Advertisement

National Academy Science Letters

, Volume 42, Issue 2, pp 115–121 | Cite as

EE-SRA: An Approach for MANET with Unique Feature of Agent Estimation

  • Dhananjay BisenEmail author
  • Sanjeev Sharma
Short Communication
  • 11 Downloads

Abstract

Mobile ad-hoc network is collection of self-organizing nodes where they can communicate with each other using fundamental mutual entrustment and without any fixed infra structure. This paper proposes an energy efficient secure routing approach in which energy aware agent is estimated through performance feature of individual node. In this approach, energy consumption of node is reduced via control avoidable hello messages and calculation of normalized neighbor distance. Agent nodes use malicious identification module in which fuzzy based security approach is executed for identifying malicious behavior of neighbors. Simulation and result analysis show that, the proposed approach achieves better performance in terms of PDR and throughput, network overhead, end-to-end delay, hello message fraction, energy consumption and detection rate.

Keywords

MANET AODV Energy consumption Hello message Fuzzy logic Agent node Selfish and malicious node 

References

  1. 1.
    Chlamtac I, Contj M, Liu J (2003) Mobile ad-hoc networking: imperatives and challenges. Ad Hoc Netw 1(1):13–64CrossRefGoogle Scholar
  2. 2.
    Murthy SR, Manoj BS (2004) Ad-hoc wireless networks: architecture and protocols. Pearson Ltd, New YorkGoogle Scholar
  3. 3.
    Pietro RD, Guarino S et al (2014) security in wireless adhoc networks—a survey. Comput Commun 51:1–20CrossRefGoogle Scholar
  4. 4.
    Pandey S, Pal P, Mukherjee A (2015) IRF-NMB: intelligent route formation technique in ad hoc network using node mobility behaviour. Natl Acad Sci Lett 38(3):213–219MathSciNetCrossRefGoogle Scholar
  5. 5.
    Perkins CE, Royer E (2003) Ad-hoc on-demand distance vector routing. IETF RFC 3561Google Scholar
  6. 6.
    Zhao Q, Tong L, Counsil D (2007) Energy-aware adaptive routing for large-scale ad hoc networks: protocol and performance analysis. IEEE Trans Mobile Comput 6(9):1048–1059CrossRefGoogle Scholar
  7. 7.
    Wang Y (2010) Study on energy conservation in MANET. J Netw 5(6):708–715Google Scholar
  8. 8.
    Oliveira R, Luis M, et al (2010) The impact of node’s mobility on link-detection based on routing hello messages. In: IEEE wireless communications and networking conference, pp 1–6Google Scholar
  9. 9.
    Gomez J, Campbell AT (2007) Variable range transmission power control in wireless ad hoc networks. IEEE Trans Mobile Comput 6(1):87–99CrossRefGoogle Scholar
  10. 10.
    Rajeswari S, Venkataramani Y (2012) Adaptive energy conserve routing protocol for mobile ad hoc networks. WSEAS Trans Commun 11(12):464–475Google Scholar
  11. 11.
    Jain J, Gupta R, Bandhopadhyay T (2014) Scalability enhancement of AODV using local link repairing. Int J Electron 101(9):1230–1243CrossRefGoogle Scholar
  12. 12.
    Ullah K, Das R, et al (2015) Trusted and secured routing in MANET: an improved approach. In: International symposium on advanced computing and communication Silchar, pp 297–302Google Scholar
  13. 13.
    Thakur N, Bisen D, Gupta N (2015) Proposed agent based black hole node detection algorithm for ad-hoc wireless network. IJCSA 5(2):69–85CrossRefGoogle Scholar
  14. 14.
    Gupta A, Bisen D (2015) Review of different routing protocols in mobile ad-hoc networks. IJCSE 3(3):105–112Google Scholar
  15. 15.
    Agarwal R, Gupta R, Motwani M (2015) Performance optimisation through EPT-WBC in mobile ad hoc networks. Int J Electron 103(3):355–371CrossRefGoogle Scholar
  16. 16.
    Gavhale M, Saraf PD (2016) Survey on algorithms for efficient cluster formation and cluster head selection in MANET. Proc Comput Sci 78:477–482CrossRefGoogle Scholar
  17. 17.
    Chettibi S, Chikhi S (2016) Dynamic fuzzy logic and reinforcement learning for adaptive energy efficient routing in mobile ad-hoc networks. Appl Soft Comput 38:321–328CrossRefGoogle Scholar
  18. 18.
    Han SY, Lee D (2013) An adaptive hello messaging scheme for neighbor discovery in on-demand MANET routing protocols. IEEE Commun Lett 17(5):1040–1043CrossRefGoogle Scholar
  19. 19.
    Thakkar P, Shete P (2015) AH-AODV: adaptive hello messaging based AODV routing protocol. Int J Comput Appl 124(17):6–11Google Scholar
  20. 20.
    Nadeem A, Howarth M (2013) Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommun Syst 52(4):2047–2058CrossRefGoogle Scholar
  21. 21.
    Abdel-Halim IT, Fahmy HMA, Bahaa-Eldin AM (2015) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wireless Netw 21(2):467–483CrossRefGoogle Scholar
  22. 22.
    Ravi G, Kashwan KR (2015) A new routing protocol for energy efficient mobile applications for ad hoc networks. Comput Electr Eng 48:77–85CrossRefGoogle Scholar
  23. 23.
    Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multi path routing for self organized mobile adhoc networks. Ad Hoc Netw 37(P2):209–227CrossRefGoogle Scholar
  24. 24.
    Godo L, Gottwald S (2015) Fuzzy sets and formal logics. Fuzzy Sets Syst 281:44–60MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    The Network Simulator ns-2 Information Sciences Institute, USA. Viterbi School of Engineering. http://www.isi.eu/nsnam/ns/. Accessed 4 June 2018
  26. 26.
    Matlab: http://in.mathworks.com/products/fuzzy-logic. Accessed 4 June 2018

Copyright information

© The National Academy of Sciences, India 2018

Authors and Affiliations

  1. 1.School of Information TechnologyRGPVBhopalIndia

Personalised recommendations