Skip to main content
Log in

Friendly ad hoc routing in cloud scenario using CH selection and transmission head to enrich the security mechanism

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The approach of innovation has led the expanded enthusiasm for oneself arranging Ad-hoc Networks. Amongst the various constraints that relates to mobile infrastructure-less networking condition with reduced storage utility as the power storage facilities, influence utilization and vitality advancement stays a very significant issue. In our proposed the self formation nodes in the cloud scenario has been channelized properly through the cluster head (CH) and transmission head (TH) selection. Moreover the proposed technique Friendly Ad-hoc Routing in Cloud Scenario (FARICS) is introduced to enrich the security features of Mobile Ad hoc Network (MANET) architecture. The malicious nodes were found out sincerely through various traffic tables to enrich the security of the MANET. The first preliminary approach of the nodes combination will be vary from cluster to cluster. The CH, TH combination from one cluster to another cluster will be varied according to the sense of the node. The cluster may be a cloud form of organisation to represent the mobile ad hoc nodes. The unique identity of each node were monitored and mapped through the traffic table and the connectivity of the nodes will be strengthening. The simulation will be done with SAODV, SZRP and DMR protocols to get a successful result.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Agrawal DP, Zeng QA (2002) Introduction to wireless and mobile systems. Brooks/Cole, Thomson, Pacific Grove, CA

    Google Scholar 

  • Ajay K, Amit KK (2016) Performance analysis of AODV, DSR & LAR1 routing protocols for MANET. In: ACEIT-16 Conference in Integral University

  • Arunkumar BR, Kavya LH (2016) Topological analysis of K-connected MANETs using connectivity index, randic and euclidian energy. In: IEEE international conference on recent trends in electronics information communication technology, India, 978-1-5090-0774-5/16, pp: 2077–2082

  • Awad OA, Mariam R (2016) An efficient energy aware ZRP – fuzzy clustering protocol for WSN. Int J Sci Eng Res 7(3):1060–1065

    Google Scholar 

  • Chen B, Jamieson K, Balakrishnan H, Morris R (2002) SPAN: Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw 8(5):481–494

    Article  Google Scholar 

  • Chlamtac I, Conti M, Liu JN (2003) Mobile ad hoc networking: imperatives and challenges. In: Ad-Hoc networks, New York, vol 1, Elsevier, pp 13–64

  • Deepa M, Indu K, Sherin Z (2017) Random cluster head selection based routing approach for energy enrichment in MANET. In: Proceeding international conference on recent innovations is signal processing and embedded systems, 978-1-5090-4760-4/17, pp 119–123

  • Ghode S, Bhoyar KK (2016) NEMA: Node energy monitoring algorithm for zone head selection in mobile ad-hoc network using residual battery power of node. In: International conference on wireless communications, signal processing and networking (WiSPNET), pp 1999–2004

  • Jayakumar G, Gopinath G (2007) Ad-hoc mobile wireless networks routing protocol: a review. J Comput Sci 3(8):574–582

    Article  Google Scholar 

  • Johnson D, Maltz D (1996) Dynamic source routing in ad hoc wireless networks. Mob Comput Chap 5:153–181

    Article  Google Scholar 

  • Kim KJ, Koo HW (2017) Optimizing power-aware routing using zone routing protocol in MANET. In: IFIP international conference on network and parallel computing workshops, Liaoning, pp 670–675

  • Nasser N, Chen Y (2007) Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc network. In: Proceedings of IEEE international conference on communication, Scotland, pp. 1154–1159

  • Pallavi SK, Vijay RG (2016) Comparative study of network simulator: NS2 and NS3. Int J Adv Res Comput Sci Softw Eng 6:608–612

    Google Scholar 

  • Patcha A, Mishra A (2003) Collaborative security architecture for black hole attack prevention in mobile ad-hoc networks. In: Proceedings of radio wireless conference, pp 75–78

  • Rajendra P, Shivashankar P (2017) Multitier energy system review on secure intrusion detection system in MANETs. In: IEEE international conference on recent trends in electronics information and communication technology, India, 978-1-5090-3704-9/17, pp 1722–1726

  • Ravi G, Kashwan KR (2013) A new routing protocol for energy efficient mobile applications for ad hoc networks. In: International Review on Computers and Software (I.RE.CO.S.), Vol 8, Number 10

  • Satyam KS, Ravi RC, Ajay K (2016) Performance evaluation of routing protocols based on different models in MANET. In: IEEE international conference on recent trends in electronics information communication technology, India, 978-1-5090-0774-5/16, pp 1666–1670

  • Wang L, Zhang NT (2002) Locally forwarding location management in ad-hoc networks. In: Proceedings of IEEE international conference on communications, circuits and systems and west sino expositions, pp 160–164

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Parthasarathy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parthasarathy, R., Shanmugapriyan, J. Friendly ad hoc routing in cloud scenario using CH selection and transmission head to enrich the security mechanism. J Ambient Intell Human Comput 12, 3189–3198 (2021). https://doi.org/10.1007/s12652-020-02477-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02477-y

Keywords

Navigation