CFP last date
20 January 2025
Reseach Article

Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security

by Bodhy Krishna S., C. Chandrasekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 10
Year of Publication: 2016
Authors: Bodhy Krishna S., C. Chandrasekar
10.5120/ijca2016908518

Bodhy Krishna S., C. Chandrasekar . Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security. International Journal of Computer Applications. 135, 10 ( February 2016), 22-27. DOI=10.5120/ijca2016908518

@article{ 10.5120/ijca2016908518,
author = { Bodhy Krishna S., C. Chandrasekar },
title = { Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 10 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number10/24086-2016908518/ },
doi = { 10.5120/ijca2016908518 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:26.393466+05:30
%A Bodhy Krishna S.
%A C. Chandrasekar
%T Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 10
%P 22-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network (MANET) is a sub class of ad-hoc network and it dynamically forms a temporary network without any support of central administration. Ad hoc network is a collection of wireless mobile nodes without any fixed infrastructure. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. Such networks have no fixed topology due to the high degree of node mobility. Node mobility may cause the routes change. Hence, routing in MANET is a critical task due to its highly dynamic environment. To accomplish this task, a variety of routing algorithms have been proposed and also the number remains increasing day by day. These protocols fall in to mainly three categories---Proactive, Reactive and Hybrid. But, it is difficult to determine which protocol performs best under a number of different scenarios. This paper presents the qualitative comparison of selected proactive routing protocols DSDV, OLSR and CGSR based on security.

References
  1. C.Sivaram murthy, B.S.Manoj, Ad hoc wireless Networks Architectures, and protocols, Pearson Edu, 2004.
  2. Roberto Carlos Hincapi´e, Blanca Alicia Correa, and Laura Ospina, “Survey on Clustering Techniques for Mobile Ad Hoc Networks,”pp.1-8
  3. C.Perkins ,Praving Bhagwat, “Highly dynamic destination sequenced distance vector Routing (DSDV) for Mobile computers”.
  4. Charles E. Perkins and Elizabeth M.Royer. “Ad-hoc on-demand distance vector routing”. Technical report, Sun Micro Systems Laboratories, Advanced Development Group, USA
  5. R. Dube et al., "Signal Stability based Adaptive Routing (SA) for Ad- Hoc Mobile Networks," PerS. Commun., Feb. 1997, pp. 36-45
  6. P. Jacquet, P. Muhlethaler, A. Qayyum, “Optimized Link State Routing Protocol”, Internet Draft, draft-ietf-manetolsr- 00.txt, November 1998.
  7. A. Laouiti, A.Qayyum, and L.Viennot, “Multipoint Relaying; An Efficient Technique for Flooding in Mobile Wireless Networks,” in Proceeedings of the 35th Annual Hawaii International Conference on System Science (HICSS’ 2002), Waikoloa, HI, January 2002.
  8. C.-C. Chiang, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,” Proc. IEEE SICON ’97, Apr. 1997, pp. 197–211.
  9. C.Siva Ram Murthy and B.S.Manoj, “Ad-Hoc Wireless Networks: Architectures and Protocols”, Pearson Education, ISBN 0132465698, 9780132465694, May 2004.
  10. Elizabeth M. Royer and Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc MobileWirelessNetworks”, IEEE Personal Communication, April 1999.
  11. MohdZamirArif, et al. “ Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network” International Journal of Computer Applications September 2013
  12. Asma Adnane, Christophe Bidan , Rafael Timóteo de Sousa Júnior “Trust-based security for the OLSR routing protocol” Elsevier April 2013
  13. Kaur et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(7), July - 2013, pp. 273-281
Index Terms

Computer Science
Information Sciences

Keywords

MANET Proactive routing protocols DSDV OLSR CGSR Comparative study.