Open Access   Article Go Back

Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation

M. Subalakshmi1

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 198-209, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.198209

Online published on Dec 31, 2018

Copyright © M. Subalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Subalakshmi, “Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.198-209, 2018.

MLA Style Citation: M. Subalakshmi "Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation." International Journal of Computer Sciences and Engineering 6.12 (2018): 198-209.

APA Style Citation: M. Subalakshmi, (2018). Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation. International Journal of Computer Sciences and Engineering, 6(12), 198-209.

BibTex Style Citation:
@article{Subalakshmi_2018,
author = {M. Subalakshmi},
title = {Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {198-209},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3316},
doi = {https://doi.org/10.26438/ijcse/v6i12.198209}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.198209}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3316
TI - Route Leak Identification: A Step toward Making Inter-Domain Node Location Estimation
T2 - International Journal of Computer Sciences and Engineering
AU - M. Subalakshmi
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 198-209
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
520 301 downloads 250 downloads
  
  
           

Abstract

Vehicular Ad-Hoc Network (VANET) is a variation of MANET (Mobile Ad-hoc network). MANET has many nodes involved without the central network and the nodes are equipped with network skills. If node leaks through a large network of service disruptions that can produce one of the anomalies of the inter-domain route. Route leaks are among the routing policies of autonomous systems because of the violation. Unfortunately, there are not many studies that location and route analysis of the route leak issue were discussed. There exist few convention solutions that can be problem as a first route of defense, such as route filters. The proposed system is applied based on the Network Route Identification leaks based on Node Location estimation (NRINLE). The path trail attracts different colored network system simulation polyline or marker node customization. There is more network simulation travel leaks on routes that are recommended for traveling by location. The main method can be location spaces like node tripping path leaks. In the network we create a rather fundamental theoretical application, a specific way of active network fits with a path leak location. Then motive the probable occurrence of route leaks in different location scenarios, with the aim of formulating requirements for their identification. And hence thereof prevention to good performance improve location leaks reliability.

Key-Words / Index Term

Location-based service security, point of interest, Network Route identification based on Node Location estimation, Optimal location route estimated

References

[1]. Vijayasathana. Vishnukumar. May 2015,’ Conscious Aware Routing Protocol for VANET’, International Journal of Science, Engineering and Technology Research (IJSETR), Vol.6, pp (1-7).
[2]. Shilpa Shetty A, Sannidhan, May 2016,’ Packet Drop Detection VANET system’, International Journal of Computer Science and Mobile Computing (Ijcsmc), Vol. 5, Pp (656-661).
[3]. Kaushik, Chowdhury, Akyildiz, April 2017,` Crp: A Routing Protocol for Cognitive Radio VANET,` IEEE Journal Areas in VANET, Vol. 29, No. 4, pp (794-804).
[4]. Hsien-Kai Hsin, En-Jui Chang 2014,` Ant Colony Optimization-Based Fault-Aware Routing In Mesh-Based Network-On-Chip Systems,` IEEE Transactions On Computer-Aided Design Of Integrated Circuits And Systems, Vol. 33, No. 11, pp (1693-1705).
[5]. Xiao Chen, Zanxun Dai, 2014,` ProHet: A Probabilistic Routing Protocol with Assured Delivery Rate for VANET network,` IEEE Transactions on VANET Communication, Vol. 14, No. 7, pp (1504-1531).
[6]. Shuguang Fu, 2015, ‘Identification of Radio Network Routing Method Based on Genetic Algorithm,` IEEE International Journal of Future Generation Communication VANET Networking System, Vol. 7, No. 4, pp (2629-2368).
[7]. Leela Priya, Lalitha2, 2016’ Energy Efficient Routing Models in location - A Recent Trend Survey,` International Journal of Pure and Applied Mathematics Vol.118, No. 16, pp (443-458).
[8]. Ping Yi, Zhoulin Dai 2013,` A New location Attack in Vehicle Ad Hoc Networks,` International Journal of Computer Technology Vol. 16 No. 22, Pp (1-142).
[9]. Li Qiang Tao and Feng Qi Yu, Aug 2010,’ ECODA: Enhanced Congestion Detection and Avoidance for Multiple Class of Traffic in location Networks,` IEEE, pp (1387-1394).
[10]. Wenfeng Xia, Yonggang Wen, 2015,` A Survey on Software-Defined Networking,` IEEE Communication Surveys & Tutorials, Vol. 17, No, 1, pp (27-51).
[11]. Bara’a Ali Attea, Feyza Yıldırım Okay, 2012,’ Multi-objective Evolutionary Algorithm Based on Decomposition for Efficient Coverage Control in leaks Networks,` IEEE, Vol.5, pp (1-6).
[12]. Fareen Farzana, Neduncheliyan, 2018,` Multi-objective Artificial Bee Colony based Routing in Mobile Wireless Sensor Network,` International Journal of Pure and Applied Mathematics, Volume 118, No. 8, pp (635-641).
[13]. Zesong Fei, Bin Li, 2016,` A Survey Of Multi-Objective Optimization In Wireless Sensor Networks: Metrics, Algorithms And Open Problems,` Accepted To Appear On IEEE Communications Surveys & Tutorials, Vol.1, Pp (1-38).
[14]. Saleh, Oct 2017,’ Enhancing Multi-Objective Optimization for Wireless Sensor Networks Coverage using Swarm Bat Algorithm,` International Journal of Computer Applications (0975 – 8887) Volume 175 – No.9, pp (1-7).
[15]. Song, Gong, Aug 2017, ‘Coverage Hole Recovery Algorithm Based on Molecule Model in Heterogeneous WSNs,` International Journal of Computers Communications &controls, vol.12, No.4, pp (562-576).
[16]. Jinil Persis, and Paul Robert, May 2015,’ Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network,` Indian Journal of Science and Technology, Vol 8, No.9.pp 875–888.
[17]. Ali Norouzi, Ahmet Sertbas, 2015,’ Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm,` Universal Journal of Communications and Network, Vol.3, No.4, pp (82-88).
[18]. Narendra Reddy, Vishnuvardhan May 2013,’ Routing Attacks In network system communication, Computer Science and Mobile computing system,` Ijcsmc, Vol. 2, Issue. 5, pp 360 – 367.
[19]. Aditi, Joy Karansingh, Jul 2016,’ Analysis of Various Security Attacks Mobile Adhoc Network,` International Research Journal of Engineering and Technology, Vol.3, Pp (1-4).
[20]. Ankita Gupta, Sanjay Prakash Ranga, July 2012,’Network Node Various Location Attacks in Mobile Ad-Hoc Networks, Journal of Computing and Corporate Research.