A Secure and Efficient Location based Routing to Maximize the Lifetime of MANET

被引:0
作者
Hemalatha, M. [1 ]
Mohanraj, M. [1 ]
机构
[1] Dr SNS Rajalakshmi Coll Arts & Sci, Dept Comp Sci, Coimbatore 641049, Tamil Nadu, India
来源
2022 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES, ICICT 2022 | 2022年
关键词
Greedy Perimeter Stateless Routing; Hierarchical Location Service; packet delivery rate; Clustering; Quality of Service; Overhead; HOC; PROTOCOL;
D O I
10.1109/ICICT54344.2022.9850891
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This research work proposes a combined tradition Greedy Perimeter Stateless Routing (GPSR) and Hierarchical Position Provision (HPP). The hybrid technique works with a very fast routing protocol, i.e., GPRS manages coordinating groups and HPP is to get the objective point when the target center point location isn't known or isn't adequately renewed. To be exact, an objective is extremely distant from the dispatcher, the right position is identified, and an extra overhead is delivered through the dispatcher to a beneficiary. The basic clarification behind the existing protocol is to decrease this overhead in HPP. When a bundle must be sent to the goal, it will be sent especially to the past position of the objective as opposed to asking for the correct position. Precisely when a group of users are progressing toward the past position, the correct position for the user is guided. Simulation can be conducted through the java test system for HPP as indicated by the suggestion. This paper has composed experimentations that demonstrate promising outcomes in the degree inaction, bundle transport rate and overhead.
引用
收藏
页码:266 / 270
页数:5
相关论文
共 17 条
[1]  
Aad I., 2006, P SEC WORKSH
[2]   A survey of mobility models for ad hoc network research [J].
Camp, T ;
Boleng, J ;
Davies, V .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) :483-502
[3]   An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks [J].
Chou, Chao-Chin ;
Wei, David S. L. ;
Kuo, C. -C-. Jay ;
Naik, Kshirasagar .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (01) :192-203
[4]  
Defrawy K.E., 2007, PROC IEEE INT C NETW
[5]  
El-Khatib K., 2003, P INT C PAR PROC WOR
[6]   An intrusion detection system for wireless sensor networks using deep neural network [J].
Gowdhaman, V ;
Dhanapal, R. .
SOFT COMPUTING, 2022, 26 (23) :13059-13067
[7]  
Hong X., 1999, ACM MSWIM, P53
[8]   Ariadne: A secure on-demand routing protocol for ad hoc networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
WIRELESS NETWORKS, 2005, 11 (1-2) :21-38
[9]  
Pathak V., 2008, PROC IEEE INT C VEHI
[10]   An anonymous on-demand position-based routing in mobile ad hoc networks [J].
Rahman, SMM ;
Mambo, M ;
Inomata, A ;
Okamoto, E .
INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS, 2006, :300-+