Skip to main content

Efficient Packet Flow Path Allocation Using Node Proclivity Tracing Algorithm

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Trends in Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 600))

  • 269 Accesses

Abstract

In the mobile ad hoc network, the mobile nodes activities are different; if the node activity is good, then it performs normal routing process, otherwise it performs abnormal routing. Such abnormal routing node is called as omission node. This node does not transmit and receive data packet at the given specific time slot. Data packets are not reached to destination; it decreases the packet delivery ratio, increases the energy consumption, and decreases the network overall performance. Detection of such nodes is difficult. So the proposed technique, efficient packet flow path allocation (EPF), is used to establish the optimized route between source and destination. EPF analyzes the packet forwarding behavior of each node and packet size of each node transmission. The node proclivity tracing algorithm is used to measure the every node’s characteristics in the particular routing path and capture the omission attacker node in the path. This improves the detection efficiency and minimizes the overall energy consumption of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saghar K, Tariq M, Kendall D, Bouridane A (2016) RAEED: a formally verified solution to resolve sinkhole attack in wireless sensor network. In: The proceedings of IBCAST

    Google Scholar 

  2. Saghar K, Henderson W, Kendall D, Bouridane A (2010) Formal modelling of a robust wireless sensor network routing protocol. In: The proceedings of NASAIESA conference on adaptive hardware and systems

    Google Scholar 

  3. Mohanapriya M, Krishnamurthi T (2014) Modified DSR protocol for detection and rem oval of selective black hole attack in MANET. Comput Electr Eng 40(2)

    Google Scholar 

  4. Deng R, Han, Mishra S (2006) lNSENS: intrusion-tolerant routing for wireless sensor networks. Comput Commun 29(2):216–230

    Google Scholar 

  5. . Chacko JM, Senthilkumar KB (2016) SINR based hybrid multipath routing protocol for MANET. In: The proceedings of emerging trends in engineering, technology and science, pp 1–6

    Google Scholar 

  6. Priya S, Gopinathan B (2014) Reliable data delivery in MANETs using VDVH framework. In: The proceedings of information communication and embedded systems, pp 1–6

    Google Scholar 

  7. Akbas A, Yildiz HU, Tavli B, Uludag S (2016) Joint optimization of transmission power level and packet size for WSN lifetime maximization. IEEE Sens J 16(12):5084–5094

    Article  Google Scholar 

  8. Mallapur SV, Patil SR, Agarkhed JV (2015) Load balancing technique for congestion control multipath routing in mobile ad hoc networks. In: The proceedings of TENCON 2015–2015 IEEE region 10 conference, pp 1–6

    Google Scholar 

  9. Chandra VN, Kumar K (2015) QoS improvement in AOMDV through backup and stable path routing. In: The proceedings of communication systems and network technologies (CSNT), vol 2, pp 283–287

    Google Scholar 

  10. Liu J, Xu Y, Jiang X (2014) End-to-end delay in two hop relay MANETs with limited buffer. In: The proceedings of computing and networking, pp 151–156

    Google Scholar 

  11. Bijon KZ, Haque MM, Hasan R (2014) A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. In: The proceedings of privacy, security and trust, pp 347–354

    Google Scholar 

  12. Kiran M, Reddy GRM (2011) Throughput enhancement of the prioritized flow in self aware MANET based on neighborhood node distances. In: The proceedings of computer applications and industrial electronics, pp 497–502

    Google Scholar 

  13. Song W, Meng L (2012) High-stability routing protocol based on min-cost max-flow algorithm for manet

    Google Scholar 

  14. Amin S, Saghar K, Abbasi MBT, Elahi A (2017) ARHUM-ARRIVE protocol with handshake utilization and management. In: The proceedings of applied sciences and technology, pp 401–407

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Aruna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aruna, R., Shyamala Devi, M., Vinoth Kumar, S., Umarani, S., Kavitha, N.S., Gopi, S. (2023). Efficient Packet Flow Path Allocation Using Node Proclivity Tracing Algorithm. In: Mahapatra, R.P., Peddoju, S.K., Roy, S., Parwekar, P. (eds) Proceedings of International Conference on Recent Trends in Computing. Lecture Notes in Networks and Systems, vol 600. Springer, Singapore. https://doi.org/10.1007/978-981-19-8825-7_52

Download citation

Publish with us

Policies and ethics