Total views : 178
An Effective (FD-E-TOHIP) Fault Detection Enabled E-TOHIP for Mobile Ad-Hoc Networks
Objectives: Security is a challenging issue in mobile ad-hoc networks (MANET). The main objective is to implement FD-ETOHIP Fault Detection Mechanism (FDM) on Enhanced Topology-Hiding Multipath Routing Protocol (E-TOHIP) in mobile ad-hoc networks (MANETs). Methods/Statistical Analysis: E-TOHIP do not permit packets to hold routing information. Once a route is recognized, E-TOHIP will publicize a set having the nodes that have been positioned on routes, which prevents a node from being located on another route. It also establishes multiple node-disjoint routes and excludes unreliable routes before transmitting packets. Findings: With the help of FDM faults in the network can be easily identified. Message loss due to node permanent fault and message loss due to data transmission are the types of faults that occur here. If the node is considered to be a everlasting fault, then the messages at the node location will get lost and it won’t work until a re-establishment is done. The message loss during data transmission occurs due to three kinds of faults namely message redirection, topology change and buffer overflow. Applications/Improvements: Along with FDM, various attack implementation is also done in order to test the efficiency of E-TOHIP protocol.
E-TOHIP, Fault Detection Mechanism, MANET.
- Vijay I, Rath AK, Puthal B. Exploration of security threat analysis in wireless mobile Ad Hoc Networks. Indian Journal of Science and Technology. 2016; 9(35):1–11.
- Neeraja E, Sabiyath Fatima N. Security Enhancement in MANET Using A New Enhanced Topology Hiding Multipath Routing Protocol (E-TOHIP). International Journal of Applied Engineering Research. 2005; 10(20). ISSN 0973-4562.
- Zhang Y, Yani T. TOHIP:A topology-hiding multipath routing protocol in mobile ad hoc networks. IEEE Ad Hoc Networks. 2014; 21:109–22.
- Hong S, Yang H. Fault Propagation Model in Mobile Ad Hoc Network Based on Random Walk Model. IEEE Cyber Technology in Automation. 2014; 22(2):376–85.
- Gundry S, Zou J. Fault Tolerant bio-inspired Topology control mechanism for autonomous mobile node distribution in manets. IEEE Trans Mobile Computing. 2013; 10(9):1345–58.
- Patel M, Sharma S. Detection of Malicious Attack in MANET A Behavioral Approach. IEEE, Computer Science Engineering. 2012; 183–210.
- Samreen S, Narasimha G. An Efficient Approach for the Detection of Node Misbehaviour in a MANET based on Link Misbehavior. IEEE Computer Networks. 2012; 9(16).
- Zhao ZM, Hu HX. Risk-aware mitigation for MANET routing attacks. IEEE Trans Depend Sec Comput. 2012; 9(2):250–60.
- Djahel S, Nait-Abdesselam F. Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun Surv. 2011; 13(4):658–72.
- Cui J, Wu L. A Novel Fault Detection Mechanism of Topology aware ALM. IEEE Computational Intelligence and Industrial Applications. 2009; 98(76):135–40.
- Li W, Joshi A. Policy-based Malicious Peer Detection in Ad Hoc Networks. IEEE Computer Science and Engg. 2009; 87(62):456–60.
- Burmester M, Medeiros B. On the security of route discovery in MANETs. IEEE Trans Mob Comput. 2009; 8(9):1180–8.
- Oliveira T, Greve F. The Node Reliability Approach to Broadcasting in Manets: Raising Reliability With Low End-to-End Delay. IEEE Ad hoc networks. 2007; 1(3):89–102.
- Papadimitratos P, Haas ZJ. Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications. 2006; 24(2):343–56.
- Sanzgiri K, Dahill B. Authenticated routing for ad-hoc networks. IEEE Journal on Select Areas communication. 2005; 23(3):598–610.
- Fawaz Y, Bognanni C. Fault Tolerant Content Adaptation for a Dynamic Pervasive Computing Environment. IEEE Computer Networks. 2005; 12(9):120–7.
- Ye Z, Krishnamurthy SV. A routing framework for providing robustness to node failures in mobile ad hoc networks. IEEE Ad Hoc Netw. 2004; 2(1):87–107.
- Li X, Cuthbert L. Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. IEEE Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOT). 2004; 184–91.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.