Anonymity based Secure Cross layer Routing Protocol for Mobile Adhoc Networks.

被引:0
作者
Bhusari, Amit A. [1 ]
Jawandhiya, P. M. [1 ]
Thakare, V. M. [2 ]
机构
[1] PLITMS, Buldana, India
[2] SGBAU, PGDCS, Amravati, India
来源
2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III) | 2018年
关键词
MANET; CLPC; RSS; DOS attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In mobile adhoc network (MANET) mobile nodes exchange the messages through wireless medium with traditional layered architecture and without any infrastructure support. Now Cross layer designs approaches are the alternative to the layered architecture and support cross layer interaction between the layers. In this paper we discuss about the security of CLPC (cross layer design approach for power control) routing protocol. CLPC can improve the transmission power and also find the effective route between source and destination. In CLPC, RSS from physical layer (Received signal strength) is used to determine the reliable path between source and destination but it is vulnerable to the DOS attacks. To mitigate the attacks on CLPC, we propose a secure Cross layer power control routing protocol SCLPC. It keeps the nodes, routes and packets anonymous to defend the attacks. Designed protocol SCLPC was simulated in ns2 providing the better results for the network matrices as throughput, PDR (packet delivery ratio) and delay.
引用
收藏
页数:7
相关论文
共 17 条
[1]  
Ahmed A. Sarfaraz, 2015, EGYPTIAN INFORM JOUR
[2]  
Allahham Alaa Azmi, 2017, IJIM, V11
[3]  
Babu K Suresh, 2014, IJCNWC, V4
[4]  
Bhusari Amit A, IEEE SPONS 3 ICECS 2, P600
[5]  
Jawandhiya Pradip M., 2010, IJEST, V2
[6]  
Kelly D., 2009, P IEEE WCNC 09 APR
[7]   An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks [J].
Kong, Jiejun ;
Hong, Xiaoyan ;
Gerla, Mario .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (08) :888-902
[8]  
liu Wei, 2014, IEEE T VEHICULAR NET
[9]   Power controlled routing in wireless ad hoc networks using cross layer approach [J].
MadhanMohan, R. ;
Selvakumar, K. .
EGYPTIAN INFORMATICS JOURNAL, 2012, 13 (02) :95-101
[10]  
Manpreet, IEEE INT C ADV ENG T