This website uses cookies to ensure you have the best experience. Learn more

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

585 words - 3 pages

A Wireless network is a type of computer network that uses wireless data connections for connecting network nodes. It is a method for homes, telecommunication networks, business, and enterprise to avoid a costly process of cables into a buildings or connection between various equipment’s locations. And each device can communicate with another node immediately within their radio range or one which outside the range using wireless links. One type of wireless networks called ad-hoc networks. An ad-hoc networks have become increasingly relevant in recent year due to their potential applications in battlefield, military, and emergency disaster relief etc.,. It is a self-configuring network. And it consists of collection of autonomous mobile nodes formed by topology without use of any existing infrastructure. Each mobile node serve as router or hosts in network. The mobile nodes communicate directly with each other and without the aid of access point, and therefore have no fixed infrastructure. A goal of MANET is to broaden mobility into the area of autonomous, mobile and wireless domains, whereas a set of nodes from the network routing infrastructure in an ad-hoc manner. They form an arbitrary topology, where the routers are free to move randomly and arrange themselves as required. Each node or mobile device is equipped with a transmitter and receiver. Compared to wired network wireless networks are greatly fixed as there is no master slave relationship that exist in a mobile ad-hoc networks. Nodes rely on each other to established communication, thus each node act as a router. Therefore, in mobile ad-hoc network, a packet can travel from a source to destination either directly or through some set of intermediate packet forwarding nodes.

In an ad-hoc network, nodes communicate with each other by...

Find Another Essay On An Approach of Energy Efficient and Secure Data Transfer Using Multicast Routing Protocol in Ad Hoc Networks

Routing Protocols for Ad Hoc Mobile Networks

2227 words - 9 pages Cluster-Based Routing Protocol,” Mobile Ad-Hoc Networks Based on Wireless LAN, University of Paderborn, 2003. [4] P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks,” Washington University in St. Louis, November 1999. Available: http://www.cse.wustl.edu/~jain/cis788-99/ftp/adhoc_routing/ [5] D.B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing,1996. Available: http://www.loria.fr/~ichris/Teaching/Articles/dsr.pdf [6] G. Jayakumar, G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocols – A Review,” Journal of Computer Science, Science Publications, vol. 3, no. 8, pp. 574-582, 2007.

Energy Efficient Mobile Ad Hoc Network (MANET)

2553 words - 10 pages tool to solve the NP-complete problem. Energy-efficient Genetic Algorithm is used to find the delay-constrained multicast tree and to reduce the total energy consumption of the tree. Thus reducing the power consumption of the nodes in the network and thereby prolonging the lifetime of the battery[1]. Choosing the energy consumption model plays an significant role in ad hoc network. Energy consumption models accounts for energy consumption due to data

Ad Hoc Routing Protocols

1903 words - 8 pages routing protocols designed for ad hoc networks. The two broad classifications of ad hoc routing protocols are Table-Driven protocols and Source-Driven (demand-driven) protocols. Table Driven Routing Protocols Table-Driven routing protocols maintain current live routing information from the node to all other nodes in the network. The nodes manage multiple routing tables so that they can they can promptly respond to the constant topology changes, update

An Efficient and Secure Multicast Key Management Scheme based on star topology"

979 words - 4 pages With the growth of Internet, the usage of group communication becomes more popular. These applications include the pay TV channels, secure videoconferencing, multi-partner military action, wireless sensor, and ad hoc networks. In today’s era, information security is the prime concern as with the technological advancements, the attackers are provided with more powerful and sophisticated tools. Today, the Internet is not totally secure for

Efficient and secure star topology based multicast key management algorithm

1470 words - 6 pages left the group, but both his factors p3 and q3 of X3 are already present in X1 and X2 respectively. Therefore, he can decrypt the future cipher text to obtain the original confidential message M using secret information X3 and private key d3. Hence, forward secrecy is not preserved in this case. Similarly, when a U4 wants to join the group, he can decrypt the past cipher text to obtain original confidential message M using secret information X4

Mobile and Wireless Communication: Mobile Ad Hoc Networks

2437 words - 10 pages response to the packets transmission. Another secure routing protocol is Secure Efficient Ad hoc Distance which operates on DSDV (DeastinationSequensed Distance Vector. Here it authentic the sequence no. and the metric field of a routing table keep informed message using oneway hash functions. Conclusion In this report we have discussed thebasics of the Mobile Ad-Hoc network and their methodology. We analysed the importance of the ad-hoc networks

Wireless Mobile Ad Hoc Mobile Networks Help Security

1502 words - 7 pages trying to satisfy both of them can be very difficult because such a process can be easily abused or disrupted by adversarial nodes. Neighbor discovery is an important part of many protocols for mobile ad hoc networks, including localization and routing. Communications and protocols performance will depreciate, when neighbor discovery fails. In this paper, we address this open issue by proposing secure and efficient neighbor discovery with respect

secure data transmission using steganography

2175 words - 9 pages imaginative and innovative answers for secure information from falling into wrong hands. The dissemination of advanced media confronting an issue from numerous years as the information are struck and controlled by unapproved individual. The web is a strategy for correspondence as a method for appropriates data to the masses. As an aftereffect of spreading of web around the globe, stowing away of secret messages through distinctive techniques is

Secure Data Transmission Using Steganography

2297 words - 10 pages present an imaginative and innovative answers for secure information from falling into wrong hands. The dissemination of advanced media confronting an issue from numerous years as the information are struck and controlled by unapproved individual. The web is a strategy for correspondence as a method for appropriates data to the masses. As an effect of spreading the web around the globe, stowing away of secret messages through distinctive

Biologically Inspired QoS Aware Routing Protocol to Optimize Lifetime in Sensor Networks

3126 words - 13 pages Journal of Recent Trends in Engineering, May 2009, Vol. 1, No. 1. [9] M. Keyur Rana, A. Mukesh Zaveri, “Techniques for efficient routing in wireless sensor network”, International Conference on Intelligent Systems and Data Processing (ICISD), 2011. [10] B. Shuang, L. Yang, L. Zhenbo, C. Jiapin, “An ant-based on-demand energy routing protocol for ad hoc wireless networks”, International Conference on Wireless Communications, Networking and Mobile

Energy-Efficient Routing Protocols for Wireless Sensor Network

1850 words - 8 pages further energy –efficient clustering protocols. Works Cited [1] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, An application-specific protocol architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications pp 660-670, 2002. h5 index- 85 [2] S. Ali Md, D. Tanay, B. Rahul,” ALEACH advanced LEACH routing protocol for wireless microsensor Networks”, In: Proceedings of

Similar Essays

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

946 words - 4 pages neighbor node: Multicast routing protocol consists of unremitting sending the message from source to multiple destinations. It is used in ad-hoc networks. And this multicast routing protocol is efficient way to increase the lifetime of nodes. The nodes will communicate with each other. So, each node should identify the neighbor node for communication within the network or outside the radio range. Hence we introduce distance method to calculate

Sharp: A Joint Spectrum Allocation, Handover And Routing Protocol For Cognitive Radio Ad Hoc Networks

794 words - 4 pages algorithm must be developed to consider all possible interactions between PUs and SUs. In order to address above-mentioned challenges, this paper proposes a joint cross layer resource management consisting from spectrum allocation, handover and CR routing protocol for ad hoc networks (SHARP) that specifically addresses the performance concerns of CR communication over end-to-end path, and the problem of securing the PU communications from the interference generated by SUs specially when they are acting under limited knowledge of the environment and complex and highly stochastic behavior of the multipath fading channel. Our main contributions can be summarized as follows:

Sharp: A Joint Spectrum Allocation, Handover And Routing Protocol For Cognitive Radio Ad Hoc Networks

1647 words - 7 pages • Mobility • Agility In the reactive routing algorithms proposed for adhoc multi-hop networks, hop-count and ETX are key measures for route selection in DSR and AODV algorithms [??]. The expected number of transmissions (ETX) required for achieving success is a commonly used metric for routing in wireless multi-hop, ad¬hoc networks, especially when they suffer from instability in link quality [9, 38, 4, 15]. The ETX is based on measuring the loss

Stable And Self Adaptive Routing For Mobile Ad Hoc Networks Using Cross Layer Design

2857 words - 12 pages above results are much more evident to prove the proposed metrics and methodology to discover a more stable and reliable route improves the performance of the routing protocol. Conclusions and Future Work This paper presents a cross layer, multi metric routing scheme for mobile ad hoc networks which is more suitable for the high mobility environment. Our approach to discover routes using cross layer design and multiple metrics to qualify the