CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Analysis of Throughput and Energy Consumption in MANET using IALERT Routing Protocol

by Lohit Kumar, Vishali Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 12
Year of Publication: 2014
Authors: Lohit Kumar, Vishali Sharma
10.5120/16646-6619

Lohit Kumar, Vishali Sharma . Analysis of Throughput and Energy Consumption in MANET using IALERT Routing Protocol. International Journal of Computer Applications. 95, 12 ( June 2014), 16-20. DOI=10.5120/16646-6619

@article{ 10.5120/16646-6619,
author = { Lohit Kumar, Vishali Sharma },
title = { Analysis of Throughput and Energy Consumption in MANET using IALERT Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 12 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number12/16646-6619/ },
doi = { 10.5120/16646-6619 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:16.574505+05:30
%A Lohit Kumar
%A Vishali Sharma
%T Analysis of Throughput and Energy Consumption in MANET using IALERT Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 12
%P 16-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc Network consist of mobile nodes which do require neither a base station nor any fixed infrastructure. Nodes which are far apart from each other communicate hop by hop. An efficient routing protocol is required between the nodes to communicate. MANETs are not immune to attacks. In this paper we have implemented wormhole attack which is a type of active attack which disturbs the normal functioning of network and IALERT routing protocol. We have compared two parameters that are throughput and energy consumption of both our tcl files named wormhole and isolate. In wormhole file we have applied the attack and in the isolate file we have countered that attack. Results and simulations show that the throughput of isolate file is better than wormhole file and energy consumption of isolate file is less than wormhole file.

References
  1. P. I. Basarkod, S. S. Manvi, D. S. Albur "Mobility Based Estimation of Node Stability in MANETs" 2013 IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN 2013) pp no. 126-130.
  2. Hemant Dandotiya, Rachit Jain,Rinkoo Bhatia "Route Selection in MANETs by Intelligent AODV" 2013 International Conference on Communication Systems and Network Technologies pp no. 332.
  3. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng "Anonymous Secure Routing in Mobile Ad-Hoc Networks" Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04)
  4. H. Yang, H. Y. Luo, F. Ye, S. W. Lu, L. Zhang, "Security in mobile ad hoc networks: Challenges and solutions," IEEE proceedings on wireless Communications, vol. 11, no. 1, pp: 38-47, Feb. 2004.
  5. M. K. Kumar and R. S. Rajesh, "A Survey of MANET Routing Protocols in Mobility Models," International Journal of Soft Computing Vol. 4, I. 3, pp. 136-141, 2009.
  6. T. Fahad & R. Askwith, "A Node Misbehaviour Detection Mechanism for Mobile Ad-hoc Networks.
  7. Y. Zhang, W. Louy, W. Liu and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," proc. of Journal on Wireless Networks, vol. 13, no. 5, pp. 569-582, October 2007
  8. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. On Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
  9. I. Khalil and S. Bagchi, "MISPAR: Mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks," Proceedings of the 4th International conference on Security and Privacy in Communication networks (SecureComm'08), Turkey, Sep 2008, pp. 1–10.
Index Terms

Computer Science
Information Sciences

Keywords

Analysis Throughput