CFP last date
20 May 2024
Reseach Article

Trusted Load Balancing Mechanism for MANET

Published on February 2015 by Bittu Ann Mathew, Sneha Sebastian, Varsha Sabu, Sumy Joseph
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 3
February 2015
Authors: Bittu Ann Mathew, Sneha Sebastian, Varsha Sabu, Sumy Joseph
843b64bb-0a06-4619-a904-c210b5ca1e01

Bittu Ann Mathew, Sneha Sebastian, Varsha Sabu, Sumy Joseph . Trusted Load Balancing Mechanism for MANET. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 3 (February 2015), 12-13.

@article{
author = { Bittu Ann Mathew, Sneha Sebastian, Varsha Sabu, Sumy Joseph },
title = { Trusted Load Balancing Mechanism for MANET },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 3 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 12-13 },
numpages = 2,
url = { /proceedings/icaccthpa2014/number3/19446-6029/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Bittu Ann Mathew
%A Sneha Sebastian
%A Varsha Sabu
%A Sumy Joseph
%T Trusted Load Balancing Mechanism for MANET
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 3
%P 12-13
%D 2015
%I International Journal of Computer Applications
Abstract

A mobile ad hoc network (MANET) is a self-configuring, infrastructure less network of wireless mobile devices. Malicious nodes are those nodes that create attacks like denial of service attacks, impersonation attacks, etc. Due to increase in communication in the network, overloading of nodes may happen. MANET is also vulnerable to node overloading due to malicious nodes. In this paper, an efficient load balancing mechanism has been proposed. This method has been designed using Trust Based Malicious Node Detection (TMND). Here load balancing is performed by rejecting the malicious nodes below a certain trust cutoff value. The system has been analyzed by calculation of throughput, delay and load.

References
  1. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt, Piet Demeester, "An Overview of Mobile Ad Hoc Networks: Application and Challenges".
  2. Pradeep Rai, Shubha Singh"A Review of MANETs Security Aspects and Challenges", IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010
  3. Oussama Souihli, Mounir Frikha, "Load-balancing in MANET shortestpath routing protocols",Sciencedirect,March 2009
  4. Y. Bejerano and S. J. Han, "Cell breathing techniques for load balancing in wireless LANs", IEEE Trans. Mobile Comput. , vol. 8, no. 6, pp. 735749, June 2009.
  5. S. Corroy, L. Falconetti, and R. Mathar, "Dynamic cell association for downlink sum rate maximization in multi-cell heterogeneous networks", in Proc. 2012 IEEE Intl. Conf. Commun. , to be published after Apr. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Trust Load Balancing Malicious Node