CFP last date
20 May 2024
Reseach Article

Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET

by Mahesh Gochar, Harshit Prakash Patidar, Ravindar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 18
Year of Publication: 2015
Authors: Mahesh Gochar, Harshit Prakash Patidar, Ravindar Singh
10.5120/ijca2015907664

Mahesh Gochar, Harshit Prakash Patidar, Ravindar Singh . Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET. International Journal of Computer Applications. 131, 18 ( December 2015), 36-42. DOI=10.5120/ijca2015907664

@article{ 10.5120/ijca2015907664,
author = { Mahesh Gochar, Harshit Prakash Patidar, Ravindar Singh },
title = { Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 18 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number18/23551-2015907664/ },
doi = { 10.5120/ijca2015907664 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:44.701443+05:30
%A Mahesh Gochar
%A Harshit Prakash Patidar
%A Ravindar Singh
%T Adaptive Approach for DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 18
%P 36-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

wireless network with Ad hoc nature consists of mobile nodes which facilitates a fundamental architecture for communication without the support of traditional steady and fixed-positioned routers. However, the architecture must preserve communicating routes and the hosts have mobile nature and they have their restricted transmission range. There are various protocols for controlling the routing in the mobility environment. In MANET, the mobile nodes can perform the roles of both hosts and routers. Various MANET applications use for Military strategic communications and Disaster recovery mostly depended on secure node communication. For Secure Communication we use several Logical Hierarchy key protocol in Mobile Ad-hoc Network. But group key administration looks many problems because of unreliable media, less energy resources, mobile node failure. In this paper we analysis new logical key with Optimal Probabilistic Technique. In this key all node shaped in tree structure. OPLKH decreases the rekey cost and routing energy consumption in Mobile ad hoc network. In simulation we calculated the no. of rekeys cost, total energy consumption at server, key generation of energy consumption.

References
  1. T. Clausen and P. Jacquet “Optimized Link State Routing Protocol (OLSR).” RFC 3626, IETF Network Working Group, October 2003.
  2. Ying Ge, Thomas Kunz and Louise Lamont “Quality of Service Routing in Ad-Hoc Networks Using OLSR.”Proceeding of the 36th Hawaii International Conference on System Science (HICSS’03)
  3. COMPARISON OF EFFECTIVENESS OF AODV, DSDV AND DSR ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS by Sapna S. Kaushik & P.R. Deshmukh
  4. Xiaoyan Hong, Kaixin Xu and Mario Gerla “Scalable Routing Protocols for Mobile Ad Hoc Networks. “Computer Science Department, University of California, Los Angeles, August 2002.
  5. Koey Huishan, Chua Huimin and Koh Yeow Nam “Routing Protocols in Ad hoc Wireless Networks.” National University of Singapore.
  6. Toa Lin, Scott F. Midkiff and Jahng S. Park “A Framework for Wireless Ad Hoc Routing Protocols. ”Bradley Department of Electrical and Computer Engineering. Virginia Polytechnic Institute and State University. Blacksburg Virginia. 2003
  7. S. Corson and J. Macker “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations.” RFC 2501, IETF Network Working Group, January 1999.
  8. P. Jacquet, P. Mühlethaler, T Clausen, A. Laouiti, A.Qayyum and L. Viennot “Optimized Link State Protocol for Ad Hoc Networks.” IEEE INMIC Pakistan 2001.
  9. A. Laouti, P. Mühlethaler, A. Najid and E. Plakoo “Simulation Results of the OLSR Routing Protocol for Wireless Network.” 1st Mediterranean Ad-Hoc Networks workshop (Med-Hoc-Net). Sardegna, Italy2002.
  10. P. Jacquet, A. Laouiti, P. Minet and L. Viennot “Performance of multipoint relaying in ad hoc mobile routing protocols.” Networking 2002. Pise (Italy) 2002.
  11. Anne Marie Hegland et al., “Survey of key management in adhoc networks” , in Proc. IEEE communications surveys-2006.
  12. Jun Li, Guohua Cui, Xiaoqing Fu, Zhiyuan Liu, Li Su, “A Secure Group Key Management Scheme in Mobile Ad Hoc Networks”, IEEE Computer Society Press, 2005.
  13. Jayanta Biswas, S. K. Nandy, “Efficient Key Management and Distribution for MANET”, in Proc. ICC IEEE, 2006
  14. K.Gomathi, B.Parvathavarthini, “An Efficient Cluster based Key Management Scheme for MANET with Authentication”, Trendz in Information Sciences & Computing (TISC), IEEE 2010.
  15. M. Chatterjee, S. K. Das, and D. Turgut, “An On-Demand Weighted Clustering Algorithm (WCA) for Ad hoc Networks”, in Proc. of IEEE Globecom’00, 2000.
  16. Alwyn R. Pais, Shankar Joshi,”A new probabilistic rekeying method for secure multicast groups”, in Proc. International Journal of Information Security- (2010) 9:275–286.
  17. Ali Aydın Selcuk, Deepinder Sidhu, “Probabilistic optimization techniques for multicast key management”, in Proc Elsevier Science 2002.
  18. http://www.digplanet.com/wiki/Random_waypoint_model
Index Terms

Computer Science
Information Sciences

Keywords

Automatic-configuring infrastructure Energy consumption Rekey cost.