nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
Wireless sensor network consider as real time embedded system deployed in a particular region to sense various types of
environmental parameters such as temperature, pressure, gas, humidity etc. The huge applications of WSN like habitant monitoring,
forest fire detection, surveillances, transport monitoring etc. have created a lot of interest among the researcher community in recent
past. Typically, WSNs are densely deployed in hazardous places where battery recharge or replacement is nearly impossible and
human monitoring scheme is highly risky.
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct
Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these
protocols based on some performance matrices. Addition to this an attempt is done to calculate their
transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis
of the obtained results from the simulation, the above mentioned three protocols are compared. The
comparison results show that, the EEE LEACH routing protocol has a greater transmission time than
LEACH and DTx protocol and with smaller throughput.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
Optimal Converge cast Methods for Tree- Based WSNsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
The major objective of our work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. The message authentication is the main area to be considered in WSN’s. Most of the wireless networks are attacked for detecting the data’s that are transmitted in between the users. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.
An Ant Algorithm for Solving QoS Multicast Routing ProblemCSCJournals
Abstract: Many applications require send information from a source to multiple destinations through a communication network. To support these applications, it is necessary to determine a multicast tree of minimal cost to connect the source node to the destination nodes subject to delay constraints. Based on the Ant System algorithm, we present an ant algorithm to find the multicast tree that minimizes the total cost. In the proposed algorithm, the k shortest paths from the source node to the destination nodes are used for genotype representation. The expermintal results show that the algorithm can find optimal solution quickly and has a good scalability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
Wireless sensor network consider as real time embedded system deployed in a particular region to sense various types of
environmental parameters such as temperature, pressure, gas, humidity etc. The huge applications of WSN like habitant monitoring,
forest fire detection, surveillances, transport monitoring etc. have created a lot of interest among the researcher community in recent
past. Typically, WSNs are densely deployed in hazardous places where battery recharge or replacement is nearly impossible and
human monitoring scheme is highly risky.
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct
Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these
protocols based on some performance matrices. Addition to this an attempt is done to calculate their
transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis
of the obtained results from the simulation, the above mentioned three protocols are compared. The
comparison results show that, the EEE LEACH routing protocol has a greater transmission time than
LEACH and DTx protocol and with smaller throughput.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
Optimal Converge cast Methods for Tree- Based WSNsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
The major objective of our work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. The message authentication is the main area to be considered in WSN’s. Most of the wireless networks are attacked for detecting the data’s that are transmitted in between the users. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.
An Ant Algorithm for Solving QoS Multicast Routing ProblemCSCJournals
Abstract: Many applications require send information from a source to multiple destinations through a communication network. To support these applications, it is necessary to determine a multicast tree of minimal cost to connect the source node to the destination nodes subject to delay constraints. Based on the Ant System algorithm, we present an ant algorithm to find the multicast tree that minimizes the total cost. In the proposed algorithm, the k shortest paths from the source node to the destination nodes are used for genotype representation. The expermintal results show that the algorithm can find optimal solution quickly and has a good scalability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
Mobile Ad hoc networks (MANETs) are self organized by a collection of mobile nodes, which are interconnected by multi hop wireless paths. Providing QoS support in MANETs is an active research area, basically for supporting real time applications that are based upon interaction between the routing scheme and QoS provisioning. The goal of QoS aware routing is to achieve more deterministic behavior of the network i.e. a stable path, so that information carried by the network can be delivered in an uninterrupted fashion and for better resource utilization. In this paper we have developed AMTR, a new ant based QoS aware on-demand multipath routing algorithm for MANETs with better route failure management and which will be highly adaptive and energy efficient.
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
Mobile Ad hoc networks (MANETs) are self organized by a collection of mobile nodes, which
are interconnected by multi hop wireless paths. Providing QoS support in MANETs is an active
research area, basically for supporting real time applications that are based upon interaction
between the routing scheme and QoS provisioning. The goal of QoS aware routing is to achieve
more deterministic behavior of the network i.e. a stable path, so that information carried by the
network can be delivered in an uninterrupted fashion and for better resource utilization. In this
paper we have developed AMTR, a new ant based QoS aware on-demand multipath routing
algorithm for MANETs with better route failure management and which will be highly adaptive
and energy efficient.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
Owing to the wireless and mobility nature, nodes in a mobile ad hoc network are not within the transmission range. It needs to transfer data through the multi-intermediate nodes. Opportunistic data forwarding is an assuring solution to make use of the broadcast environment of wireless communication links. Due to absence of source routing capability with efficient proactive routing protocol, it is not widely used. To rectify the
problem, we proposed memory and routing efficient proactive routing protocol using Depth-First Iterative-Deepening and hello messaging scheme. This protocol can conserve the topology information in every node in the network. In experimental analysis and discussion, we implemented the proposed work using NS2 simulator tool and proved that the proposed technique is performed well in terms of average delay, buffer and throughput.
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
Owing to the wireless and mobility nature, nodes in a mobile ad hoc network are not within the transmission range. It needs to transfer data through the multi-intermediate nodes. Opportunistic data forwarding is an assuring solution to make use of the broadcast environment of wireless communication links. Due to absence of source routing capability with efficient proactive routing protocol, it is not widely used. To rectify the problem, we proposed memory and routing efficient proactive routing protocol using Depth-First Iterative-Deepening and hello messaging scheme. This protocol can conserve the topology information in every node in the network. In experimental analysis and discussion, we implemented the proposed work using NS2 simulator tool and proved that the proposed technique is performed well in terms of average delay, buffer and throughput.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkCSCJournals
A novel path tracing scheme is described in this paper which is known as Prime number encoding scheme using Benes network. In this scheme every data packet consist a label which is default 1 and every node consist of a prime number tag, as this data packet pass through the network label will be multiplied with the tag of the node. Prime number multiplication is done with encoder. At the receiver end factorization is done which gives the information of travelled path. In this scheme optical cross connects (OXC) is replaced with the Benes network which gives the better result than OXC. System having Benes network gives less attenuation than OXC and complexity of the system also decreases.
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
Secure multipath routing scheme using keyijfcstjournal
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be
targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but
under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by
nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under
dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the
attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination
node. We also identified forwarders for query by base station. The front is optimally calculated to maintain
the security credential and avail multiple paths. According to our knowledge ours is a novel secure
multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical
analysis.
Similar to International Journal of Computational Engineering Research(IJCER) (20)
International Journal of Computational Engineering Research(IJCER)
1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6
Security Enhanced Dynamic Routing using Quasigroups
Mr. K.J. Pavithran Kumar1 and Mr. D. Vivekananda Reddy2
1
M.Tech Student in Computer Science and Engineering, Sri Venkateswara University, Tirupati.
2
Assistant Professor in Computer Science and Engineering Department, Sri Venkateswara University, Tirupati
Abstract—Security has become one of the major issues for data communication over wired and wireless networks. The
dynamic routing algorithm is used to randomize delivery paths for data transmission which is compatible with popular
routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance
Vector protocol in wireless networks, without introducing extra control messages. This paper proposes the dynamic
routing algorithm with cryptography-based system design for more security in data transmission.
Key words—Security, Quasigroup cryptography-based system, dynamic routing, RIP, DSDV.
1. Introduction
In the past decades, various security-enhanced measures have been proposed to improve the security of data
transmission over public networks. Existing work on security-enhanced data transmission includes the designs of
cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are
often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc.
Another alternative for security-enhanced data transmission is to dynamically route packets between each source
and its destination so that the chance for system break-in, due to successful interception of consecutive packets for a session,
is slim. The intention of security-enhanced routing is different from the adopting of multiple paths between a source and a
destination to increase the throughput of data transmission (see, e.g., [1] and [2]). In particular, Lou et al. [3], [4] proposed a
secure routing protocol to improve the security of end-to-end data transmission based on multiple path deliveries. The set of
multiple paths between each source and its destination is determined in an online fashion, and extra control message
exchanging is needed. Bohacek et al. [5] proposed a secure stochastic routing mechanism to improve routing security.
Similar to the work proposed by Lou et al. [3], [4], a set of paths is discovered for each source and its destination in an
online fashion based on message flooding. Thus, a mass of control messages is needed. Yang and Papavassiliou [6] explored
the trading of the security level and the traffic dispersion.
The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing
information widely supported in existing wired and wireless networks. We aim at the randomization of delivery paths for
data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery
paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with
popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks [7] and Destination-
Sequenced Distance Vector (DSDV) protocol for wireless networks [8], over existing infrastructures. These protocols shall
not increase the number of control messages if the proposed algorithm is adopted.
2. Problem Statement
The objective of this work is to explore a security-enhanced dynamic routing algorithm based on distributed routing
information widely supported in existing networks. In general, routing protocols over networks could be classified roughly
into two kinds: distance-vector algorithms and link-state algorithms [9]. Distance-vector algorithms rely on the exchanging of
distance information among neighboring nodes for the seeking of routing paths. Examples of distance-vector-based routing
algorithms include RIP and DSDV. Link-state algorithms used in the Open Shortest Path First protocol [10] are for global
routing in which the network topology is known by all nodes. Our goal is to propose a distance-vector-based algorithm for
dynamic routing to improve the security of data transmission. Before we proceed with further discussions, our problem and
system model shall be defined.
A network could be modeled as a graph G = (N, L), where N is a set of routers (also referred to as nodes) in the
network, and L is a set of links that connect adjacent routers in the network. A path p from a node s (referred to as a source
node) to another node t (referred to as a destination node) is a set oflinks (N 1, N2) (N2, N3)…(Ni, Ni+1), where s =N1, Ni+1= t ,
Nj Є N, and (Nj, Nj+1) Є L for 1≤j≤ i. Let Ps;t denote the set of all potential paths between a source node s and a destination
node t. Note that the number of paths in Ps;t could be an exponential function of the number of routers in the network, and
we should not derive Ps;t in practice for routing or analysis.
Definition 1 (path similarity). Given two paths pi and pj, the path similarity Sim(pi; pj) for pi and pj is defined as the
number of common links between pi and pj:
Sim(pi; pj)=|{(Nx, Ny)|(Nx,Ny) Є pi ^(Nx, Ny) Є pj}|,
Issn 2250-3005(online) October| 2012 Page 149
2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6
Where Nx and Ny are two nodes in the network. The path similarity between two paths is computed based on the algorithm
of Levenshtein distance [5].
Definition 2 (the expected value of path similarity for anytwo consecutive delivered packets). Given a source node s and a
destination node t, the expected value of path similarity of any two consecutive delivered packets is defined as follows:
E[Sims;t]= ∑Sim(pi, pj) . Prob(pj|pi) . Prob(pi),
where Ps;t is the set of all possible transmission paths between a source node s and a destination node t. Prob(pj|pi) is the
conditional probability of using pj for delivering the current packet, given that pi is used for the previous packet. Prob(pi) is
the probability of using pi for delivering the previous packet.
The purpose of this research is to propose a dynamic routing algorithm to improve the security of data transmission.
We define the eavesdropping avoidance problem as follows:
Given a graph for a network under discussion, a source node, and a destination node, the problem is to minimize the
path similarity without introducing any extra control messages, and thus to reduce the probability of eavesdropping
consecutive packets over a specific link.
3. Security-Enhanced Dynamic Routing
3.1. Notations and Data Structures:
The objective of this section is to propose a distance-vector based algorithm for dynamic routing to improve the
security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes
(referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations,
e.g., those based on RIP, each node Ni maintains a routing table (see Table 1a) in which each entry is associated with a tuple
(t, WNi,t;Nexthop), where t, WNi,t, and Next hop denote some unique destination node, an estimated minimal cost to send a
packet to t, and the next node along the minimal-cost path to the destination node, respectively.
With the objective of this work in the randomization of routing paths, the routing table shown in Table 1a is
extended to accommodate our security-enhanced dynamic routing algorithm. In the extended routing table (see Table 1b),
we propose to associate each entry with a tuple (t,W Ni,t, CtNi,HtNi ). , CtNi is a set of node candidates for the nexthop (note that
the candidate selection will be elaborated in Procedure 2 of Section 3.2), where one of the nexthop candidates that have the
minimal cost is marked. HtNi , a set of tuples, records the history for packet deliveries through the node Ni to the destination
node t. Each tuple (Nj, hNj) in HtNi is used to represent that Ni previously used the node hNj as the nexthop to forward the
packet from the source node Nj to the destination node t. Let Nbri and wNi,Nj denote the set of neighboring nodes for a node
Ni and the cost in the delivery of a packet between Ni and a neighboring node Nj, respectively. Each node Ni also maintains
an array (referred to as a link table) in which each entry corresponds to a neighboring node Nj Є Nbri and contains the cost
wNi,Nj for a packet delivery. The proposed algorithm achieves considerably small path similarity for packet deliveries
between a source node and the corresponding destination node. However, the total space requirement would increase to store
some extra routing information. The size of a routing table depends on the topology and the node number of a network under
discussions. In the worst case, we have a fully connected network. For each entry in the routing table shown in Table 1b, the
additional spaces requirement would increase to store some extra routing information. The size of a routing table depends on
the topology and the node number of a network under discussions. In the worst case, we have a fully connected network. For
each entry in the routing table shown in Table 1b, the additional spaces required for recording the set of node candidates (as
shown in the third column of Table 1b) and for recording the routing history (as shown in the fourth column of Table 1b) are
O(|N|). Because there are |N| destination nodes at most in each routing table, the additionally required spaces for the entire
routing table for one node are O(|N|2). Since the provided distributed dynamic routing algorithm (DDRA) is a distance-
vector-based routing protocol for intradomain systems, the number of nodes is limited, and the network topology is hardly
fully connected. Hence, the increase of the total space requirement is considerably small.
Table I: An Example Of The Routing Table For The Node Ni
Issn 2250-3005(online) October| 2012 Page 150
3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6
(a) The routing table for the original distance-vector-based routing algorithm.
(b) The routing table for the proposed security-enhanced routing algorithm.
3.2. A Secured Distributed Dynamic Routing Algorithm:
The DDRA proposed in this paper consists of two parts:
Applying the cryptography-based system
A randomization process for packet deliveries and
Maintenance of the extended routing table.
3.2.1. Cryptography based system
The cryptography is used to increase the security in dynamic routing algorithm. The data will be encrypted by using
the Quasigroup cryptography algorithm. Then the encrypted data is divided into packets. The encrypted packets will send to
the destination using distributed dynamic routing algorithm. The cryptography process is as follows:
Fig. 1. Cryptography-based System
The cryptography based system encrypts the data and the encrypted data will be sending to randomization process.
The randomized process will send the encrypted data to the destination through several paths. The encrypted data will be
divided into packets and each packet is send to the destination through different paths. All the packets travelled through
different paths will reach the destination and that encrypted data will undergo decryption process. The decryption process
will decrypt the data and the destination will get the secure data.
3.2.2. Randomization Process
Consider the delivery of a packet with the destination t at a node Ni. In order to minimize the probability that
packets are eavesdropped over a specific link, a randomization process for packet deliveries shown in Procedure 1 is adopted.
In this process, the previous nexthop hs (defined in HNi t of Table 1b) for the source node s is identified in the first step of the
process (line 1). Then, the process randomly picks up a neighboring node in C tNi excluding hs as the nexthop for the current
packet transmission. The exclusion of hs for the nexthop selection avoids transmitting two consecutive packets in the same
link, and the randomized pickup prevents attackers from easily predicting routing paths for the coming transmitted packets.
Procedure 1 RANDOMIZEDSELECTOR (s, t, pkt)
4: Randomly choose a node x from { C tNi - hs} 1: Let hs be the used nexthop for the previous packet delivery
as a nexthop, and send the packet pkt to the for the source node s.
node x. 2: if hs Є CtNi then
Ni
3: if | Ct |> 1 then
5: hs ←x, and update the routing table of Ni.
6: else
7: Send the packet pkt to hs.
8: end if
9: else
10: Randomly choose a node y from CtNi as a nexthop, and send the packet pkt to the node y.
11: hs ←y, and update the routing table of Ni.
12: end if
Issn 2250-3005(online) October| 2012 Page 151
4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6
The number of entries in the history record for packet deliveries to destination nodes is |N| in the worst case. In
order to efficiently look up the history record for a destination node, we maintain the history record for each node in a hash
table. Before the current packet is sent to its destination node, we must randomly pick up a neighboring node excluding the
used node for the previous packet. Once a neighboring node is selected, by the hash table, we need O(1) to determine
whether the selected neighboring node for the current packet is the same as the one used by the previous packet. Therefore,
the time complexity of searching a proper neighboring node is O(1).
3.3.3. Routing table maintenance
Let every node in the network be given a routing table and a link table. We assume that the link table of each node is
constructed by an existing link discovery protocol, such as the Hello protocolin [11]. On the other hand, the construction
andmaintenance of routing tables are revised based on the well-known Bellman-Ford algorithm [10] and described as
follows:
Initially, the routing table of each node (e.g., the node Ni) consists of entries {(Nj,WNi,Nj,CNiNj = {Nj},HNiNj = Ø)},
where Nj Є Nbri and WNi,Nj = ωNi,Nj. By exchanging distance vectors between neighboring nodes, the routing table of N i is
accordingly updated. Note that the exchanging for distance vectors among neighboring nodes can be based on a predefined
interval. The exchanging can also be triggered by the change of link cost or the failure of the link/node. In this paper, we
consider cases when Ni receives a distance vector from a neighboring node N j. Each element of a distance vector received
from a neighboring nodeNj includes a destination node t and a delivery costW Nj,t from the nodeNjto the destination node t.
The algorithm for the maintenance of the routing table of N i is shown in Procedure 2, and will be described below.
Procedure 2 DVPROCESS(t;WNj,t)
1: if the destination node t is not in the routing table then
2: Add the entry (t, (ωNi,Nj + WNj,t), CtNi = {Nj}, HNit = Ø).
3: else if (ωNi,Nj + WNj,t) <WNj,t then
4: CtNi ← {Nj} and Nj is marked as the minimal-cost nexthop.
5: WNi,t ← (ωNi,Nj + WNj,t)
6: for each node Nk Є Nbri except Nj do
7: if WNk,t<WNi,t then
8: CtNi ← CtNi U {Nk}
9: end if
10: end for
11: Send (t, WNi,t ) to each neighboring node Nk Є Nbri.
12: else if (ωNi,Nj +WNj,t)>WNi,t then
13: if (Nj Є CtNi) then
14: if Nj was marked as the minimal-cost nexthop then
15: WNi,t ←MIN NkЄNbri (ωNi,Nk + WNk,t)
16: CtNi ← Ø
17: for each node Nk Є Nbri do
18: if WNk,t<WNi,t then
19: CtNi ← CtNi U {Nk}
20: end if
21: end for
22: Send (t, WNi,t) to each neighboring node Nk Є Nbri.
23: else if WNj,t>WNi,t then
24: CtNi ← CtNi U {Nj}
25: end if
26: else if ( Nj Є CtNi ) ^ (WNj,t<WNi,t) then
27: CtNi ← CtNi U {Nj}
28: end if
29: end if
First, for the elements that do not exist in the routing table, new entries for the corresponding destination nodes will
be inserted (lines 1 and 2). Otherwise, ωNi,Nj + WNj,t is compared with WNj,t saved in the routing table of Ni, and the following
four cases are considered:
1) ωNi,Nj + WNj,t<WNj,t (lines 3-11). The corresponding minimal cost is updated in the routing table, and Nj is
marked as the minimal-cost nexthop. Any neighboring node Nk which has an estimated packet delivery cost from N k to t
(i.e., WNk,t) no more than ωNi,Nj +WNj,t joins the candidate set CtNi . It is to aggressively include more
candidates for the nexthop to t with reasonable packet delivery cost (i.e., W Nk,t<WNi,t). Compared to the Bellman-Ford
algorithm, more than one neighboring node can be selected as the nexthop candidates in this step (lines 6-10) to
accommodate multiple packet-delivery paths to the destination node t. Also, the selection policy described above can
prevent the algorithm from generating the routing loops.
Issn 2250-3005(online) October| 2012 Page 152
5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6
2) (ωNi,Nj +WNj,t)>WNi,t and Nj is in the set CtNi of nexthop candidates (lines 13-25). Based on whether Nj is marked as the
minimal-cost nexthop in the routing table of Ni, the following two cases are further considered. . N j was
marked as the minimal-cost nexthop (lines 14-22). For all neighboring nodes of Ni, the minimal cost to the destination
node t is recomputed according to the distance vectors received from the neighboring nodes. Also, the nexthop
candidates for the destination node t are reselected, and the selection policy is the same as
lines 7-9 for Case 1. . Nj was not marked as the minimal-cost nexthop (lines 23 and 24). If W Nj,t>WNi,t, Nj is removed
from CtNi .
3) (ωNi,Nj +WNj,t)>WNi,t, and Nj is not in the set CtNi of nexthop candidates (lines 26 and 27). If W Nj,t<WNi,t, Nj is inserted
into CtNi.
4) Otherwise, nothing is done.
When a node Ni receives a distance vector from a neighboring node, Procedure 2 is used to maintain the nexthop candidates
for each entry in the routing table of Ni. The time complexity of Procedure 2 maintaining the nexthop candidates is O(|N|).
Furthermore, in the routing table of Ni, there are |N| entries in the worst case. Hence, the time complexity of maintaining the
routing table is O(|N|2). Based on Procedures 1 and 2, our security-enhanced dynamic routing can be achieved without
modifying the existing distance-vector-based routing protocols such as RIP and DSDV.
4. Conclusion
This paper has proposed a cryptography-based system for security-enhanced dynamic routing algorithm based on
distributed routing information widely supported in existing networks for secure data transmission. The proposed algorithm
is easy to implement and compatible with popular routing protocols, such as RIP and DSDV, over existing infrastructures.
The above procedure will send the data more secure by providing encryption process to the data and the encrypted data will
undergo dynamic routing process which is more secure in transferring the data from hop to hop.
References
[1] I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, “Adaptive Multipath Routing for Dynamic Traffic Engineering,”
Proc. IEEEGlobal Telecommunications Conf. (GLOBECOM), 2003.
[2] C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, Request for comments (RFC 2992), Nov. 2000.
[3] W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. IEEE Military Comm. Conf.
(MilCom), 2001.
[4] W. Lou, W. Liu, and Y. Fang, “SPREAD: Improving Network Security by Multipath Routing,” Proc. IEEE Military
Comm. Conf. (MilCom), 2003.
[5] V. I. Levenshtein, “Binary Codes Capable of Correcting Deletions, Insertions, and Reversals,” Soviet Physics
Doklady, vol. 10, no. 8, pp. 707-710, 1966.
[6] Secure Sockets Layer (SSL), http://www.openssl.org/, 2008.
[7] G. Malkin, Routing Information Protocol (RIP) Version 2 Carrying Additional Information, Request for comments
(RFC 1723), Nov. 1994.
[8] C. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile
Computers,” Proc. ACM SIGCOMM ’94, pp. 234-244, 1994.
[9] J. F. Kurose and K.W. Ross, Computer Networking—A Top-Down Approach Featuring the Internet. Addison Wesley,
2003.
[10] J. Moy, Open Shortest Path First (OSPF) Version 2, Request for comments (RFC 1247), July 1991.
[11] D. L. Mills, DCN Local-Network Protocols, Request for comments (RFC 891), Dec. 1983.
Issn 2250-3005(online) October| 2012 Page 153