CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network

by Mohd Zamir Arif, Gaurav Shrivastav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 15
Year of Publication: 2012
Authors: Mohd Zamir Arif, Gaurav Shrivastav
10.5120/8640-2379

Mohd Zamir Arif, Gaurav Shrivastav . Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network. International Journal of Computer Applications. 54, 15 ( September 2012), 7-12. DOI=10.5120/8640-2379

@article{ 10.5120/8640-2379,
author = { Mohd Zamir Arif, Gaurav Shrivastav },
title = { Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 15 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number15/8640-2379/ },
doi = { 10.5120/8640-2379 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:44.438510+05:30
%A Mohd Zamir Arif
%A Gaurav Shrivastav
%T Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 15
%P 7-12
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to attacks by malicious nodes or unwanted packet forwarding through UDSDV (Un-trust Destination Sequence distance vector routing). In order to decrease the unwanted data flooding and routing misbehaviour from malicious nodes or UDSDV node, we introduce the concept of trust based destination sequence distance vector routing that is TDSDV module, if we apply TDSDV routing and same time UDSDV node presence in the network so TDSDV node protect through unwanted packet flooding of the network and increases network performance. In this paper we proposed TDSDV trust based destination sequence distance vector routing and analyze the behaviour on the network parameter like throughput, packet delivery ratio, end-to-end delay, routing overhead and energy consume via mobile nodes in all three cases DSDV, UDSDV and TDSDV routing.

References
  1. Dr. S. Santhosh Baboo1 and S. Ramesh "Secured-destination Sequenced Distance Vector (SSDV) Routing Protocol for Mobile Ad-hoc Networks" International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] .
  2. H. Yang, J. Shu, X. Meng, and S. Lu, "SCAN: Self-organized network-layer security in mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006, pp. 261-273.
  3. P. Karn, "MACA – a new channel access method for packet radio," in proceedings. ARRL/CRRL Amateur Radio Computer Networking Conference, September 1990.
  4. Haitao Zhao, Jibo Wei, Shan Wang and Yong Xi, "Available Bandwidth Estimation and Prediction in Ad hoc Networks", Wireless Networks, Vol. 14, pp. 29–46, 2008.
  5. Chao Gui & Mohapatra, "A Framework for Self-healing and Optimizing Routing Techniques for Mobile Ad hoc Networks", Wireless Networks, Vol. 14 No. 1, pp. 29-46, 2008.
  6. H. Tebbe, and A. Kassler, "QAMNet: Providing Quality of Service to Ad-hoc Multicast Enabled Networks", 1st International Symposium on Wireless Pervasive Computing (ISWPC), Thailand, 2006.
  7. G. S. Ahn, A. T. Campbell, A. Veres and L. H. Sun, "SWAN: Service Differentiation in Stateless Wireless Ad hoc Networks", In Proceedings IEEE INFOCOM, 2002.
  8. Y. Shang, W. Rml, Y. Zhang, and M. Fromherz. Localization from connectivity in sensor networks. IEEE Transaction on Parallel and Distributed Systems, 15(11):961–974, 2004.
  9. J. M. Cabero, F. D. la Torre, A. Sanchez, and I. Arizaga. Indoor people tracking based on dynamic weighted multidimensional scaling. In Proc. of MSWiM 2007, pages 328–335, 2007.
  10. S. Fujii, A. Uchiyama, T. Umedu, H. Yamaguchi, and T. Higashino. An off-line algorithm to estimate trajectories of mobile nodes using ad-hoc communication. In Proc. Of PerCom 2008, pages 117–124, 2008.
  11. T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher. Range-free localization schemes for large scale sensor networks. In Proc. of MobiCom 2003, pages 81–95, 2003.
  12. R. Nagpal, H. Shrobe, and J. Bachrach. Organizing a global coordinate system from local information on an ad hoc sensor network. In Proc. of IPSN 2003, pages 333–348, 2003.
  13. M. Li and Y. Liu. Rendered path: range-free localization in anisotropic sensor networks with holes. In Proc. Of MobiCom 2007, pages 51–62, 2007.
  14. P. Mohapatra, J. Li, and C. Gui, "QoS in mobile ad hoc networks," IEEE Wireless Commun. Mag. (Special Issue on QoS in Next-Generation Wireless Multimedia Communications Systems), pp. 44–52, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Routing Load average end-to-end delay packet delivery fraction TCP UDP DSDV UDSDV TDSDV