SlideShare a Scribd company logo
1 of 5
Download to read offline
COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II)
1518
Safe Trust Alert Routing in MANET
Srikanth Meda1
, Mabu Bhasha R2
, Asha Aruna Sheela.M3
1
Associate Professor, 2,3
Assistant Professor
1,2,3
Department of Computer Science& Engineering
1,2
RVR & JC CE, Chowdavarm, Guntur, AP, India.
3
Universal College of Engineering, Guntur, AP, India.
Abstract: The main characteristic of the ad-hoc network is dynamic topology. In this, nodes modifications its position usually and these nodes have
to be compelled to be compelled to adapt for the topology amendment. Nodes can amendment position quite frequently that mean the standard of the
network. For quick info transmission, we'd sort of a routing protocol that adapts to topology changes. For our convenience, we've projected a fast and
secure protocol that's proactive and reactive in nature. Proactive nature used for adding the node into list, as a results of it taking a short while to line
the selection relating to node. And reactive nature used for locating the path for providing fast transmission.
Keyword: MANET, security, Reactive routing, Proactive routing, hybrid technology.
I. INTRODUCTION
A mobile ad hoc network (MANET) is a continuously
self-configuring, infrastructure-less network of mobile devices
connected without wires [1]. MANET could also be a network
that's freelance network. There’s MANET technology
employed in completely different application, like military
and civil applications. As a result of figureless property,
network might even be stricken with attackers. To avoid
security disadvantage there are many varied researchers
fictional several security ways like coding ways. To reinforce
security here we've got a bent to practice customary a pair of
ways, one is RSA formula and SHA-1 formula. Throughout
this project we've got a bent to prompt un-observability by
providing protection for the asking and reply. Our proposed
system main aim is to provide ultimate security in military
application
Fig.1 (a) MANET devices in ARMY, (b) MANET in civil
application
II. RELATED WORK
In this paper [2], author projected a replacement
classification of the defense lines taking into thought the
resiliency-oriented approach which we tend to establish
survivability properties. Survivability is made public as a
result of the network ability to fulfill properly its functions
even at intervals the presence of attacks. Survivability permits
MANETs to fulfill their goals even in presence of attacks or
intrusions. Ancient defense lines are not enough for giant
networks, since them gift altogether totally different
characteristics and properties that require new approaches.
[3]During this paper, author projected a replacement
due to improve the accountable of message transmission is
ISSN:2320-0790
COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II)
1519
presented. Inside the open cooperative Edouard MANET
atmosphere, any node can maliciously or selfishly disrupt and
communication of different nodes. Associate in Nursing SMT
protocol provides the way to secure message transmission by
dispersing the message among several ways with least
redundancy. It provides secure communication even with
accumulated vary of adversaries but cryptologic protection
can't be effective against network layer attacks notably like
Byzantine attacks.
[4]In this paper, author projected a replacement
because of improve the irresponsibility of message
transmission is given at intervals the open cooperative
MANET atmosphere, any node can maliciously or selfishly
disrupt and communication of different nodes. Associate
degree SMT protocol provides a way to secure message
transmission by dispersing the message among several
strategies with least redundancy. It provides secure
communication even with inflated vary of adversaries but the
method and data overhead square measure high.
[5]In this paper author target the impact of quality
models on the performance of painter routing protocols, so our
a try of observations concerning dialogue the impact of
movement quality speed of the nodes to causes the
performance of ancient customary proactive routing protocol
DSDV from ancient proactive family comparison with the two
outstanding On-demand reactive routing protocols AODV and
DSR from the reactive family for mobile ad-hoc networks.
This paper has conferred a comparison performance of
protocols for routing packets between wireless mobile hosts in
associate ad-hoc network AODV, DSR associated DSDV with
entirely totally different form of movement speed at constant
pause time that used AN AODV and DSR from On-Demand
protocols compared with DSDV from proactive table-driven
routing protocols.
2.1. Existing system:
In previous methodology they're exploitation the various
protocols in numerous network sections like pro active and
another one is reactive mechanism.
2.2. Disadvantage:
In proactive methodology, once a current node is joined at
intervals the network it delays it slow to converge throughout
that time if we tend to want to transmit data to sink through
that new node directly, it takes it slow to converge then it will
transmit the data. One the other hand, routes will unendingly
be offered for the asking. Reactive protocols get to line up
routes on-demand only.
III. PROPOSED SYSTEM
Planned quick and secure protocol, routing is
performed through proactive and reactive mechanism. In
routers that use dynamic routing protocols, it is vital to
possess quick convergence as a result of routers may build
incorrect forwarding choices till the network has totally
converged.
Therefore we tend to area unit progressing to propose
the idea that is combination of each kind that's Proactive
structure, reactive structure and secure mechanism.
3.1. Algorithm for Fast and secure
1. Initialize the nodes: there are the two type of node as
follows
a. Traffic monitor node
b. Normal node
2. Traffic monitor generates the request in small
interval
3. If new node detected
a. Checks its activity (malicious or not)
i. If malicious informing to all normal node
ii. If not malicious
1. Find the path through the new node by
reactive
4. Else transfer the data by proactive
3.2. Checks its activity (malicious or not)
1. Traffic monitor send the request to new node and
monitors the activity.
2. If the node is normal node then it forward idle
message when it is in idle mode.
3. If not is malicious, then it won’t provide any info
simply drop the packets.
3.3. Proposed system description
The main characteristic of the ad-hoc network is
dynamic topology. In this, nodes changes its position often
and these nodes have to adapt for the network topology
change. For quick data transmission, we need a routing
protocol that adapts to topology changes. For our need of
QoS, we have proposed a fast and secure protocol which is
proactive and reactive in nature. And also we considered data
COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II)
1520
transmission with encryption decryption model, which is not
considered in our reference research model.
3.4. MODULES
[1]. Network design
 Traffic manager
 Normal node
[2]. Monitoring the traffic
[3]. Route discovery process
 Create trust list
 Check trust list
3.4.1) Network design:
We are going to create a network with number of
nodes which is a mobile ad-hoc network and we are going to
create the network with the MANET specifications i.e., each
node can communicate with any other node directly which are
in coverage area of the node. In this network we are forming
one leader node which is known as traffic manger which will
controls the entire traffic of the network and remaining are
normal nodes.
TRAFFIC MANAGER: This is the leader node which is
going to take care of all other nodes by managing the traffic. It
is going to check whether the reply’s sending by the nodes are
appropriate or not in regular intervals, whenever any new
node enter in to the network it will check whether the node is
hacking node or not by the reply it sending and inform to all
other nodes about the new node for the secure data
transmission.
NORMAL NODE: This is the general node which will make
the data transmissions whenever it wants to communicate with
any other node. It will send the data directly if the node is in
its coverage area otherwise it will use intermediate nodes by
checking whether that node is hacking node or not from the
traffic manager.
Fig.2 Network model
3.4.2) Monitoring the traffic:
Traffic monitoring will be handled by Traffic
manager which is the leader node. It is going to take care of
the entire network i.e., it monitors all the nodes and checks
which are giving good response based on that it will allow
other nodes to communicate with each other.
Fig.3. Key sharing
3.4.3) Route discovery process:
Whenever a node want to communicate with other node it
have to find the route for forwarding the data. In this route if
any new node is entered means there is a chance of that may
be a hacking node. So, we have to avoid that hacking nodes
for secure data transmission. For this nodes are maintaining a
list known as true list, in this nodes are going to store about
the other nodes for finding the secure route.
COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II)
1521
Fig.4. Route discovery process
CREATE TRUST LIST: Nodes are going to create a list
known as true list, in this they are going to store about the
node information’s which given proper response to the traffic
manager.
CHECK TRUST LIST: Whenever a node want to send the
data it will send route request to other nodes. The node which
received the route request packet will checks whether that
node is present in the true list or not if presented means it will
forward to other nodes and it will repeats until it reaches
destination.
IV. PERFORMANCE ANALYSIS
In this paper, we presented our research model
testing result, which is shown in Xgraph. Here we analyzed
two main parameters. One is convergence time and another
one is packet delivery ratio.
Packet delivery function:
Packet delivery function is the defined as number of
packets successfully transmitted between source and
destination.
Fig.5. Delay time
Fig5. Shows that the delay of packet transmission, in that
green colour bar graph indicates the proposed model and red
colour indicates the existing model.
Fig6. Shows that the PDF, in that green colour bar graph
indicates the proposed model and red colour indicates the
existing model.
Fig6. Packet delivery ratio
V. CONCLUSION
The proposed fast and secure transmit protocol
performs fast routing using proactive and reactive mechanism.
It also gives security to the network with help of algorithm.
The proposed work is simulated in ns2.
COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II)
1522
REFERENCES
[1].http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
[2].B.Thanikaivel, B. Pranisa “Fast and Secure data
transmission in MANET” 2012
[3].Michele Nogueira Lima , Aldri Luiz dos Santos ,Guy
Pujolle “A Survey of Survivability in Mobile Ad Hoc
Networks” , 2007.
[4].V. Anitha, Dr. J. Akilandeswari “Secured Message
Transmission in Mobile AD HOC Networks through
Identification and Removal of Byzantine Failures” ,
2010
[5]. Jiejun Kong, Xiaoyan Hong,Mario Gerla. “An Identity-
free and On Demand Routing Scheme against
Anonymity Threats in Mobile Ad-hoc Networks” 2007
[6].Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz,
and Ahmed Safwat Abd El-Radi. “Performance
Evaluation of Mobility Speed over MANET Routing
Protocols”, 2010.
[7].Ajay Vikram Singh, Prof. M. Afshar Alam and Prof. Bani
Singh. “Mobility Based Proactive and Reactive Routing
Algorithm in Mobile Ad hoc Networks (MANETs)”,
2011
[8]. “Detecting Malicious Nodes For Secure Routing in
MANETS Using Reputation Based Mechanism”
Santhosh Krishna B.V, Mrs.Vallikannu A.L.
[9].Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao,
Robert H. Deng. “Anonymous Secure Routing in Mobile
Ad-Hoc Networks”,2004
[10]. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons,
Abraham Flaxman.“SybilGuard: Defending Against
Sybil Attacks via Social Networks” 2008

More Related Content

What's hot

Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackIJERA Editor
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 

What's hot (18)

He3413241328
He3413241328He3413241328
He3413241328
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 
Aodv
AodvAodv
Aodv
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 

Viewers also liked

Uvodni workshop CEITEC Nano 5.3.2015
Uvodni workshop CEITEC Nano 5.3.2015Uvodni workshop CEITEC Nano 5.3.2015
Uvodni workshop CEITEC Nano 5.3.2015CeitecNano
 
Connect(ed) - The Founder Finder
Connect(ed) - The Founder FinderConnect(ed) - The Founder Finder
Connect(ed) - The Founder FinderAaron Upright
 
Spisanie VIP - Broi 36 (01.12.15)
Spisanie VIP - Broi 36 (01.12.15)Spisanie VIP - Broi 36 (01.12.15)
Spisanie VIP - Broi 36 (01.12.15)The Gentlemans Code
 
Video worksheet
Video worksheetVideo worksheet
Video worksheetjustwatts3
 
Intervento di Katia Zampogna, Torino 12 novembre 2015
Intervento di Katia Zampogna, Torino 12 novembre 2015Intervento di Katia Zampogna, Torino 12 novembre 2015
Intervento di Katia Zampogna, Torino 12 novembre 2015infoprogetto
 
FRESKO Imageworks Photo Book iPad
FRESKO Imageworks Photo Book iPadFRESKO Imageworks Photo Book iPad
FRESKO Imageworks Photo Book iPadFrancisco Escobar
 
1era guiaa
1era guiaa1era guiaa
1era guiaawendy-18
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Vic Artiga
 

Viewers also liked (17)

Kalle 6a
Kalle 6aKalle 6a
Kalle 6a
 
resume2
resume2resume2
resume2
 
Uvodni workshop CEITEC Nano 5.3.2015
Uvodni workshop CEITEC Nano 5.3.2015Uvodni workshop CEITEC Nano 5.3.2015
Uvodni workshop CEITEC Nano 5.3.2015
 
Connect(ed) - The Founder Finder
Connect(ed) - The Founder FinderConnect(ed) - The Founder Finder
Connect(ed) - The Founder Finder
 
Teckell soccer collection
Teckell soccer collectionTeckell soccer collection
Teckell soccer collection
 
Spisanie VIP - Broi 36 (01.12.15)
Spisanie VIP - Broi 36 (01.12.15)Spisanie VIP - Broi 36 (01.12.15)
Spisanie VIP - Broi 36 (01.12.15)
 
Leed de forest
Leed de forestLeed de forest
Leed de forest
 
Video worksheet
Video worksheetVideo worksheet
Video worksheet
 
Intervento di Katia Zampogna, Torino 12 novembre 2015
Intervento di Katia Zampogna, Torino 12 novembre 2015Intervento di Katia Zampogna, Torino 12 novembre 2015
Intervento di Katia Zampogna, Torino 12 novembre 2015
 
MUPI METRO 3X2 BILBAO
MUPI METRO 3X2 BILBAOMUPI METRO 3X2 BILBAO
MUPI METRO 3X2 BILBAO
 
FRESKO Imageworks Photo Book iPad
FRESKO Imageworks Photo Book iPadFRESKO Imageworks Photo Book iPad
FRESKO Imageworks Photo Book iPad
 
EL CIRCO
EL CIRCOEL CIRCO
EL CIRCO
 
1era guiaa
1era guiaa1era guiaa
1era guiaa
 
Plan de estudio
Plan de estudioPlan de estudio
Plan de estudio
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...
 
Humanismo
HumanismoHumanismo
Humanismo
 
Isamar beltran
Isamar beltranIsamar beltran
Isamar beltran
 

Similar to Safe Trust Alert Routing in MANET

A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 

Similar to Safe Trust Alert Routing in MANET (20)

A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
N0363079085
N0363079085N0363079085
N0363079085
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 

More from Computer Science Journals

Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Computer Science Journals
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyComputer Science Journals
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksComputer Science Journals
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...Computer Science Journals
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 

More from Computer Science Journals (7)

Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.
 
Computer science journals
Computer science journalsComputer science journals
Computer science journals
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief Study
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor Networks
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 

Recently uploaded

Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 

Recently uploaded (20)

Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 

Safe Trust Alert Routing in MANET

  • 1. COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II) 1518 Safe Trust Alert Routing in MANET Srikanth Meda1 , Mabu Bhasha R2 , Asha Aruna Sheela.M3 1 Associate Professor, 2,3 Assistant Professor 1,2,3 Department of Computer Science& Engineering 1,2 RVR & JC CE, Chowdavarm, Guntur, AP, India. 3 Universal College of Engineering, Guntur, AP, India. Abstract: The main characteristic of the ad-hoc network is dynamic topology. In this, nodes modifications its position usually and these nodes have to be compelled to be compelled to adapt for the topology amendment. Nodes can amendment position quite frequently that mean the standard of the network. For quick info transmission, we'd sort of a routing protocol that adapts to topology changes. For our convenience, we've projected a fast and secure protocol that's proactive and reactive in nature. Proactive nature used for adding the node into list, as a results of it taking a short while to line the selection relating to node. And reactive nature used for locating the path for providing fast transmission. Keyword: MANET, security, Reactive routing, Proactive routing, hybrid technology. I. INTRODUCTION A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires [1]. MANET could also be a network that's freelance network. There’s MANET technology employed in completely different application, like military and civil applications. As a result of figureless property, network might even be stricken with attackers. To avoid security disadvantage there are many varied researchers fictional several security ways like coding ways. To reinforce security here we've got a bent to practice customary a pair of ways, one is RSA formula and SHA-1 formula. Throughout this project we've got a bent to prompt un-observability by providing protection for the asking and reply. Our proposed system main aim is to provide ultimate security in military application Fig.1 (a) MANET devices in ARMY, (b) MANET in civil application II. RELATED WORK In this paper [2], author projected a replacement classification of the defense lines taking into thought the resiliency-oriented approach which we tend to establish survivability properties. Survivability is made public as a result of the network ability to fulfill properly its functions even at intervals the presence of attacks. Survivability permits MANETs to fulfill their goals even in presence of attacks or intrusions. Ancient defense lines are not enough for giant networks, since them gift altogether totally different characteristics and properties that require new approaches. [3]During this paper, author projected a replacement due to improve the accountable of message transmission is ISSN:2320-0790
  • 2. COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II) 1519 presented. Inside the open cooperative Edouard MANET atmosphere, any node can maliciously or selfishly disrupt and communication of different nodes. Associate in Nursing SMT protocol provides the way to secure message transmission by dispersing the message among several ways with least redundancy. It provides secure communication even with accumulated vary of adversaries but cryptologic protection can't be effective against network layer attacks notably like Byzantine attacks. [4]In this paper, author projected a replacement because of improve the irresponsibility of message transmission is given at intervals the open cooperative MANET atmosphere, any node can maliciously or selfishly disrupt and communication of different nodes. Associate degree SMT protocol provides a way to secure message transmission by dispersing the message among several strategies with least redundancy. It provides secure communication even with inflated vary of adversaries but the method and data overhead square measure high. [5]In this paper author target the impact of quality models on the performance of painter routing protocols, so our a try of observations concerning dialogue the impact of movement quality speed of the nodes to causes the performance of ancient customary proactive routing protocol DSDV from ancient proactive family comparison with the two outstanding On-demand reactive routing protocols AODV and DSR from the reactive family for mobile ad-hoc networks. This paper has conferred a comparison performance of protocols for routing packets between wireless mobile hosts in associate ad-hoc network AODV, DSR associated DSDV with entirely totally different form of movement speed at constant pause time that used AN AODV and DSR from On-Demand protocols compared with DSDV from proactive table-driven routing protocols. 2.1. Existing system: In previous methodology they're exploitation the various protocols in numerous network sections like pro active and another one is reactive mechanism. 2.2. Disadvantage: In proactive methodology, once a current node is joined at intervals the network it delays it slow to converge throughout that time if we tend to want to transmit data to sink through that new node directly, it takes it slow to converge then it will transmit the data. One the other hand, routes will unendingly be offered for the asking. Reactive protocols get to line up routes on-demand only. III. PROPOSED SYSTEM Planned quick and secure protocol, routing is performed through proactive and reactive mechanism. In routers that use dynamic routing protocols, it is vital to possess quick convergence as a result of routers may build incorrect forwarding choices till the network has totally converged. Therefore we tend to area unit progressing to propose the idea that is combination of each kind that's Proactive structure, reactive structure and secure mechanism. 3.1. Algorithm for Fast and secure 1. Initialize the nodes: there are the two type of node as follows a. Traffic monitor node b. Normal node 2. Traffic monitor generates the request in small interval 3. If new node detected a. Checks its activity (malicious or not) i. If malicious informing to all normal node ii. If not malicious 1. Find the path through the new node by reactive 4. Else transfer the data by proactive 3.2. Checks its activity (malicious or not) 1. Traffic monitor send the request to new node and monitors the activity. 2. If the node is normal node then it forward idle message when it is in idle mode. 3. If not is malicious, then it won’t provide any info simply drop the packets. 3.3. Proposed system description The main characteristic of the ad-hoc network is dynamic topology. In this, nodes changes its position often and these nodes have to adapt for the network topology change. For quick data transmission, we need a routing protocol that adapts to topology changes. For our need of QoS, we have proposed a fast and secure protocol which is proactive and reactive in nature. And also we considered data
  • 3. COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II) 1520 transmission with encryption decryption model, which is not considered in our reference research model. 3.4. MODULES [1]. Network design  Traffic manager  Normal node [2]. Monitoring the traffic [3]. Route discovery process  Create trust list  Check trust list 3.4.1) Network design: We are going to create a network with number of nodes which is a mobile ad-hoc network and we are going to create the network with the MANET specifications i.e., each node can communicate with any other node directly which are in coverage area of the node. In this network we are forming one leader node which is known as traffic manger which will controls the entire traffic of the network and remaining are normal nodes. TRAFFIC MANAGER: This is the leader node which is going to take care of all other nodes by managing the traffic. It is going to check whether the reply’s sending by the nodes are appropriate or not in regular intervals, whenever any new node enter in to the network it will check whether the node is hacking node or not by the reply it sending and inform to all other nodes about the new node for the secure data transmission. NORMAL NODE: This is the general node which will make the data transmissions whenever it wants to communicate with any other node. It will send the data directly if the node is in its coverage area otherwise it will use intermediate nodes by checking whether that node is hacking node or not from the traffic manager. Fig.2 Network model 3.4.2) Monitoring the traffic: Traffic monitoring will be handled by Traffic manager which is the leader node. It is going to take care of the entire network i.e., it monitors all the nodes and checks which are giving good response based on that it will allow other nodes to communicate with each other. Fig.3. Key sharing 3.4.3) Route discovery process: Whenever a node want to communicate with other node it have to find the route for forwarding the data. In this route if any new node is entered means there is a chance of that may be a hacking node. So, we have to avoid that hacking nodes for secure data transmission. For this nodes are maintaining a list known as true list, in this nodes are going to store about the other nodes for finding the secure route.
  • 4. COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II) 1521 Fig.4. Route discovery process CREATE TRUST LIST: Nodes are going to create a list known as true list, in this they are going to store about the node information’s which given proper response to the traffic manager. CHECK TRUST LIST: Whenever a node want to send the data it will send route request to other nodes. The node which received the route request packet will checks whether that node is present in the true list or not if presented means it will forward to other nodes and it will repeats until it reaches destination. IV. PERFORMANCE ANALYSIS In this paper, we presented our research model testing result, which is shown in Xgraph. Here we analyzed two main parameters. One is convergence time and another one is packet delivery ratio. Packet delivery function: Packet delivery function is the defined as number of packets successfully transmitted between source and destination. Fig.5. Delay time Fig5. Shows that the delay of packet transmission, in that green colour bar graph indicates the proposed model and red colour indicates the existing model. Fig6. Shows that the PDF, in that green colour bar graph indicates the proposed model and red colour indicates the existing model. Fig6. Packet delivery ratio V. CONCLUSION The proposed fast and secure transmit protocol performs fast routing using proactive and reactive mechanism. It also gives security to the network with help of algorithm. The proposed work is simulated in ns2.
  • 5. COMPUSOFT, An international journal of advanced computer technology, 4 (2), February-2015 (Volume-IV, Issue-II) 1522 REFERENCES [1].http://en.wikipedia.org/wiki/Mobile_ad_hoc_network [2].B.Thanikaivel, B. Pranisa “Fast and Secure data transmission in MANET” 2012 [3].Michele Nogueira Lima , Aldri Luiz dos Santos ,Guy Pujolle “A Survey of Survivability in Mobile Ad Hoc Networks” , 2007. [4].V. Anitha, Dr. J. Akilandeswari “Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures” , 2010 [5]. Jiejun Kong, Xiaoyan Hong,Mario Gerla. “An Identity- free and On Demand Routing Scheme against Anonymity Threats in Mobile Ad-hoc Networks” 2007 [6].Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, and Ahmed Safwat Abd El-Radi. “Performance Evaluation of Mobility Speed over MANET Routing Protocols”, 2010. [7].Ajay Vikram Singh, Prof. M. Afshar Alam and Prof. Bani Singh. “Mobility Based Proactive and Reactive Routing Algorithm in Mobile Ad hoc Networks (MANETs)”, 2011 [8]. “Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism” Santhosh Krishna B.V, Mrs.Vallikannu A.L. [9].Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. “Anonymous Secure Routing in Mobile Ad-Hoc Networks”,2004 [10]. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman.“SybilGuard: Defending Against Sybil Attacks via Social Networks” 2008