CFP last date
20 January 2025
Reseach Article

Secure On-Demand Routing Protocol for MANET using Genetic Algorithm

by D.Suresh Kumar, K.Manikandan, M.A.Saleem Durai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 8
Year of Publication: 2011
Authors: D.Suresh Kumar, K.Manikandan, M.A.Saleem Durai
10.5120/2380-3139

D.Suresh Kumar, K.Manikandan, M.A.Saleem Durai . Secure On-Demand Routing Protocol for MANET using Genetic Algorithm. International Journal of Computer Applications. 19, 8 ( April 2011), 29-34. DOI=10.5120/2380-3139

@article{ 10.5120/2380-3139,
author = { D.Suresh Kumar, K.Manikandan, M.A.Saleem Durai },
title = { Secure On-Demand Routing Protocol for MANET using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 8 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume19/number8/2380-3139/ },
doi = { 10.5120/2380-3139 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:36.861609+05:30
%A D.Suresh Kumar
%A K.Manikandan
%A M.A.Saleem Durai
%T Secure On-Demand Routing Protocol for MANET using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 8
%P 29-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network networks are self organizing, very dynamic network which support data networking without an infrastructure. The proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic algorithm (GA) is used to find the optimal path from the available multiple paths between source and destination to be used in the case of link failure problems. To improve routing mechanism, we use buffer size, end to end delay and shortest path as the parameters for GA in route discovery. GA allows for self-configuration systems and maintains state information about the neighboring network. GA's are able to find, if not the shortest, at least an optimal path between source and destination in mobile ad-hoc network nodes. And we obtain the alternative path or backup path to avoid reroute discovery in the case of link failure or node failure. Furthermore we incorporate self organized key authentication mechanism in order to authenticate every that participates in the network. We use NS-2 simulator to simulate this protocol and we conclude with performance evaluation and comparison with the existing protocol.

References
  1. Shengxiang Yang, Member, IEEE, Hui Cheng, and Fang Wang, Member, IEEE, “Genetic Algorithms with Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks”, in proc. IEEE transactions on systems, man, and cybernetics- part C: applications and reviews, vol. 40, no. 1, January 2010, pp. 52-63
  2. Kilhung Lee, “A backup path routing for guaranteeing bandwidth in mobile ad hoc networks for multimedia applications”, in proc. springer multimedia tools appl, 11 January 2011.
  3. Tsung-Chuan Huang, Sheng-Yu Huang and Lung Tang, “AODV-Based Backup Routing Scheme in Mobile Ad Hoc Networks”, in proc. IEEE 2010 International Conference on Communications and Mobile Computing, 2010 IEEE.
  4. G.Lavanya,C.Kumar and A.rex Macedo arokiaraj, “Secured backup routing protocol for Ad hoc networks”, in proc. IEEE 2010 International Conference on Signal Acquisition and Processing,pp.45-50, 2010.
  5. Luo Chao, Li Ping’an , “ An efficient routing approach as an extension of the AODV protocol”, in proc. IEEE, vol.1,pp. 95-99,2010.
  6. Hao Yang, James Shu, Xiaoqiao Meng, and Songwu Lu, “SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks”, in proc. IEEE, IEEE journal on selected areas in communications, vol. 24, no. 2, February 2006.pp .261-273
  7. Kun-Ming Yu • ChangWu Yu • Shi-Feng Yan, “An Ad Hoc Routing Protocol with Multiple Backup Routes”, in proc. Springer Science+Business Media, LLC. 2009, 1 november 2009.
  8. Qing Chen, Xiaodong Lin, Sherman Shen, Kazuo Hashimoto, and Nei Kato, “A Group-Based Key Management Protocol for Mobile Ad Hoc Networks”, in proc. IEEE "GLOBECOM" 2009.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Genetic algorithm backup routes authentication