CFP last date
22 April 2024
Reseach Article

Secure Data Transmission Model in MANET

by Priyanka Takalkar, Aaradhana Deshmukh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 24
Year of Publication: 2013
Authors: Priyanka Takalkar, Aaradhana Deshmukh
10.5120/11736-7366

Priyanka Takalkar, Aaradhana Deshmukh . Secure Data Transmission Model in MANET. International Journal of Computer Applications. 67, 24 ( April 2013), 17-20. DOI=10.5120/11736-7366

@article{ 10.5120/11736-7366,
author = { Priyanka Takalkar, Aaradhana Deshmukh },
title = { Secure Data Transmission Model in MANET },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 24 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number24/11736-7366/ },
doi = { 10.5120/11736-7366 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:20.412053+05:30
%A Priyanka Takalkar
%A Aaradhana Deshmukh
%T Secure Data Transmission Model in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 24
%P 17-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is mobile ad-hoc network. It is simply a collection of nodes where each node acts as independent router or host. Mobility is the main characteristics of MANET. Therefore routing protocol is required that adapts whenever topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in MANET using both reactive and proactive routing protocols. Expecting the performance enhancement in Packet delivery ratio, Normalized routing load, End to end packet delay, Throughput, Energy Consumption, Residual Energy of secure data transmission in comparison with existing similar routing protocols for MANET.

References
  1. B. Pranisa,B. Thanikaivel,"Fast and Secure Data Transmission in MANET", International Conference on Computer Communication and Informatics(ICCCI)Jan. 10? 12, 2012.
  2. Kamal oudidi, Abdelmajid hajami, Ohammedel koutbi,"Qos Routing Using Olsr Protoco, Latest Trends On Communications"
  3. Yasser Kamal Hassan1, Mohamed HashimAbd El-Aziz, and Ahmed SafwatAbd El-Radi, "Performance Evaluation Of Mobility Speed Over Manet Routing Protocols", International Journal of Network Security, Vol. 11, No. 3, PP. 128( Nov. 2010).
  4. Ganesh Reddy Karri, P. M. Khilar,"RoutingMisbehavior Detection and Reaction In Manets", International Conference on Industrial andInformation Systems, ICIIS 2010.
  5. Ajay VikramSingh , Prof. M. Afshar Alam and Prof. Bani Singh,"Mobility Based Proactive And Reactive Routing Algorithm In Mobile Ad Hoc Networks"(Manet), International Journal of Computer Science and Information Technologies,Vol. 2 (4) , (2011).
  6. Oscar F. Gonzalez, Michael Howarth, GeorgePavlou," An Algorithm To Detect Packet ForwardingMisbehavior In Mobile Ad- Hoc Networks ",IEEE (2007).
  7. Manikandan T, Sathyasheela K B "Detection OfMalicious Nodes in MANET", IEEE(2010)
  8. Nitiket N Mhala and N K Choudhari,"An Approach Determining Conditions for Monitoring of Critical Nodes for MANET Intrusion Detection System",International Journal of Future Generation Communication and Networking Vol. 4, No. 1, March 2011.
  9. Jiazi YI, Asmaa ADNANE, Sylvain DAVID,BenoËEÄst PARREIN, "Multipath OptimizedLink State Routing for Mobile ad hoc Networks",published in Ad Hoc Networks 9, 1 (2011). 6
  10. Panagiotis Papadimitratos and Zygmunt J. H"Secure Data Transmission in Mobile Ad Hoc Networks" ACM Workshop on Wireless Security September 19, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

MANET secure data transmission fast and secure data transmission