High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)
B.Karthikeyan 1 , S. Hari Ganesh2 , J.G.R. Sathiaseelan3 , and N.Kanimozhi4
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-4 , Page no. 156-164, Apr-2016
Online published on Apr 27, 2016
Copyright © B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi, “High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV),” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.156-164, 2016.
MLA Style Citation: B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi "High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)." International Journal of Computer Sciences and Engineering 4.4 (2016): 156-164.
APA Style Citation: B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi, (2016). High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV). International Journal of Computer Sciences and Engineering, 4(4), 156-164.
BibTex Style Citation:
@article{Ganesh_2016,
author = {B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi},
title = {High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {156-164},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=878},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=878
TI - High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)
T2 - International Journal of Computer Sciences and Engineering
AU - B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 156-164
IS - 4
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1578 | 1425 downloads | 1464 downloads |
Abstract
The most wanted wireless networks is Mobile Ad hoc Network (MANET). MANET can configure easily without any infrastructure which one is used by at present as an infrastructure oriented wired or wireless network. It is one of the infrastructures less network consist of mobile devices. Individually each and every device in the Mobile ad hoc network will act as a router as well as node which provide the flexibility in the physical topology, optimal routing and data communication. In this paper the proposed HiLeSec-OpTiB AODV is the combination of En-SIm and OpTiB AODV. This combined algorithm is tested with intruders(active and passive attackers). This proposed HiLeSec-OpTiB AODV is implemented and tested by the use of OmNet++.
Key-Words / Index Term
SIm AODV; En-SIM AODV; MANET; Self-Configuring; HiLeSec-OpTiB AODV; OmNet++
References
[1]. Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security, Volume-9, No-4 (2011), pp 106-110.
[2]. Nagendra, M., and B. Kondaiah. "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks." International Journal of Computer Sciences and Engineering, Volume-2, Issue-5 (2014) pp 15-19.
[3]. B.Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh, “Complexity in Security Issues of MANET Pertaining to AODV Protocol”, International Conference on Contemporary Trends in Computer Science (CTCS - 2014). Feb 2014.
[4]. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh- “Security and Time Complexity in AODV Routing Protocol”, IJAER, pp15542- 155546, Vol 20,June 2015.
[5]. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh- “Security Improved Ad-Hoc On-demand Distance Vector Routing Protocol”, IJARE, pp, Vol ,On Print.
[6]. B..Karthikeyan, N.Kanimozhi and Dr.S.Hari Ganesh, “Encrypt - Security Improved Ad Hoc On Demand Distance Vector Routing Protocol (En-SIm AODV)”, ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 2, JANUARY 2016
[7]. B.Karthikeyan,Dr.S.Hari Ganesh and Dr. JG.R. Sathiaseelan, “ Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (OpTiB-AODV)”, International Journal of Computer Applications (0975 – 8887) Volume 140 – No.6, April 2016
[8].Naincy Juneja, Abhishek Mishra ,An implementation of security policy by using ID in Adhoc routing for mobile network, IJIACS,April 2014.
[9]. Neeraj Saini, Lalit Garg,Enhanced, “AODV Routing Protocol against Black hole Attack”, IJARCSSE, June 2014.
[10]. Rajdeep S. Shaktawat,Dharm Singh, Naveen Choudhary, An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV), IJCA, July 2014.
[11]. Shabnam, Jitendra Arora, “Detection of Cosmic Dust Attack in MANET under AODV Routing Protocol”, IJRASET, May 2014.
[12]. Radha Krishna Bar, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh, “QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack”, 2013.
[13]. Dr.Mahmood K. Ibrahem , Ameer M. Aboud, “A Secure Routing Protocol for MANET”, IJCSET, July 2014.
[14]. Sunil Taneja, Sima Singh, Ashwani Kush, “Encryption Scheme for Secure Routing in Ad Hoc Networks”,IJICT, Vol 1, No 1, ISSN 0976- 4860,2011,PP 22-29.
[15]. Rajdeep S. Shaktawat, Dharm Singh, Naveen Choudhary, “An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE- AODV)”,IJCA (0975 – 8887), PP 34-41. Volume 97– No.8, July 2014,
[16]. A. Jegatheesan, D. Manimegalai, “Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme”, WSEAS TRANSACTIONS on COMPUTERS, E-ISSN: 2224-2872, Volume 14, 2015,PP 124-133.
[17]. Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014
[18]. K.S.Abitha, Anjalipandey, DR.K.P.Kaliyamurthie, “Secured Data Transmission Using Elliptic Curve Cryptography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 3, March 2015,PP 1419-1425
[19]. S. Abila Judith Suganthi, P. Rajesh, “ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL”, Elysium Journal, P-ISSN: 2347-4408, Volume - 2, Issue – 2, April 2015.
[20].Xiaoxia Qi ,Qijin Wang and Fan Jiang, “ Multi-path Routing Improved Protocol in AODV Based on Nodes Energy”, International Journal of Future Generation Communication and Networking Vol. 8, No. 1 (2015), pp. 207-214
[21].Manoj Tolani, Rajan Mishra,l “ Effect of Packet Size on Various MANET Routing Protocols”, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Volume 4– No.9, December 2012,PP:10-13.
[22].Kewal Vora, Jugal Shah, Shreyas Parmar and Shivani Bhattacharjee, "MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (26-31), Oct -2015, E-ISSN: 2347-2693
[23]. Nand Kishore, SukhvirSingh and Renu Dhir, "Energy Related Issues for MANETs: A Study", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (98-100), Mar -2014
[24]. Neha Agarwal and Neeraj Manglani, “A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015pp 1780-1784.