SlideShare a Scribd company logo
17SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
Research Paper -Computer Science
July, 2013
Introduction
In MobileAd Hoc Networks (MANETs) has
become one of the most prevalent areas of research in
the recent years because of the challenges it pose to
the related protocols. MANET is the new emerging
technology which enables users to communicate with-
out anyphysical infrastructure regardless of their geo-
graphical location, that's whyit is some-times referred
to as an "infrastructure less" network. The prolifera-
tionofcheaper,smallandmorepowerfuldevicesmake
MANETafastestgrowingnetwork.Anadhocnetwork
isselforganizingandadaptive.Deviceinmobileadhoc
network should be able to detect the presence of other
devicesandperformnecessarysetupto facilitatecom-
munication and sharing of data and service. Ad hoc
networking allows the devices to maintain connec-
tionstothenetworkaswellaseasilyaddingandremov-
ing devices to and from the network. The set of appli-
cations for MANETs is diverse, ranging from large-
scale,mobile,highlydynamicnetworks,tosmall,static
networks that are constrained by power sources. Be-
sides the legacy applications that move from tradi-
tional infrastructure environment into the ad hoc con-
text, a great deal of new services can and will be gen-
erated for the new environment. It includes:
1.MilitaryBattlefield
2 Sensor Networks
3.MedicalService
4. PersonalArea Network.
Security solutions are important issues for
MANET,especiallyforthoseselectingsensitiveappli-
cations, have to meet the following design goals while
addressing the above challenges. MANET is more
vulnerable than wired network due to mobile nodes,
threats from compromised nodes inside the network,
limitedphysicalsecurity,dynamictopology,scalability
and lack of centralized management. Because ofthese
vulnerabilities, MANET are more prone to malicious
attacks. The primary focus of this work is to provide a
survey on various types of attacks the affect the
MANET behavior due to any reason.
Modules:
1. Efficient Geographic Multicast Protocol
2. Multicast Tree Construction
ASecureGroup CommunicationArchitecturefora
MobileCommunicationNetworks
* Mr. Hardik Doshi
*Ph.DStudent, DepartmentofComputerScience,SaurashtraUniversity,Rajkot.
3. Multicast group join
4. Packet sending from the source
5. Multicast data forwarding
ModuleDescription:
1.EfficientGeographicMulticastProtocol
EGMP supports scalable and reliable mem-
bershipmanagementandmulticastforwardingthrough
a two-tier virtual zone- based structure At the lower
layer,inreferencetoapre-determinedvirtualorigin,the
nodes in the network self-organize themselves into a
setofzonesandaleaderareelected inazonetomanage
the local group membership. At the upper layer, the
leader serves as a representative for its zone to join or
leave a multicast group as required.As a result, a net-
work-wide zone-based multicast tree is built. For effi-
cient and reliable management and transmissions, lo-
cation information will be integrated with the design
and used to guide the zone construction, group mem-
bership management, multicast tree construction and
maintenance, and packet forwarding.
2.ConstructionofMulticastTree
We present the multicast tree creation and
maintenanceschemes.InEGMP,insteadofconnecting
each group member directly to the tree, the tree is
formed in the granularity of zone with the guidance of
location information, which significantly reduces the
treemanagementoverhead.Withades-tinationlocation,
acontrolmessagecanbetransmittedimmediatelywith-
outincurringahighoverheadand delaytofindthepath
first, which enables quick group joining and leaving.
3.Multicastgroupjoin
When a node M wants to join the multicast
group G, if it is not a leader node, it sends a JOIN
REQ(M;PosM;G;fMoldg)messageto itszLdr,carry-
ing its address, position, and group to join. The ad-
dress of the old group leaderMold is an option used
when there is a leader handoff and a new leader sends
anupdatedJOINREQmessageto itsupstreamzone.If
MdidnotreceivetheNEWSESSIONmessageoritjust
joined the network.
4. Packet sending fromthe source
After the multicast tree is constructed, all the
sources ofthe group could send packets to the tree and
the packets will be forwarded along the tree. In most
18
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
tree-based multicast protocols, a data source needs to
send the packets initially to the root of the tree. If this
scheme is used and node 5 is a source, node 5 needs
to uni-cast the packets initially to root zone (2, 2). The
sending of packets to the root would introduce extra
delay especially when a source is far away from the
root.
5.Multicastdataforwarding
Maintain themulticast table, and the member
zonesnormallycannotbereachedwithinonehop from
the source. When a node N has a multicast Packet to
forward to a list of destinations (D1; D2: D3; :), it de-
cides the next hop node towards each destination (for
a zone, its center is used) using the geographic for-
warding strategy.After deciding the nexthop nodes, N
inserts the list of next hop nodes and the destinations
associatedwitheachnexthopnodeinthepacketheader.
Anexamplelist is(N1:D1;D3;N2:D2; :),whereN1 is
the next hop node for the destinations D1 and D3, and
N2 is the next hop node for D2. Then N broadcasts the
packet promiscuously (for reliability and efficiency)
Objectivesofthestudy:
The existing geographic routing protocols
generally assume mobile nodes are aware of their own
positionsthroughcertainpositioningsystem(e.g.,GPS),
and a source can obtain the destination position
through some type of location service. In, an interme-
diatenodemakesitsforwardingdecisionsbasedonthe
destination position inserted in the packet header by
the source and the positions of its one-hop neighbors
learned from the periodic beaconing of the neighbors.
By default, the packets are greedily forwarded to the
neighbor that allows for the greatest geographic
progress to the destination ODMRP are proposed to
enhance the robustness with re use of redundant paths
betweenthesourceandthedestinationpair'sscalability
dueto theoverhead incurredforroiaesearching,group
membership management, and creation and mainte-
nance of the tree/mesh structure over the dynamc
MANET.
Conclusions
Thereisanincreasingdemand and abigchal-
lengetodesc-morescalableand reliablemulticastpro-
tocoloveradynamcad hocnetwork (MANET).Inthis
paper,weproposeanefficientandscalablegeographic
multicastprotocol,EGMPforMANET.Thescalability
of EGMP is achieved through a two-tier virtua-zone-
based structure, which takes advantage of the geome'-
ric information to greatly simplify the zone manage-
ment anfl packet forwarding. We make a quantitative
analysisonrecontroloverheadoftheproposed EGMP
protocol and our resultsindicate that the per-node cost
of EGMP keeps relative-i constant with respect to the
network size and the group size We also performed
extensive simulations to evaluate the performance of
EGMP.

More Related Content

What's hot

Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
Muhammad Yousuf Khan
 
B43011014
B43011014B43011014
B43011014
IJERA Editor
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
Michel Chamat
 
Replica
ReplicaReplica
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
eSAT Journals
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Dr. Mazlan Abbas
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
IJERA Editor
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
Laili Aidi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
pharmaindexing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Zdravko Danailov
 

What's hot (17)

Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
B43011014
B43011014B43011014
B43011014
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
Replica
ReplicaReplica
Replica
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 

Similar to 17 18

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ijasuc
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
IJERA Editor
 
E0942531
E0942531E0942531
E0942531
IOSR Journals
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET Journal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
IJARIIT
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
IJRAT
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
ijsrd.com
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
ijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
172 179
172 179172 179

Similar to 17 18 (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
E0942531
E0942531E0942531
E0942531
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
172 179
172 179172 179
172 179
 

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL (20)

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 

17 18

  • 1. 17SHODH, SAMIKSHA AUR MULYANKAN International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54 Research Paper -Computer Science July, 2013 Introduction In MobileAd Hoc Networks (MANETs) has become one of the most prevalent areas of research in the recent years because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate with- out anyphysical infrastructure regardless of their geo- graphical location, that's whyit is some-times referred to as an "infrastructure less" network. The prolifera- tionofcheaper,smallandmorepowerfuldevicesmake MANETafastestgrowingnetwork.Anadhocnetwork isselforganizingandadaptive.Deviceinmobileadhoc network should be able to detect the presence of other devicesandperformnecessarysetupto facilitatecom- munication and sharing of data and service. Ad hoc networking allows the devices to maintain connec- tionstothenetworkaswellaseasilyaddingandremov- ing devices to and from the network. The set of appli- cations for MANETs is diverse, ranging from large- scale,mobile,highlydynamicnetworks,tosmall,static networks that are constrained by power sources. Be- sides the legacy applications that move from tradi- tional infrastructure environment into the ad hoc con- text, a great deal of new services can and will be gen- erated for the new environment. It includes: 1.MilitaryBattlefield 2 Sensor Networks 3.MedicalService 4. PersonalArea Network. Security solutions are important issues for MANET,especiallyforthoseselectingsensitiveappli- cations, have to meet the following design goals while addressing the above challenges. MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limitedphysicalsecurity,dynamictopology,scalability and lack of centralized management. Because ofthese vulnerabilities, MANET are more prone to malicious attacks. The primary focus of this work is to provide a survey on various types of attacks the affect the MANET behavior due to any reason. Modules: 1. Efficient Geographic Multicast Protocol 2. Multicast Tree Construction ASecureGroup CommunicationArchitecturefora MobileCommunicationNetworks * Mr. Hardik Doshi *Ph.DStudent, DepartmentofComputerScience,SaurashtraUniversity,Rajkot. 3. Multicast group join 4. Packet sending from the source 5. Multicast data forwarding ModuleDescription: 1.EfficientGeographicMulticastProtocol EGMP supports scalable and reliable mem- bershipmanagementandmulticastforwardingthrough a two-tier virtual zone- based structure At the lower layer,inreferencetoapre-determinedvirtualorigin,the nodes in the network self-organize themselves into a setofzonesandaleaderareelected inazonetomanage the local group membership. At the upper layer, the leader serves as a representative for its zone to join or leave a multicast group as required.As a result, a net- work-wide zone-based multicast tree is built. For effi- cient and reliable management and transmissions, lo- cation information will be integrated with the design and used to guide the zone construction, group mem- bership management, multicast tree construction and maintenance, and packet forwarding. 2.ConstructionofMulticastTree We present the multicast tree creation and maintenanceschemes.InEGMP,insteadofconnecting each group member directly to the tree, the tree is formed in the granularity of zone with the guidance of location information, which significantly reduces the treemanagementoverhead.Withades-tinationlocation, acontrolmessagecanbetransmittedimmediatelywith- outincurringahighoverheadand delaytofindthepath first, which enables quick group joining and leaving. 3.Multicastgroupjoin When a node M wants to join the multicast group G, if it is not a leader node, it sends a JOIN REQ(M;PosM;G;fMoldg)messageto itszLdr,carry- ing its address, position, and group to join. The ad- dress of the old group leaderMold is an option used when there is a leader handoff and a new leader sends anupdatedJOINREQmessageto itsupstreamzone.If MdidnotreceivetheNEWSESSIONmessageoritjust joined the network. 4. Packet sending fromthe source After the multicast tree is constructed, all the sources ofthe group could send packets to the tree and the packets will be forwarded along the tree. In most
  • 2. 18 International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54 tree-based multicast protocols, a data source needs to send the packets initially to the root of the tree. If this scheme is used and node 5 is a source, node 5 needs to uni-cast the packets initially to root zone (2, 2). The sending of packets to the root would introduce extra delay especially when a source is far away from the root. 5.Multicastdataforwarding Maintain themulticast table, and the member zonesnormallycannotbereachedwithinonehop from the source. When a node N has a multicast Packet to forward to a list of destinations (D1; D2: D3; :), it de- cides the next hop node towards each destination (for a zone, its center is used) using the geographic for- warding strategy.After deciding the nexthop nodes, N inserts the list of next hop nodes and the destinations associatedwitheachnexthopnodeinthepacketheader. Anexamplelist is(N1:D1;D3;N2:D2; :),whereN1 is the next hop node for the destinations D1 and D3, and N2 is the next hop node for D2. Then N broadcasts the packet promiscuously (for reliability and efficiency) Objectivesofthestudy: The existing geographic routing protocols generally assume mobile nodes are aware of their own positionsthroughcertainpositioningsystem(e.g.,GPS), and a source can obtain the destination position through some type of location service. In, an interme- diatenodemakesitsforwardingdecisionsbasedonthe destination position inserted in the packet header by the source and the positions of its one-hop neighbors learned from the periodic beaconing of the neighbors. By default, the packets are greedily forwarded to the neighbor that allows for the greatest geographic progress to the destination ODMRP are proposed to enhance the robustness with re use of redundant paths betweenthesourceandthedestinationpair'sscalability dueto theoverhead incurredforroiaesearching,group membership management, and creation and mainte- nance of the tree/mesh structure over the dynamc MANET. Conclusions Thereisanincreasingdemand and abigchal- lengetodesc-morescalableand reliablemulticastpro- tocoloveradynamcad hocnetwork (MANET).Inthis paper,weproposeanefficientandscalablegeographic multicastprotocol,EGMPforMANET.Thescalability of EGMP is achieved through a two-tier virtua-zone- based structure, which takes advantage of the geome'- ric information to greatly simplify the zone manage- ment anfl packet forwarding. We make a quantitative analysisonrecontroloverheadoftheproposed EGMP protocol and our resultsindicate that the per-node cost of EGMP keeps relative-i constant with respect to the network size and the group size We also performed extensive simulations to evaluate the performance of EGMP.