Open Access   Article Go Back

Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks

Amit A. Bhusari1 , P.M. Jawandhiya2 , V.M.Thakare 3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 682-687, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.682687

Online published on Jun 30, 2018

Copyright © Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare, “Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.682-687, 2018.

MLA Style Citation: Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare "Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks." International Journal of Computer Sciences and Engineering 6.6 (2018): 682-687.

APA Style Citation: Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare, (2018). Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks. International Journal of Computer Sciences and Engineering, 6(6), 682-687.

BibTex Style Citation:
@article{Bhusari_2018,
author = {Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare},
title = {Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {682-687},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2238},
doi = {https://doi.org/10.26438/ijcse/v6i6.682687}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.682687}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2238
TI - Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 682-687
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
478 308 downloads 256 downloads
  
  
           

Abstract

Cross layer based approaches has given new dimensions to MANET (Mobile Adhoc Network) by releasing fixed layer boundary constraints. These new paradigm makes it possible to limit the issues such as low battery, limited bandwidth, link breakage of MANET. Still cross layer based designs are trying to remove such barriers and trying to make Manet more scalable. Though cross layer based designs are flexible but securing the network from malicious attack is definitely challenging task. This paper is an attempt to discuss about technique to optimize the performance of secure cross layer routing protocol. We have designed SCLPC (Secure cross layer based Power control) protocol. But when security is imposed using AASR (Authenticated and anonymous secure routing), the network metrics as end to end delay and routing overhead is disturbed. To optimize the network performance here we proposed OSCLPC (Optimized secure cross layer based power control protocol). The proposed OSCLPC has been evaluated using SHORT (Self healing and optimizing route technique). We also examined the OSCLPC with malicious code. The OSCLPC and M-OSCLPC (malicious OSCLPC) is simulated in ns2 and we also compared it with reactive routing protocol AODV.

Key-Words / Index Term

Cross layer designs, CLPC, AODV

References

[1] Vineet Srivastava, MehulMotani “Cross-layer design: A survey and the road ahead” communication Magazine, IEEE, Vol:43, Issue:12, IssueDate:Dec, 2005.
[2] Amit A. Bhusari,Dr. P.M Jawandhiya “Review and classification of Cross layer Routing protocol for Manet” IEEE sponsored 3rd ICECS 2016,Coimbatore,pp 600-607
[3] A. Sarfaraz Ahmed, T. Senthil Kumaran, S. Syed Abdul Syed, S. Subburam “Cross layer Design Approach for Power control in Mobile Adhoc Networks” Egyptian Informatics Jouran 2015.
[4] Wei liu and Ming Yu “Authenticated Anonymous secure routing for Manets in adversarial environments ” IEEE transactions on vehicular network, March 2014
[5] Chao Gui and Prasant Mohapatra “ A self healing and optimizing routing technique for adhoc networks”, Dept of Computer science, Davis, CA 95616.
[6] Gaurav Bhatia and Vivek Kumar“ Adapting MAC 802.11 for performance optimization of MANET using cross layer interaction” International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
[7] Muhammed Asif Khan, Sahibzadaa Zakiuddin, Jalal Ahmad “ Cross layer optimization of Dynamic source routing protocol using IEEE 802.11e based medium awareness” 978-1-4673-5885-9/13 IEEE 2013.
[8] Zouhair El-Bazzal, Khaldoun El-Ahmadieh, Zaher Merhi, Michel Nahas and Amin Haj-Ali “ A Cross layered protocol for Ad hoc networks” 2012 international conference on Information technology and e-services 978-1-4673-1166-3/12
[9] Sreedhar C, Dr. S. Madhusudana Verma, Dr. N. Kasiviswanatha “Cross layer based secure routing in Manet” International Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.725-731
[10] Y.-C. Hu and D. B. Johnson, ”Caching Strategies in On- Demand Routing Protocols for Wireless Ad Hoc Networks”, Proc. ACM International Conference on Mobile Computing and Network (MOBICOM), 2000
[11] S Bose and A.Kannan “Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks” IEEE-International Conference on Signal processing, Communications and Networking Madras Institute of Technology, Anna University Chennai India, Jan 4-6, 2008. Pp ]82-188
[12] Pradip M. Jawandhiya, Mangesh m.ghonge, DR. M.S Aliand Prof.J.S Deshpande “A Survey of Mobile adhoc
network attacks” IJEST,Vol.2, No.9, Sep 2010
[13] C. Perkins, E. Belding-Royer, S. Das, et al., “RFC 3561 - Ad hoc OnDemand Distance Vector (AODV) Routing,” Internet RFCs, 2003.
[14] D. Kelly, R. Raines, R. Baldwin, B. Mullins, and M. Grimaila,“Towardsa taxonomy of wired and wireless anonymous Networks,”in Proc.IEEE WCNC’09, Apr. 2009.
[15] J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and ondemand routing scheme against anonymity threats in mobile adhoc networks,” IEEE Trans. on Mobile Computing, vol. 6, no. 8, pp.888–902, Aug. 2007.
[16] Ju-Lan Hsu and Izhak Rubin, “Cross Layer On-Demand Routing Algorithms For Multi-Hop Wireless Csma/Ca
Networks,” 978-1-4244-2677-5/08 IEEE 2008.
[17]NS2NetworkSimulator.http://www.isi.edu/nsnam/ns/