Reduction in routing overhead in MANET using 2-ACK scheme and Novel routing Algorithm

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-8                      
Year of Publication : 2013
Authors : Sonali Gaikwad , Dr.D.S.Adane

Citation 

Sonali Gaikwad , Dr.D.S.Adane. "Reduction in routing overhead in MANET using 2-ACK scheme and Novel routing Algorithm". International Journal of Engineering Trends and Technology (IJETT). V4(8):3677-3681 Aug 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bi - directional wireless links either directly or indirectly. In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other’s data packets in order to enable out - of - range communication. However, in friendly environments, some nodes may refuse to do so, either for saving their own energy or for in tentionally disrupting regular communications (i.e. selfish or malicious nodes).This selfish nodes start refusing to forward or drop data packets thereby degrades the performance of the network. This type of misbehaviour is generally referred to as packet dropping attack or black hole attack, which is considered as one of the most critical attacks that leads to the network collapse. In this paper, we proposed the 2 - ACK scheme which is used for detecting the selfish nodes, eliminating them and choosing the other path for transmitting the data. After choosing the other path for transmitting the data there is a huge routing overhead is generated. So, we use Novel Routing algorithm which helps in decreasing the routing overhead and makes the network stable. In MANETs, Novel routing algorithm will also check the confidentiality of data message

References

[1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , ANSI/ IEEE Std. 802.11, 1999 .
[2] Conti M., Gregory E., and Muesli G, “Towards Reliable Forwarding for Ad Hoc Networ ks", Proc. Personal Wireless Comm. (PWC `03), pp. 790 - 804, Sept. 2003.
[3] S. Marti, T. J. Guile, K. Lai and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” In Proc. 6 th annual international conference on Mobile computing and networking ( MOBICOM ’00), Boston, Massachusetts, USA, August 2000.
[4] S. Buchegger and J. Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol,” In Proc. 3 rd ACM International Symposium on Mobile Ad Hoc Networking & computing (MOBIHOC’02), Lausanne, Switzerland, June 2002.
[5] N. Nasser and Y. Chen, “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks,” In Proc. International Conference on Communication (ICC 07), Glasgow, June 2007.
[6] D. Djenouri and N. Badache, “New Approach f or Selfish Nodes Detection in Mobile Ad hoc Networks,” In Proc. Workshop of the 1 st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecurComm’05), Athens, Greece, September 2005.
[7] Soufiene Djahel, Farid Na ??t - a bdesselam, and Zonghua Zhang, “Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges,” IEEE Communications Surveys & Tutorials, Vol. 13, No. 4, Fourth Quarter 2011.
[8] Daniel Camara, Antonio A.F. Loureiro, “A Novel Routing Alg orithm for Ad Hoc Networks,” IEEE, 2000

Keywords
Mobile Ad hoc Networks, Routing Misbehaviour , Packet Dropping Attack, Selfish, Malicious .