Secured Data Forwarding Routing Protocol (SDFRP) For Heterogeneous Mobile Ad Hoc Networks

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-39 Number-1
Year of Publication : 2016
Authors : A.K.Ashfauk Ahamed, Dr.M.Anand Kumar, Dr.B.L.Shivakumar


A.K.Ashfauk Ahamed, Dr.M.Anand Kumar, Dr.B.L.Shivakumar "Secured Data Forwarding Routing Protocol (SDFRP) For Heterogeneous Mobile Ad Hoc Networks". International Journal of Computer Trends and Technology (IJCTT) V39(1):53-61, September 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Secured data forwarding is an overwhelming task among the mobile ad hoc networks as the wireless transmission medium is more vulnerable to attack. This research work focuses on network and attack model which takes into account of different valid scenarios (that will probably prone to attacks) while communications are carrying out collisions, channel error or mobility and also exist situations mainly, malicious / anomalous behaviors, security attacks and more. Routing overhead, throughput, packet delivery ratio and delay metrics are chosen to conduct performance analysis under two scenarios namely velocity and density. Simulations are carried out using NS2 and the proposed security strategy performs better.

[1] X. Sun, et al., Secure vehicular communications based on group signature and ID-based signature scheme, in: Communications, 2007. ICC’07. IEEE International Conference on, 2007, pp. 1539–1545.
[2] Y. Qian, N. Moayeri, Design of secure and applicationoriented MANETs, in: Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, 2008, pp. 2794–2799.
[3] T. Kosch et al, The scalability problem of vehicular ad hoc networks and how to solve it, Wireless Commun., IEEE 13 (2006) 22–28.
[4] D. Djenouri et al, A survey of security issues in mobile ad hoc networks, IEEE Commun. Surv. 7 (2005) 2–28.
[5] P. Golle, et al., Detecting and correcting malicious data in MANETs, in: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, 2004, pp. 29–37.
[6] N. Komninos, D. Vergados, C. Douligeris, Detecting unauthorized and compromised nodes in mobile ad hoc networks, Ad hoc Netw. 5 (2007) 289–298.
[7] P. Yi, Z. Dai, Y. Zhong, S. Zhang, Resisting flooding attacks in ad hoc networks, IEEE ITCC 2005 (2) (2005) 657–662.
[8] C.E. Perkins, E.M. Royer, S.R. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, IETF Experimental RFC 3561, July 2003. < rfc3561.txt>.
[9] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Netw. 8 (2002) 153–167.
[10] Ahamed, Ashfauk, and B. L. Shivakumar. "A Survey on DSDV Node Design in Wireless Ad Hoc Networks." International Journal of Advanced Research in Computer Science 6.8 (2015).
[11] Lyno Henrique G. Ferraza, Pedro B. Vellosob, Otto Carlos M.B. Duarte, An accurate and precise malicious node exclusion mechanism for ad hoc networks, ad hoc networks, (19) 2014, 142 - 155.
[12] Radu Stoleru,Haijie Wu, Harsha Chenji, Secure neighbor discovery and wormhole localization in mobile ad hoc networks, ad hoc networks, (10), 2012, 1179 - 1190.
[13] B Narasimhan, R Vadivel, Secured Reliable Multipath Routing Protocol (SRMRP) using Trust Computation and Carrier Sense Multiple Access with Collision Intimation (CSMA/CI) for Heterogeneous IP-based Mobile Ad-hoc Networks, International Journal of Computer Applications, (60) 2012, 12-16.
[14] R.Karthik and B.L Shivakumar, "Fuzzy Based Support Vector Machine Classifier With Wiener Filter (fsvm – wf) For Intrusion Detection System", International Journal of Advanced Research in Computer Science, Volume 7, Issue 4, Page No (11-15), July - August 2016, ISSN: 0976-5697.