Advertisement

An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)

  • Ajay Jangra
  • Nitin Goel
  • Chander Kant
  • Priyanka
Part of the Communications in Computer and Information Science book series (CCIS, volume 169)

Abstract

Mobile ad hoc networks (MANETs) are networks that have no centralized body and in order to communicate with the nodes it has no fixed topology. Also it is difficult to find the route from source to destination in MANETs, because of its arbitrary mobility of nodes and in general MANETs works on multihop environment to select a route from source to destination. For this a new scheme has been proposed that results in an efficient and reliable path named as Efficient Power Saving Adaptive Routing (EPSAR). In this paper we would apply some amendments to FRENSA and make a new algorithm that could make it more efficient and reliable enough and also apply it to three different scenarios like Best, Average and Worst case for selecting a path and can check the performance of the network and the complexity of selected route. In all the cases we would take some parameters that have been used in EPSAR and analyze the performance of this algorithm in all the cases.

Keywords

Mobile Ad-hoc Networks (MANETs) multi-hoping complexity multicasting node selection algorithm FRENSA EPSAR 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sharma, A.K., Goel, A.: Best Neighbor Node Selection Algorithm for MANET. Journals of Institution of Engineers (January 2005)Google Scholar
  2. 2.
    Sharma, A.K., Goel, A.: Moment to Momant Node Transition Awareness Protocol (MOMENTAP). International Journal of Computer Application (IJCA) special issue. IASTED 27(1) (January 2005)Google Scholar
  3. 3.
    Priyanka, Bhatia, K.K., Jangra, A.: FRENSA: Farthest, Reliable and Efficient Node Selection Algorithm for Mobile Ad-hoc Networks (MANETs). IJCST International Journal of computer Science and Technology 1(2) (December 2010)Google Scholar
  4. 4.
    Komninos, N., Vergados, D., Douligeris, C.: Detecting unauthorized and compromised nodes in mobile ad hoc networks” see front matter _ 2005 Elsevier B.V. All rights reserved doi:10.1016/j.adhoc2005.11.005, www.elsevier.com/locate/adhoc
  5. 5.
    Jangra, A., Goel, N., Priyanka, Bhatia, K.: Security Aspects in Mobile Ad Hoc Networks (MANETs). A Big Picture International Journal of Electronics Engineering 2(1), 189–196 (2010)Google Scholar
  6. 6.
    Chakrabarti, G., Kulkarni, S.: Load balancing and resource reservation in mobile ad hoc networks. Ad Hoc Networks 4, 186–203 (2006), doi:10.1016/j.adhoc.2004.04.012CrossRefGoogle Scholar
  7. 7.
    Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6, 1151–1167 (2008), doi:10.1016/j.adhoc.2007.11.004CrossRefGoogle Scholar
  8. 8.
    Arboit, G., Peau, C.C., Davis, C.R., Maheswaran, M.: A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks 6, 17–31 (2008), doi:10.1016/j.adhoc.2006.07.003CrossRefGoogle Scholar
  9. 9.
    Komninos, N., Vergados, D., Douligeris, C.: Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5, 289–298 (2007), doi:10.1016/j.adhoc.2005.11.005CrossRefGoogle Scholar
  10. 10.
    Philip, S.J., Anand, V.: Mobility Aware Path Maintenance in Ad hoc Networks. In: SAC 2009, Honolulu, Hawaii, U.S.A, March 8-12 (2009) Copyright 2009 ACM 978-1-60558-166-8/09/03Google Scholar
  11. 11.
    Mei, A., Stefa, J.: Routing in Outer Space: Fair Traffic Load in Multi-Hop Wireless Networks. In: MobiHoc 2008, Hong Kong SAR, China, May 26–30 (2008) Copyright 2008 ACM 978-1-60558-073-9/08/05Google Scholar
  12. 12.
    Vaidya, B., Yeo, S.-S., Choi, D.-Y., Han, S.J.: Robust and secure routing scheme for wireless multihop network. Springer, London (2009)Google Scholar
  13. 13.
    Vasiliou, A., Economides, A.A.: Evalution of multicasting algorithm in MANETs. In: Proceedings of World Acadmy of Science, Engineering and Technology, vol. 5 (April 2005); ISSN 1307-6884Google Scholar
  14. 14.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for AdHoc Networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, ICNP 2002 (2002)Google Scholar
  15. 15.
    Yi,S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless AdHoc Networks. University of Illinois at Urbana-Champaign Urbana, IL61801, {seungyi,rhk}@cs.uiuc .edu Google Scholar
  16. 16.
    Madhavi, S., Kim, T.H.: An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications 2(3) (July 2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ajay Jangra
    • 1
  • Nitin Goel
    • 1
  • Chander Kant
    • 2
  • Priyanka
    • 3
  1. 1.CSE Department UIETKurukshetra UniversityKurukshetraIndia
  2. 2.DCSAKurukshetra UniversityKurukshetraIndia
  3. 3.ECE Deptt. Kurukshetra Institute of Technology and ManagementKurukshetraIndia

Personalised recommendations