is that the priority. Once a node sends or forwards a packet, it selects
future hop forwarder and additionally the forwarding candidates among neighbors. The forwarder list includes next
hop and also the candidate list. Formula one provides the tactic to select/prioritize the forwarder list. Candidate list
is hooked up to the packet header and updated hop by hop. Solely candidates list such nodes are going to be
forwarding candidates. The lower the node’s index within the candidate list, the upper its priority.
Before conniving a replacement forwarder list, it refers to the forwarding table, to examine whether or not a
legitimate item for that destination continues to be on the market. The forwarding table engineered throughout
knowledge packet transmissions is maintained simply than a routing table. It may even be thought of a trade-off
between potency and quantifiability. As forwarding table institution is predicated on native info it's created in
minimum time. Hence, Associate in nursing ending time will be assailing things maintained to stay the table tiny.
The table records solely current active flows, whereas in ancient protocols, route ending time decrease would wish
additional resources to reconstruct.
2.3 Limitation on Possible Duplicate Relaying
Due to nodes’ movement and collisions, a number of forwarding candidates may not receive a packet forwarded by
next hop node or a better priority candidate, leading to some duplicate relaying. Once the forwarding candidate
adopts constant situation as a next hop node, it additionally calculates a candidate list and in an exceedingly worst
case situation, a packet’s propagation space can embody the complete circle with the destination because the center
and therefore the radius might be adequate the distance between supply and destination. To limit duplicate relaying,
solely supply forwarded packet and therefore the next hop node are transmitted in associate timeserving fashion and
cached by multiple candidates. In alternative words, solely supply and next hop node calculate the candidate list,
whereas it's empty for the packet relayed by a forwarding candidate. Thus, a packet’s propagation space is restricted
to an explicit band between supply and destination. Also, with ID cache, duplicate packets ar quickly born while not
being propagated additional..
2.4 MAC Modification and Complementary Techniques
2.4.1 MAC Interception
The broadcast nature of 802.11 Macintosh is leveraged: nodes at intervals sender vary receive the signal. However
its RTS/CTS/DATA/ACK mechanism is simply appropriate unicast. It sends knowledge to any or all broadcast
packets with CSMA. Hence, collision primarily based packet loss dominates multicast-like routing protocols
performance. Here, packet transmission state of affairs was altered. A packet is distributed via unicast in an
exceedingly network layer, to the simplest node electoral by greedy forwarding because the next hop. This ensures
B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar
International Journal of Computer Engineering In Research Trends (IJCERT ) 49 | P a g e
full utilization of the collision rejection supported by 802.11 MAC. On the receiver facet, MAC-layer address filter
is changed, even once knowledge packet’s next hop isn't the receiver. It’s delivered to the higher layer with a touch
within the packet header proving this packet was overheard. PTR more processes it. So, an edge of broadcast and
unicast (MAC support) is achieved.
3. ASSOCIATED MECHANISM
Castelluccia et al [13] projected an easy and incontrovertibly secure encoding permitting encrypted knowledge to be
with efficiency and additively aggregate.simply a standard addition is required for cipher-text aggregation. Theme
security is predicated on the in distinguish ability property of a pseudorandom operate (PRO), a typical crypto
graphical primitive. it had been established that aggregation supported this could with efficiency reckon applied
mathematics values, like mean, variance, and perceived data’s variance, whereas achieving nice information
measure savings. to shield aggregate data’s integrity, AN end-to-end combination authentication theme was created
that was secure against outsider-only attacks.Su et al [14] instructed a way to realize best rate allocation for
knowledge aggregation in wireless device networks. First, a rate allocation downside was developed as a network
utility maximization downside; some of variable substitutions on the initial downside was created attributable to its
non-convexity and reworked it into an approximate problem, which is plan convex. Then duality theory was applied
to decompose the approximate downside into a rate management sub-problem and a programming sub-problem.
Supported this, a distributed algorithmic program for joint rate management and programming is meant, and was
established to approach randomly near the optimum of the approximate downside. Theoretical analysis/simulations
prove that approximate resolutions are able to do near-optimal performance.Boppana et al [15] evaluated 2
representative SDA schemes realistically exploitation TOSSIM machine for analyses. To validate knowledge
aggregation techniques implementation of information was through use of an analytical model. Results reveal that
it's necessary to cut back transmitted packets range than the general range of bits transmitted. With low duty cycles
and low device knowledge generation likelihood, even straightforward concatenation of device knowledge, that
lowered the amount of packets transmitted, was as effective because the a lot of refined SDA schemes; once device
knowledge square measure generated a lot of of times, SDA schemes that don't need intermediate nodes decode
device knowledge to present 100 percent higher network lifespan. Daabaj et al [16] developed a reliable load-
balancing routing (RLBR) protocol for network lifespan maximization supported reliability-oriented protocols and
ancient energy-aware routing protocols. RLBR uses Channel State data (CSD) e.g., RSSI and LQI, link estimation
supported packet transmissions e.g., success reception magnitude relation (PRR) and packet error magnitude relation
(PER), and residual energy capability as well as alternative parameters, e.g., source id, CRC, hop count, aggregation
load, and latency to make a price operate for choosing the foremost reliable and energy economical route towards
the bottom station. In alternative words, RLBR lowered energy consumed for packet transmissions by embedding
routing data in overheard packets and lowering management traffic. Hence, it maintains low packet error magnitude
relation and improves packet delivery whereas minimizing redundant packet transmission and/or retransmissions
throughout the network. .
Consistent Data Release in MANET Using Light Weight Verification
Algorithm with High Node Mobility
©IJCERT 50 | P a g e
It permits adaptation of quantity of traffic to network fluctuations property and energy expenditure.Virmani et al
[17] projected DLMT and CLMT algorithms to increase node life. Redistributed lifespan maximizing tree (DLMT)
is a component of nodes with magnified energy to be chosen as knowledge aggregating oldsters whereas Centralized
lifespan maximizing Tree (CLMT) showcases options with bottleneck node Identification to gather knowledge
centrally among a given set of nodes. Simulation results reveal that useful lifespan is increased by 147% once
knowledge is aggregate via DLMT and by 139% once knowledge is aggregate via CLMT. Projected DLMT
algorithmic program discovered thirteen further lifespan saving while not increasing delay. In Figure two, Packet
delivery magnitude relation shows outstanding increase once the tree depth is taken into account during this tree
structures.Peng et al [18] instructed a reliable knowledge aggregation/dissemination framework with respect to plan
of action networks. The framework combines disruption tolerant networking blessings and an adaptational device
knowledge aggregation methodology to confirm reliable knowledge delivery. Experimental model system design
was developed and enforced to demonstrate capabilities of the instructed knowledge aggregation and dissemination
framework. A relevant demonstration situation supported an information aggregation Map was developed for system
analysis. In Figure three, take a look at results showed that the projected framework inferred meaningful messages
from raw device knowledge accurately and dependably delivered messages to correct destinations. This projected
framework can be lasting resolution benefitting current and future system level style of plan of action network
architectures.
4. ANALYSIS
Theoretical analysis on POR’s lustiness and overhead comprehensive of memory consumption and duplicate
relaying also will be mentioned during this section. Because the focus is on node quality, a perfect wireless channel
is assumed and unit disc graph model employed by default: a link between 2 nodes exists if the gap between them is
a smaller amount than a selected threshold. Once 2 nodes area unit set inside every other’s’ coverage vary (R),
failure proof bidirectional knowledge transmission between them is achieved. POR’s main concern is its overhead as
a result of opportunist forwarding, as many packet copies have to be compelled to be cached in forwarding
candidates leading to a lot of memory consumption, and duplicate relaying. This becomes attainable if the
suppression theme fails thanks to node quality. However it'll be conferred later as a not significant issue. Simply
node quality forwarding failure into consideration} and therefore the impact of unreliable wireless links isn't taken
into account. It’s felt that in lightweight traffic case with MAC layer enforced theme, node quality is believed to be
the most issue that ends up in packet forwarding failure.
5. PERFORMANCE ASSESSMENT
To evaluate POR performance, the algorithmic rule was simulated in numerous mobile network topologies in NS-2.
It absolutely was compared with AOMDV (a multipath routing protocol) and GPSR (a representative geographic
routing protocol). Common parameters were utilized within the simulations. Improved random method purpose
B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar
International Journal of Computer Engineering In Research Trends (IJCERT ) 51 | P a g e
while not pausing is employed to model nodes’ quality with minimum node speed being set to one m/s. the most
speed is varied to vary network quality degree. The subsequent metrics compare performance:
 Packet delivery quantitative relation: The ratio of knowledge packets variety received at the destination(s)
to the information packet variety sent by source(s).
 End-to-end delay: the typical and median end-to-end delay square measure evaluated, alongside additive
delay distribution operate.
 Path length: Average end-to-end path length (number of hops) for productive packet delivery.
 Packet forwarding times per hop (FTH): Average times a packet is forwarded from routing layer
perspective to deliver information packet over every hop.
 Packet forwarding times per packet (FTP): the days a packet is forwarded from routing layer perspective to
deliver information packet from supply to destination.
Among metrics, FTH and FTP appraise the quantity of duplicate forwarding. For unicast vogue routing protocols,
packet reroute caused by path break accounts for FTH being bigger than one. Except for packets that aren't delivered
to destination(s), efforts already created in forwarding packets remains thought of in FTH calculations.
Figure 2. Analytical delivery time ratio versus node ability
Consistent Data Release in MANET Using Light Weight Verification
Algorithm with High Node Mobility
©IJCERT 52 | P a g e
Figure 3. Analytical delivery Accuracy ratio versus node ability
5. CONCLUSION
This paper addresses the matter of reliable knowledge delivery in extremely dynamic MANETs. Constantly
changing configuration makes typical unplanned routing protocols incapable of satisfactory performance. Just in
case of constant link breaks attributable to node quality, substantial knowledge packets are lost or endure long
latency before property is restored. Impressed by timeserving routing, a completely unique MANET routing
protocol PTR that takes advantage of geographic routing’s unsettled property and also the broadcast nature of
wireless medium is planned additionally to choosing next hop, many forwarding candidates precise in case of link
break. Investing on natural backup within the air, broken routes are recovered in time. The involvement of
forwarding candidates against node quality and overhead attributable to timeserving forwarding is analyzed.
Simulation any confirms PTR’s effectiveness: high packet delivery quantitative relation is achieved with low delay
and duplication.
REFRENCES:
[1] Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W.(2002). TAG: A tiny aggregation service for ad-hoc
sensor networks. ACM SIGOPS Operating Systems Review, 36(SI),131-146.
[2] Law, Y. W., Palaniswami, M., &Phan, R. C. W. (2009). Secure Data Aggregation in Wireless Sensor Networks.
Guide to Wireless Sensor Networks, 533-559.
B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar
International Journal of Computer Engineering In Research Trends (IJCERT ) 53 | P a g e
[3] Considine, J., Li, F., Kollios, G., & Byers, J. (2004, March). Approximate aggregation techniques for sensor
databases. In Data Engineering, 2004. Proceedings. 20th International Conference on (pp. 449-460). IEEE.
[4] Garofalakis, M., Hellerstein, J. M., &Maniatis, P. (2007,April). Proof sketches: Verifiable in-network
aggregation. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 996-1005). IEEE.
[5] Yu, H. (2011). Secure and highly-available aggregation queries in large-scale sensor networks via set
sampling.Distributed Computing, 23(5), 373-394.
[6] Frikken, K. B., & Dougherty IV, J. A. (2008, March). An efficient integrity-preserving scheme for hierarchical
sensor aggregation. In Proceedings of the first ACM conference on Wireless network security (pp. 68-76). ACM.
[7] Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., &Jetcheva, J. (1998, October). A performance comparison of
multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th annual ACM/IEEE international
conference on Mobile computing and networking (pp. 85-97). ACM.
[8] Karp, B., & Kung, H. T. (2000, August). GPSR: Greedy perimeter stateless routing for wireless networks. In
Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254). ACM.
[9] Arad, N., &Shavitt, Y. (2009). Minimizing recovery state in geographic ad hoc routing. Mobile Computing,
IEEE Transactions on, 8(2), 203-217.
[10] Ganesan, D., Govindan, R., Shenker, S., &Estrin, D. (2001).Highly-resilient, energy-efficient multipath routing
in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4), 11-25.
[11] Ye, Z., Krishnamurthy, S. V., &Tripathi, S. K. (2003, March). A framework for reliable routing in mobile ad
hoc networks.
In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE
Societies (Vol. 1, pp. 270-280). IEEE.

More Related Content

What's hot

An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 

What's hot (16)

An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
B0781013215
B0781013215B0781013215
B0781013215
 

Viewers also liked

A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessIJCERT
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceIJCERT
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelIJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerIJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsIJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 

Viewers also liked (16)

A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin Model
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 

Similar to Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility

V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...IAESIJAI
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 

Similar to Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility (20)

V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
ICICCE011
ICICCE011ICICCE011
ICICCE011
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
 
A2546035115
A2546035115A2546035115
A2546035115
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 

More from IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodIJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetIJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueIJCERT
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...IJCERT
 
V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceIJCERT
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.IJCERT
 

More from IJCERT (14)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSE
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
 
V3 i301
V3 i301V3 i301
V3 i301
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold Preference
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility

  • 1. ©IJCERT 44 | P a g e ISSN (Online): 2349-7084 International Journal of Computer Engineering In Research Trends (IJCERT) Volume 1, Issue 1, July 2014, PP 44-53 www.ijcert.org Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility B.Natraj Kumar1 ,M.Tech Research Scholar, M.Sri Lakshmi2 , Assistant Professor, Dr.S.Prem Kumar3 , Head of the Department Department of CSE, G.Pullaiah College of Engineering and Technology JNTU Anatapur, Andhra Pradesh, India ABSTRACT: - This paper addresses data aggregation and data packets problems for extremely dynamic mobile temporary networks and Wireless sensor Networks thereby resulting in a timely and reliable reduction in each communication and energy consumption. However there may be node failures in existing systems Associate in an aggregation framework doesn't address problems with false sub-aggregate values down to compromised nodes resulting in massive errors in base station computed aggregates once data is transferred through mobile device nodes. It cannot conjointly transfer data when nodes fail at the intermediate level. This paper proposes a completely unique light-weight verification rule and Position primarily based timeserving Routing (PTR) protocol that reduces node failure and knowledge loss problems. Theoretical analysis and simulation prove that PTR and also the novel light-weight verification rule succeed glorious performance below high node quality with acceptable overhead. Conjointly the new void handling theme performs expeditiously. Keywords: Geographic routing, opportunistic forwarding, reliable data delivery, void handling, mobile ad hoc network, Base station, data aggregation, hierarchical aggregation, in-network aggregation, sensor network security, synopsis diffusion
  • 2. B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar International Journal of Computer Engineering In Research Trends (IJCERT ) 45 | P a g e 1. INTRODUCTION Wireless sensor networks (WSNs) and MOBILE adhoc networks (MANETs) are used more and more in several applications [1] like wild environment observance, fire detection, and military police work. Once preparation within the field device nodes organize themselves into a multihop network, the bottom station being the central management purpose. Sometimes device nodes are greatly hampered by thanks to computation capabilities and energy reserves. an on the spot detected Information assortment technique from networks would be to forward every device node’s reading to the bottom station, through alternative intermediate nodes, before the bottom station processes received knowledge. However its disadvantage is its high value relating to communication overhead (or energy spent).Wireless networks gained interest thanks to benefits led to by multihop, infrastructure-less transmission. However, high node quality remains a difficulty thanks to error prone wireless channels and dynamic configuration, moving even reliable knowledge delivery in MANETs, particularly in challenged environments. standard topology-based MANET routing protocols (e.g., DSDV, AODV, DSR [1]) are at risk of node quality a reason being predetermination of associate degree end-to-end route before knowledge transmission. Thanks to perpetually and quick dynamic configuration, settled route maintenance may be a drawback. Discovery and recovery procedures client each time and energy. Knowledge packets are either lost or delayed for long once a path break, till route reconstruction resulting in transmission interruption. Computing aggregates in-network (combining partial results at intermediate nodes throughout message routing) in giant WSNs considerably lowers the quantity of communication and also the resultant energy consumed. Knowledge acquisition systems for WSNs [2], [3] construct a spanning tree unmoving at the bottom station to perform aggregation on the tree. Necessary aggregates thought-about embrace Count, and Sum. it's simple to generalize aggregates to predicate Count (e.g., sensors with readings beyond a hundred units) and add. Also, Count and add are often accustomed pc Average. Add formula also can figure variance and applied math Moment of any order. Tree- based aggregation approaches don't settle for communication losses thanks to node and transmission failures, common in WSNs.Location data is employed by geographic routing (GR) [2] to forward knowledge packets, in hop- by-hop Routing fashion. Greedy forwarding selects following hop forwarder with biggest progress toward destination whereas void handling mechanism to route around communication voids [3]. there ought no to maintain end-to-end routes, resulting in GR’s potency and quantifiability; however it's sensitive to location data [4] quality. In greedy forwarding operations, a comparatively isolated neighbor is chosen because the next hop. Once the node goes far away from the Sender’s coverage space, transmission fails. In GPSR [5] (a noted geographic routing protocol), the mackintosh layer Failure feedback offers packet another reroute probability. However simulation reveals that it's incapable of maintaining performance once node quality will increase. One packet transmission ends up in multiple receptions thanks to the printed nature of the wireless medium. Once such transmission is that the backup, the routing protocol’s hardiness is greatly increased. Time serving routing [6], [7], [8] incontestable multicast-like routing strategy. This paper addresses this drawback. The analysis community planned exploitation multipath routing techniques to forward sub-aggregates [2]. Aggregates like Min and liquid ecstasy are duplicate- insensitive and then this approach provides a fault-tolerant resolution. a unique Position-based timeserving Routing (PTR) protocol wherever many forwarding candidates’ cache packets exploitation mackintosh interception was
  • 3. Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility ©IJCERT 46 | P a g e planned. once the simplest forwarder fails to forward packets insure time slots, suboptimal candidates forward them in turns in an exceedingly domestically fashioned order. So, as long in concert candidate with success receives and forwards packets, knowledge transmission is uninterrupted. Doable multipath is exploited on a per packet basis on the fly, resulting in glorious hardiness for PTR. The rest of this paper is organized as follows: we have a tendency to gift the protocol style of PTR and complementary mechanisms in Section a pair of. VDVH is pictured in Section three. Section four analyses the impact of node quality on packet delivery and divulges the advantages led to by the participation of forwarding candidates. Redundancy in PTR, including memory consumption and duplicate relaying thanks to timeserving forwarding also will be mentioned. In Section five, we have a tendency to appraise the performance of planned schemes by simulation and compare them with alternative routing protocols. Section vi reviews the connected work and conclusions are given in Section seven. 2. POSITION-BASED OPPTRTUNISTIC ROUTING 2.1 Overview PTR style is predicated on geographic routing and opportunistic forwarding. The nodes area unit thought to remember of their location and their direct neighbor’s positions. Neighborhood location data is changed through a one-hop beacon or through riding piggyback within the knowledge packet header. It’s thought that location registration and search service that map node addresses to locations is obtainable as in [5] for the destination position. this could be accomplished through use of the many styles of location service [11],[12]. During this situation, economical and reliable ways that are accessible. Destination location will be transmitted by low bit rate and long vary radios, that area unit enforced as periodic beacons, additionally through replies once the supply requests it. When a supply node plans to transmit a packet, it gets destination location 1st once that it's connected to the packet header. Due to the destination node’s movement, a multihop path could diverge from the ultimate location’s true location with a packet being born although it's been delivered within the destination neighborhood. Further destination node checks area unit introduced to handle such problems. The packet forwarding node checks the neighbor list at each hop to examine whether or not destination is inside transmission vary. If so, the packet is directly forwarded to the destination, almost like destination location prediction theme delineated in [4]. Although such identification checks before greedy forwarding supported location data, path divergence result will be relieved. For a packet to be received by multiple candidates in standard expedient forwarding either informatics broadcast or a routing integration and Macintosh protocol is adopted. the previous is liable to Macintosh collision thanks to lack of collision turning away support for broadcast packet in current 802.11, whereas for the latter it wants complicated coordination that isn't straightforward to implement. PTR uses a theme almost like the Macintosh multicast mode delineated in [13]. The packet is transmitted asunicast (the best forwarder creating the most important positive
  • 4. B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar International Journal of Computer Engineering In Research Trends (IJCERT ) 47 | P a g e progress towards destination becomes subsequent hop) in informatics layer and multiple reception is thru Macintosh interception. Use of RTS/CTS/DATA/ACK greatly lowers the collision and nodes inside the sender’s transmission vary may snoop on a packet with success with smart likelihood thanks to medium reservation. As knowledge packets area unit transmitted multicast-like every is known with a novel tuple (src_ip, seq_no) wherever src_ip becomes the informatics address of supply node and seq_no the corresponding sequence variety. Every node encompasses a monotonically increasing sequence variety, associate degrees an ID Cache-to record packets ID (src_ip,seq_no) that were received recently. Receipt of a packet with same ID ends up in it being discarded. Otherwise, it's forwarded to the receiver to subsequent hop, or keep in a very Packet List if received by a forwarding candidate. It’s born once the receiver isn't given. The packet within the Packet List is shipped out once awaiting a selected variety of your time slots or discarded if identical packet is received once more throughout the waiting amount (this suggests that a much better forwarder has already meted out the task).PTR’s routing situation is illustrated in Fig. 1. in a very traditional scenario sans link break, the packet is forwarded by subsequent hop node (nodes A, E) and forwarding candidates (nodes B, C; nodes F, G) area unit suppressed (the same packet in Packet List is dropped) by subsequent hop node’s transmission. If node A fails to deliver the packet (node A has taken away and then cannot receive the packet), node B, the forwarding candidate with high priority relays packet and suppresses the lower priority candidate’s forwarding (node C) and node S. By mistreatment Macintosh layer feedback, node S removes node A from neighbors list and selects a replacement next hop node for the next packets. The interface queue packets taking node A because the next hop get a second likelihood to reroute. A packet force back from Macintosh layer won't be rerouted if node S overhears node B’s forwarding. Figure 1: Position-Based Opportunistic Routing 2.2 Selection and Prioritization of Forwarding Candidates One of PTR’s main issues is choice and prioritization of forwarding candidates. only forwarding space nodes [14] would be backup nodes. The sender decides the forwarding space and also the next hop node. A forward space node meets the subsequent 2 conditions: 1) it makes positive progress toward the destination; and 2) its distance to future hop node mustn't be over a wireless node’s 0.5 transmissions vary (i.e., R=2) in order that all forwarding will didates can hear from each other. In Fig. 1, the forwarding space is that self-enclosed by the daring curve. the realm nodes
  • 5. Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility ©IJCERT 48 | P a g e beside node A (i.e., nodes B, C), area unit potential candidates. Of the specified variety of backup nodes, some are going to be chosen as forwarding candidates. A forwarding candidate’s priority is set by its distance to the destination. The nearer the destination, higher is that the priority. Once a node sends or forwards a packet, it selects future hop forwarder and additionally the forwarding candidates among neighbors. The forwarder list includes next hop and also the candidate list. Formula one provides the tactic to select/prioritize the forwarder list. Candidate list is hooked up to the packet header and updated hop by hop. Solely candidates list such nodes are going to be forwarding candidates. The lower the node’s index within the candidate list, the upper its priority. Before conniving a replacement forwarder list, it refers to the forwarding table, to examine whether or not a legitimate item for that destination continues to be on the market. The forwarding table engineered throughout knowledge packet transmissions is maintained simply than a routing table. It may even be thought of a trade-off between potency and quantifiability. As forwarding table institution is predicated on native info it's created in minimum time. Hence, Associate in nursing ending time will be assailing things maintained to stay the table tiny. The table records solely current active flows, whereas in ancient protocols, route ending time decrease would wish additional resources to reconstruct. 2.3 Limitation on Possible Duplicate Relaying Due to nodes’ movement and collisions, a number of forwarding candidates may not receive a packet forwarded by next hop node or a better priority candidate, leading to some duplicate relaying. Once the forwarding candidate adopts constant situation as a next hop node, it additionally calculates a candidate list and in an exceedingly worst case situation, a packet’s propagation space can embody the complete circle with the destination because the center and therefore the radius might be adequate the distance between supply and destination. To limit duplicate relaying, solely supply forwarded packet and therefore the next hop node are transmitted in associate timeserving fashion and cached by multiple candidates. In alternative words, solely supply and next hop node calculate the candidate list, whereas it's empty for the packet relayed by a forwarding candidate. Thus, a packet’s propagation space is restricted to an explicit band between supply and destination. Also, with ID cache, duplicate packets ar quickly born while not being propagated additional.. 2.4 MAC Modification and Complementary Techniques 2.4.1 MAC Interception The broadcast nature of 802.11 Macintosh is leveraged: nodes at intervals sender vary receive the signal. However its RTS/CTS/DATA/ACK mechanism is simply appropriate unicast. It sends knowledge to any or all broadcast packets with CSMA. Hence, collision primarily based packet loss dominates multicast-like routing protocols performance. Here, packet transmission state of affairs was altered. A packet is distributed via unicast in an exceedingly network layer, to the simplest node electoral by greedy forwarding because the next hop. This ensures
  • 6. B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar International Journal of Computer Engineering In Research Trends (IJCERT ) 49 | P a g e full utilization of the collision rejection supported by 802.11 MAC. On the receiver facet, MAC-layer address filter is changed, even once knowledge packet’s next hop isn't the receiver. It’s delivered to the higher layer with a touch within the packet header proving this packet was overheard. PTR more processes it. So, an edge of broadcast and unicast (MAC support) is achieved. 3. ASSOCIATED MECHANISM Castelluccia et al [13] projected an easy and incontrovertibly secure encoding permitting encrypted knowledge to be with efficiency and additively aggregate.simply a standard addition is required for cipher-text aggregation. Theme security is predicated on the in distinguish ability property of a pseudorandom operate (PRO), a typical crypto graphical primitive. it had been established that aggregation supported this could with efficiency reckon applied mathematics values, like mean, variance, and perceived data’s variance, whereas achieving nice information measure savings. to shield aggregate data’s integrity, AN end-to-end combination authentication theme was created that was secure against outsider-only attacks.Su et al [14] instructed a way to realize best rate allocation for knowledge aggregation in wireless device networks. First, a rate allocation downside was developed as a network utility maximization downside; some of variable substitutions on the initial downside was created attributable to its non-convexity and reworked it into an approximate problem, which is plan convex. Then duality theory was applied to decompose the approximate downside into a rate management sub-problem and a programming sub-problem. Supported this, a distributed algorithmic program for joint rate management and programming is meant, and was established to approach randomly near the optimum of the approximate downside. Theoretical analysis/simulations prove that approximate resolutions are able to do near-optimal performance.Boppana et al [15] evaluated 2 representative SDA schemes realistically exploitation TOSSIM machine for analyses. To validate knowledge aggregation techniques implementation of information was through use of an analytical model. Results reveal that it's necessary to cut back transmitted packets range than the general range of bits transmitted. With low duty cycles and low device knowledge generation likelihood, even straightforward concatenation of device knowledge, that lowered the amount of packets transmitted, was as effective because the a lot of refined SDA schemes; once device knowledge square measure generated a lot of of times, SDA schemes that don't need intermediate nodes decode device knowledge to present 100 percent higher network lifespan. Daabaj et al [16] developed a reliable load- balancing routing (RLBR) protocol for network lifespan maximization supported reliability-oriented protocols and ancient energy-aware routing protocols. RLBR uses Channel State data (CSD) e.g., RSSI and LQI, link estimation supported packet transmissions e.g., success reception magnitude relation (PRR) and packet error magnitude relation (PER), and residual energy capability as well as alternative parameters, e.g., source id, CRC, hop count, aggregation load, and latency to make a price operate for choosing the foremost reliable and energy economical route towards the bottom station. In alternative words, RLBR lowered energy consumed for packet transmissions by embedding routing data in overheard packets and lowering management traffic. Hence, it maintains low packet error magnitude relation and improves packet delivery whereas minimizing redundant packet transmission and/or retransmissions throughout the network. .
  • 7. Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility ©IJCERT 50 | P a g e It permits adaptation of quantity of traffic to network fluctuations property and energy expenditure.Virmani et al [17] projected DLMT and CLMT algorithms to increase node life. Redistributed lifespan maximizing tree (DLMT) is a component of nodes with magnified energy to be chosen as knowledge aggregating oldsters whereas Centralized lifespan maximizing Tree (CLMT) showcases options with bottleneck node Identification to gather knowledge centrally among a given set of nodes. Simulation results reveal that useful lifespan is increased by 147% once knowledge is aggregate via DLMT and by 139% once knowledge is aggregate via CLMT. Projected DLMT algorithmic program discovered thirteen further lifespan saving while not increasing delay. In Figure two, Packet delivery magnitude relation shows outstanding increase once the tree depth is taken into account during this tree structures.Peng et al [18] instructed a reliable knowledge aggregation/dissemination framework with respect to plan of action networks. The framework combines disruption tolerant networking blessings and an adaptational device knowledge aggregation methodology to confirm reliable knowledge delivery. Experimental model system design was developed and enforced to demonstrate capabilities of the instructed knowledge aggregation and dissemination framework. A relevant demonstration situation supported an information aggregation Map was developed for system analysis. In Figure three, take a look at results showed that the projected framework inferred meaningful messages from raw device knowledge accurately and dependably delivered messages to correct destinations. This projected framework can be lasting resolution benefitting current and future system level style of plan of action network architectures. 4. ANALYSIS Theoretical analysis on POR’s lustiness and overhead comprehensive of memory consumption and duplicate relaying also will be mentioned during this section. Because the focus is on node quality, a perfect wireless channel is assumed and unit disc graph model employed by default: a link between 2 nodes exists if the gap between them is a smaller amount than a selected threshold. Once 2 nodes area unit set inside every other’s’ coverage vary (R), failure proof bidirectional knowledge transmission between them is achieved. POR’s main concern is its overhead as a result of opportunist forwarding, as many packet copies have to be compelled to be cached in forwarding candidates leading to a lot of memory consumption, and duplicate relaying. This becomes attainable if the suppression theme fails thanks to node quality. However it'll be conferred later as a not significant issue. Simply node quality forwarding failure into consideration} and therefore the impact of unreliable wireless links isn't taken into account. It’s felt that in lightweight traffic case with MAC layer enforced theme, node quality is believed to be the most issue that ends up in packet forwarding failure. 5. PERFORMANCE ASSESSMENT To evaluate POR performance, the algorithmic rule was simulated in numerous mobile network topologies in NS-2. It absolutely was compared with AOMDV (a multipath routing protocol) and GPSR (a representative geographic routing protocol). Common parameters were utilized within the simulations. Improved random method purpose
  • 8. B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar International Journal of Computer Engineering In Research Trends (IJCERT ) 51 | P a g e while not pausing is employed to model nodes’ quality with minimum node speed being set to one m/s. the most speed is varied to vary network quality degree. The subsequent metrics compare performance:  Packet delivery quantitative relation: The ratio of knowledge packets variety received at the destination(s) to the information packet variety sent by source(s).  End-to-end delay: the typical and median end-to-end delay square measure evaluated, alongside additive delay distribution operate.  Path length: Average end-to-end path length (number of hops) for productive packet delivery.  Packet forwarding times per hop (FTH): Average times a packet is forwarded from routing layer perspective to deliver information packet over every hop.  Packet forwarding times per packet (FTP): the days a packet is forwarded from routing layer perspective to deliver information packet from supply to destination. Among metrics, FTH and FTP appraise the quantity of duplicate forwarding. For unicast vogue routing protocols, packet reroute caused by path break accounts for FTH being bigger than one. Except for packets that aren't delivered to destination(s), efforts already created in forwarding packets remains thought of in FTH calculations. Figure 2. Analytical delivery time ratio versus node ability
  • 9. Consistent Data Release in MANET Using Light Weight Verification Algorithm with High Node Mobility ©IJCERT 52 | P a g e Figure 3. Analytical delivery Accuracy ratio versus node ability 5. CONCLUSION This paper addresses the matter of reliable knowledge delivery in extremely dynamic MANETs. Constantly changing configuration makes typical unplanned routing protocols incapable of satisfactory performance. Just in case of constant link breaks attributable to node quality, substantial knowledge packets are lost or endure long latency before property is restored. Impressed by timeserving routing, a completely unique MANET routing protocol PTR that takes advantage of geographic routing’s unsettled property and also the broadcast nature of wireless medium is planned additionally to choosing next hop, many forwarding candidates precise in case of link break. Investing on natural backup within the air, broken routes are recovered in time. The involvement of forwarding candidates against node quality and overhead attributable to timeserving forwarding is analyzed. Simulation any confirms PTR’s effectiveness: high packet delivery quantitative relation is achieved with low delay and duplication. REFRENCES: [1] Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W.(2002). TAG: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Operating Systems Review, 36(SI),131-146. [2] Law, Y. W., Palaniswami, M., &Phan, R. C. W. (2009). Secure Data Aggregation in Wireless Sensor Networks. Guide to Wireless Sensor Networks, 533-559.
  • 10. B.Natraj Kumar, M.Sri Lakshmi,Dr.S. Prem Kumar International Journal of Computer Engineering In Research Trends (IJCERT ) 53 | P a g e [3] Considine, J., Li, F., Kollios, G., & Byers, J. (2004, March). Approximate aggregation techniques for sensor databases. In Data Engineering, 2004. Proceedings. 20th International Conference on (pp. 449-460). IEEE. [4] Garofalakis, M., Hellerstein, J. M., &Maniatis, P. (2007,April). Proof sketches: Verifiable in-network aggregation. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 996-1005). IEEE. [5] Yu, H. (2011). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling.Distributed Computing, 23(5), 373-394. [6] Frikken, K. B., & Dougherty IV, J. A. (2008, March). An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of the first ACM conference on Wireless network security (pp. 68-76). ACM. [7] Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., &Jetcheva, J. (1998, October). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking (pp. 85-97). ACM. [8] Karp, B., & Kung, H. T. (2000, August). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254). ACM. [9] Arad, N., &Shavitt, Y. (2009). Minimizing recovery state in geographic ad hoc routing. Mobile Computing, IEEE Transactions on, 8(2), 203-217. [10] Ganesan, D., Govindan, R., Shenker, S., &Estrin, D. (2001).Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4), 11-25. [11] Ye, Z., Krishnamurthy, S. V., &Tripathi, S. K. (2003, March). A framework for reliable routing in mobile ad hoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 1, pp. 270-280). IEEE.