Uploaded by mail

Authentication Utilizing Prior Routing for Versatile Network

International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
Authentication Utilizing Prior Routing for Versatile Network
Rohit S1, Dr. M N Nachappa2
1Master
1,2Jain
of Computer Application, 2Acadamic Head,
Deemed-to-be University, Bangalore, Karnataka, India
How to cite this paper: Rohit S | Dr. M N
Nachappa "Authentication Utilizing Prior
Routing for Versatile
Network" Published
in
International
Journal of Trend in
Scientific Research
and
Development
(ijtsrd), ISSN: 2456IJTSRD35877
6470, Volume-5 |
Issue-1, December
2020,
pp.272-276,
URL:
www.ijtsrd.com/papers/ijtsrd35877.pdf
ABSTRACT
In the current circumstance, far off progressions have achieved tremendous
reputation. This distant development is used in various applications. In distant
advancement, Versatile Specially delegated Organizations (MANETs) are a
part and it needn't bother with any pre-set-up establishment. The dynamic
character of those associations makes them more utilitarian and it is sensible
for certain applications. MANET has high convenience and doesn't rely upon
united position. This nature of MANET is weaker against various security
attacks and risks. While standing out from the traditional associations,
uncommonly named associations are having higher opportunities for some
guiding attacks. Ensuring about MANET is a troublesome issue, which need
more examination. Lately, different authorities proposed different responses
for recognizing the directing attacks in MANET. In this survey, progressing
systems and strategies achieved for MANET coordinating attacks is discussed.
The overview out and out presents the issues and merits of those current
systems.
Copyright © 2020 by author(s) and
International Journal of Trend in Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the
Creative
Commons Attribution
License
(CC
BY
4.0)
Keywords: Mobile Ad-hoc networks, Secure routing, Security issues
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Versatile independent sorted out structures have seen
extended use by the military and business divisions for tasks
respected exorbitantly dismal or hazardous for individuals.
An instance of an independent masterminded system is the
Automated Airborne Vehicle (UAV). These can be small scale,
organized stages. Quad copter swarms are a crucial instance
of such UAVs. Masterminded UAVs have particularly
mentioning correspondence essentials, as data exchange is
basic for the on-going action of the organization. UAV
swarms
require
standard
association
control
correspondence, achieving progressive course changes
because of their transportability. This topography age
organization is publicized by an arrangement of Versatile
Impromptu Organization (MANET) directing protocol [1].
MANETs are dynamic, self-planning, and establishment less
get-togethers of PDAs. They are commonly made for a
specific explanation. Each device inside a MANET is known
as a centre and should play the capacity of a client and a
switch. Correspondence over the association is cultivated by
sending groups to a goal center; when an immediate sourcetarget association is out of reach center midpoint are used as
switches. MANET correspondence is commonly distant. Far
off correspondence can be insignificantly gotten by any
center point in extent of the transmitter. This can leave
MANETs open to an extent of attacks, for instance, the Sybil
attack and course control attacks that can deal the
uprightness of the organization [2]. Tuned in
correspondence may outfit aggressors with the best
approach to deal the constancy of an association. This is
refined by controlling coordinating tables, mixing counterfeit
course data or modifying courses. Manin the Middle (MitM)
@ IJTSRD
|
Unique Paper ID – IJTSRD35877
|
attacks can be launched by controlling guiding data to go
traffic through malignant midpoint. Secure steering
conventions have been proposed to mitigate attacks against
MANETs, anyway these don't loosen up security to other
data. Independent structures require a great deal of
correspondence [3]. Basic intuition estimations, for instance,
Disseminated Assignment Portion (DTA), are expected to
unwind task organizing issues without human intervention.
In this manner, these estimations are powerless against
group hardship besides, sham messages; partial data will
incite tricky or besieged undertaking errands. This paper
proposes a novel security show, Security Utilizing Previous
Steering for Versatile Impromptu Organizations
(Authentication Utilizing Prior Routing For Versatile
Network).The show is expected to address center point
approval, network access control, and secure
correspondence for MANETs using existing controlling
conventions. Validation Utilizing Prior Routing For Versatile
Network joins controlling and correspondence security at
the association layer. This is as opposed to existing
methodologies, which give simply controlling or
correspondence security, requiring various conventions to
guarantee the organization. lf-overseeing structures require
a ton of correspondence [4]. Basic deduction estimations, for
instance, Dispersed Assignment Portion (DTA), are expected
to light up task organizing issues without human
intervention [4]. In this way, these counts are helpless
against pack adversity additionally, fake messages; deficient
data will provoke dangerous or bombarded task errands.
This paper proposes a novel security show, Security Utilizing
Previous Directing for Portable Impromptu Organizations
Volume – 5 | Issue – 1
|
November-December 2020
Page 272
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
(Authentication Utilizing Prior Routing For Versatile
Network). The show is planned to address center
affirmation, network access control, and secure
correspondence for MANETs using existing coordinating
conventions. Verification Utilizing Prior Routing For
Versatile Network joins coordinating and correspondence
security at the association layer. This is rather than existing
methodologies, which give simply guiding or
correspondence security, requiring various conventions to
guarantee the organization.
Issues /challenges
1.1. Security Attacks in MANET
In view of the dynamic and changing characteristics in
geology of MANET, various security encroachment is so far
unsolvable. Since MANETs are structure less, high
transportability, self-orchestrating and not depend upon any
fixed specialist in nature. The shortcoming of MANET is
abused by the malevolent centres to upset organization
trades. Barely any fundamental attacks in coordinating for
MANET's were inspected underneath.
A. Gray-hole Attack
In the MANET directing measure, Dark Opening attack is
more celebrated and it concentrated by various makers.
Such an attack advances the fake course information as it
contains a generous way. The key point is to perform guiding
attack to getting the bundles. After attacked the course, the
attacked center will drop the packs experiences on it. This is
difficult to perceive in view of various lead of different center
points. It drops packages sent from a specific center and
advances the group from excellent game plan of target center
points. The assault may be perceived by techniques for a
couple of limits which consolidate pack change, package
drop.
B. Black-hole Attack
The hugest perspective of dim opening attack is to invigorate
the heavy blockage in network coordinating procedure. In
dim opening attack, the dangerous center point drops all the
acquired packages as opposed to sending any groups. The
packs will never again be reached because of such an attack.
Due to retransmit the association blockage spread than
normal.
C. Sink-hole Attack
In sink-opening attack, the attacker attempts to attack all the
center points in the association. Various midpoint will
acknowledge this center and conveys their data through the
assailant center. This by and large uses fake resource
information to attract various center points. After productive
attack, the attacker performs group change, disparaging and
creation on the parcels got.
D. Wormhole Attack
The essential purpose of the wormhole attack is to
retransmits the group on the contrary side of the association.
This attack is executed by several midpoint joining to make a
wormhole; this will play out the wormhole attack. In this
attack, the attacker makes the center to acknowledge that
the target detachment is only one ricochet. Notwithstanding,
actually the division is more than one bounce. The center
point acknowledges and conveys the group to the attacker
additionally, that aggressor sends the package to the
wormhole. By abusing this, tremendous data packs will be
@ IJTSRD
|
Unique Paper ID – IJTSRD35877
|
dropped by the attacker or unlawful
organizations will be gotten.
association
E. Rushing Attack
The purpose behind rushing attack is to incorporate the
mischievous center point at the hour of association
disclosure in the coordinating manner. In the time obviously
divulgence, the RREQs (Route Solicitation) are sent from
dangerous midpoint to neighbouring target midpoint. These
RREQs show up at the close by center points quicker. At the
point when the connecting center gets this quicker RREQ
from the gate crasher, the began request made from the
source center point isn't sent during course disclosure. By
playing out this attack, the attacker incorporates an off-base
bob remember for the coordinating table and the aggressor
can modify with the bundle.
F. Location Disclosure
The zone presentation attack intends to zero in on the
mystery needs of the convenient association by performing
traffic examination. In this attack, the attacker will screen the
center points inside the organization and reveals the region
of each center point. From that it finds the moderate center
points and increases the structure information in the
association. Getting and utilizing the territory information's
of various midpoint is the essential purpose of this attack.
G. Route Fabrication
The major goal of this attack is to accomplish the
unapproved permission to the bundles. This similarly plays
out the bundle dropping in network while stores of trade in
progress. In this attack, an aggressor holds down with the
model controlling principles. Changing the coordinating
messages, the Course creation attack is refined.
Now and again it inserts misguided coordinating messages in
the bundle. While building the coordinating information, the
bundles are shipped off non-existing center points or
dangerous midpoint. It will achieve bundles deferral and
move speed wastage. Overwhelmingly such an attack creates
Forswearing of Administration (DoS) and Flooding attacks:
The explanation behind this attack is to harm the regardless,
working of the association. This attack is fulfilled by sending
the packages constantly into the goal center point. By hitting
customarily, target center will be involved in managing fake
packages and denying the real RREQs to be dropped. Finally,
by this attack, structure of the association is fell.
H. Routing Table Poisoning
The objective of the assailant on this attack is to decline the
coordinating table. The guiding conventions ensure the
guiding tables to discover a course to the target and ahead
the group to the ordinary center point inside the
organization. In course hurting attack the assailant change
the substance of the guiding table and controls to perform
different kinds of attacks. Here, the threatening center points
makes and changes the changed traffic into the association.
The attacker in addition alters the real messages inside the
network. An elective method to execute this assault is
through discussing a RREQ with higher plan variety which
results the significant packs with decrease course of action
grouping are excused. This assault reasons the guiding tables
to make wrong areas and shop the ruffian invalid
information in the directing tables of the cooperating center
points.
Volume – 5 | Issue – 1
|
November-December 2020
Page 273
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
I. Impersonation Attack
Information parcels are not affirmed in the current specially
appointed organization. Thusly, by masking as another
center point, the attacker performs ridiculing, flooding and a
malignant center can dispatch various attacks in an
association. To do the assault, the intruder needs to take the
association Id. Taunting happens when a harmful center
point misshapes their association character, for instance,
changing their Macintosh or IP address in dynamic packages.
Such an attack can be especially done and basically impact
the coordinating in the specially appointed organization. It
shops the bearing to every center point continuing in the
consumption of the course save. Terrible lead risks may be
portrayed as an unapproved direct of an internal center that
results in unintended damages to obvious center points i.e.,
the goal of the center isn't to start an attack in the
association rather it could have various destinations like
getting a crooked bit of leeway differentiated and various
center points. For instance, the vindictive midpoint which
don't successfully execute the Macintosh show with the
manner of thinking of having higher information
transmission and they decline to propel groups for others to
keep its advantages. From the examination about the
association guiding attacks, a couple of makers proposed
differing protection, guarding systems and strategy. Many
surveys masterminded and disseminated regarding this
matter, so this outline gives the most recent strategies which
proposed to deal with network security issues.
2. Literature review
The amazing features of MANETs like incredible topography,
no fixed labourer, nonappearance of central administrating
authority, and unobtrusive number of benefits in adaptable
center points will make more prominent security issues in
the association. A center may screen moving sorts of devilish
exercises eventually of its lifetime in the organization.
Creators in [4] (2016) Proposed a fairly appropriated
dynamic security model against such misbehaving midpoint
and secure coordinating in exceptionally selected convenient
associations. The proposed scheme is most of the way
scattered as in, during the establishment of the course,
additional information is undeniably multiplied among
center points instead of express packages flooding. This
similarly utilizes the dynamic break-based part; this isolates
all the getting rambunctious midpoint and its
correspondence subject to the attack reality.
The makers proposed an arrangement which presents a
generally assigned instrument making an exceptional blend
of each close by and by and large reputation for dealing with
getting raucous center points. It deals with an extraordinary
structure that gives differential answer for different getting
raucous midpoint relying on the earnestness of their
wickedness. It considers the sending behaviour of center
points close by their close by and overall reputation for the
beneficial treatment of wrongdoing. Not at all like various
plans it doesn't strongly spread remarkably created
messages to share reused information in the association. Or
then again perhaps, the profitable information is shared
among midpoint during the course establishment stage.
In the paper [5] (2016) Authors proposed a stable and
energy-successful multi-way stochastic coordinating show
for flexible extraordinarily selected associations (MANETs)
considering the Markov chain. In standard controlling
@ IJTSRD
|
Unique Paper ID – IJTSRD35877
|
frameworks, an attacker can without a very remarkable
stretch catch packages or secure coordinating (data stream)
from source to objective is normally deterministic. Makers
used stochastic multi-path guiding in this paper to direct
these issues. The proposed directing show checks a couple of
ways among beginning stage and target sets and
stochastically picks an energy-profitable course to propel
data groups from those ways. Moreover, this show similarly
ensures data stream in the association as the groups are sent
from the source center point to the target center point
through unpredictable ways. The unpredictable ways at the
hour of trade make it thorny to meddle with, catch, and seize
those moved information parcels as this demands that the
assailant sneak to all possible ways from source to objective.
In view of dynamic geography and restricted resources,
introducing QoS and wellbeing mindful steering is a difficult
errand on such an organization, so the basic role of secure
and trust-based absolutely multiroute directing is to quiet
consider-based directing from source to objective. It mulls
over the boundary with the expectation to fulfil two or more
noteworthy stop-to-end QoS limitations. In this paper [6]
(2017), creators recommend the augmentation of the
standard specially appointed on-request multi-way
separation vector convention to assess this model. The
creators utilized a multi-course directing plan dependent on
a work. A comfortable neighbouring capacity thinks about
the check form. Rather, by extending the standard specially
appointed on-request multi-way separation vector
convention (AOMDV), creators proposed another protected
contiguous trust-improved steering convention as per the
trust model, called AOMDV – SAPTV. This will help in looking
for all conceivable safe ways. It utilizes a safe convention to
confirm trust in the nearby position. This likewise utilizes a
superior cycle of finding the ideal way association.
Therefore, the Dolphin Echolocation Algorithm was utilized
in MANET of compelling correspondence. The exploratory
outcomes were led to re-enact and introduce the AOMDV
SAPTV's presentation. The significant utilization of QoS
cognizant comfortable steering is to get a solid and
incredible route. The chose heading from the source to
objective need to satisfy or additional offer up to end QoS
obliges. The proposed DE set of rules is utilized to locate the
best and uncommon path for steering. Creators have
performed similar examination on the proposed plot with
the current steering conventions to show the viability. The
outcome recommends that the proposed procedure more
appropriate for the high-caliber of steering and had found
the incredible bearing by the streamlining algorithms.
Security protocols were created to ensure steering and
application information so as to ensure MANETs. In any case,
just courses or correspondence are ensured by these
protocols. These protocols neglected to secure both. The safe
steering and viable correspondence on the security protocols
must be executed. So that the total assurance can be
accomplished. The wired and Wi-Fi network correspondence
security protocols are not appropriate for MANET and it
makes enormous weight because of its restricted asset. To
address these issues, in the year (2017) creators in [7]
proposed a novel secure structure (SUPERMAN). The
engineering is intended to empower existing organization
and steering protocols to do their activities, for example, hub
confirmation, access control and correspondence security
systems. This paper introduced another system named as
SUPERMAN, which is a novel security structure. The
Volume – 5 | Issue – 1
|
November-December 2020
Page 274
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
structure gives high security to all information imparted
over a MANET with no limitations. SUPERMAN gives security
on both steering and correspondence. so this has been
actualized on the organization layer. In [8] (2018) Authors
directed a fluffy standard principally based methodology
which assists with planning and watch Trust-Based Secure
Routing Protocol for MANETs (TBSRPM). Due to the
specifically unique lead of hubs, the briefest course doesn't
generally ensure an agreeable way. Hence, way security isn't
considered as the course in the dynamic MANETs can be
handily broken. Subsequently finding a stable and believed
course is critical. The proposed set of rules is the expansion
of the current day responsive directing convention (AODV),
which permits us to build/make a safe course among
objective and assets. The convention conduct relies upon
trust worth and level of trust. The convention conduct
depends upon concur with cost and level of trust. it likewise
settles on a choice on what phase of wellbeing movement is
required. So dependent on trust esteem, the information
parcel is encoded. Utilizing this, malignant hubs can be
without any problem taken out and the customer can set up
a best-just as a confided in way. So dependent on trust
esteem, the data packet is encrypted. Using this, malevolent
hubs can be effortlessly eliminated and the customer can set
up a best-too as a confided in way. Just specific hubs store
topological data around the organization in the virtual spine
organization. In this way, the directing of the messages
requires just the favoured hubs in the network. As of late, the
specialists have proposed numerous virtual spine
development calculations, in any case, very little work has
been done on virtual spine network security. Creators
examined this issue in this paper [9] (2018) by proposed an
ensured paltry way to deal with spine development. To make
sure about spine organization, minor methodology is utilized
by creators. By empowering this methodology, the current
assaults will be identified to distinguish many existing
assaults without debilitating the hub assets. In another
investigation in [10] (2018), creators focused on the safe
directing in MANET. Another objective programming model
is intended for safe directing in this investigation utilizing a
crossover streamlining calculation, called M-Lion Whale. MLion Whale is an enhancement calculation coordinating lion
calculation (LA) into the whale enhancement calculation
(WOA) to enhance the MANET way decision. The multiobjective enhancement model accomplishes various nature
of administration (QoS) boundaries like energy
minimization, most brief and quick course recognition,
connect lifetime, diminishing postponement, and expanding
trust.
Multipath Battery and Versatility Mindful directing plan
(MBMA-OLSR) was planned in depending on MP-OL SRv2.
Multi-Rules Hub Rank (MCNR) metric included the
remaining battery energy and hub speed. Energy and
Versatility Mindful Multi-Point Hand-off (EMA-MPR) choice
instrument was presented by MBMA-OLSR to contribute
MPRs for flooding the data. In any case, MBMA-OLSR was not
proper for enormous scope organization and multi-bounce
organizations. An Astute Energy-mindful Productive Steering
convention for MANET (IE2R) was planned in [11] by Multi
Rules Dynamic (MCDM) strategy with entropy and
Inclination Positioning Association Technique for
Advancement of Assessments II (PROMETHEE-II) strategy to
perceive the productive course. In any case, the IE2R
convention was not utilized in weighty rush hour gridlock
@ IJTSRD
|
Unique Paper ID – IJTSRD35877
|
conditions. An insect colony-based energy control steering
(ACECR) convention was introduced in [12] to discover ideal
course with empowering input character. In spite of the fact
that energy utilization was diminished, load adjusting stayed
unaddressed. In any case, the energy-effective made sure
about directing convention neglected to recognize the
outside assaults with lesser energy utilization. Gathering key
circulation was helped out with created keys through
modest number of messages and lesser energy utilization. An
energy-effective made sure about steering convention was
planned in [13] for connection and message without
contingent upon outsider. A security level was improved
through choosing the safe connection for steering by Secure
Streamlined Connection State Steering Convention.
3. Limitations of the existing Protocols
Most MANET conventions, when at first proposed, simply
dismissed the opportunity of toxic center points. MANET
conventions are still all the additionally testing stood out
from their wired accomplices whether or not all center
points act well, due to higher flexibility rates and humble
resources. Most secure MANET conventions in the
composing are basically developments of interesting MANET
conventions with the extension of cryptographic affirmation
of coordinating data. In any case, the degree of cryptographic
confirmation is commonly kept to simply perceiving
abnormalities. Practically no effort has been composed
towards growing the degree of the conventions to enable
distinctive verification of misbehaving center points. Against
such conventions which don't have features to recognize
turning crazy center points, aggressors can correct a variety
of coordinating attacks. Some huge issues that ought to be
considered for recognizing and perceiving attacker center
points are the, the finding the initiator and the attack. Such
issues will along these lines choose fitting systems for
reducing the piece of raising hell center points. A critical
factor to be considered in choosing the assailant and attack
time is such a cryptographic approval. For explanations
behind clearing out creation inconvenience midpoint from
the organization, methods to procure non real check of
unfortunate behaviour are fundamental. Such a technique
can in like manner be an extraordinary impediment for
center points hoping to do attacks. Many secure MANET
conventions use non-authentic affirmation. In any case,
while non-good confirmation is crucial, it isn't sufficient for
giving non real check of wrongdoing. The current Securing
MANET directing conventions consolidates offering a few
indisputable affirmations that midpoint will live with the
guide of rules and measures. Ensuring that any instrument is
guaranteed is done through improving the agree with in a
Trusted Processing Base. Various MANETs making sure
about techniques use cryptographic guiding data approval to
restrict the limit of an assailant to scatter wrong controlling
information. A couple of trust-based methodologies have
been suggested. The trust based for empowering
cryptographic affirmation fuses a lot of cryptographic
counts, which are for the most part thought to be strong, and
a Trusted Authority, who scatters cryptographic material to
all midpoint of a MANET association. Secure MANET
conventions that impact this confined trust instrument. The
huge damage of the sooner works are that Failed to give
several fundamental assertions and typically power huge
overhead for resource limited battery worked convenient
gadgets. The future extension from this audit is offering
affirmations to diminish the degree of attacks while
Volume – 5 | Issue – 1
|
November-December 2020
Page 275
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
defending the headways offered by the coordinating show,
and decreasing the overhead required for using the trustbased procedures. It is normal that the current security
limits are executed in Trustworthy MANET Modules in every
MANET center point; only the trust head are trusted in the
rest of the center point all other gear and writing computer
programs are untrusted.
4. Conclusion
With these assessment and summary, the hindrances of
existing security limits in MANET are packed in this survey.
This audit highlighted improving the resolute nature of
existing conventions and systems with cutting down their
cost, in future a ton of clear MANET security limits can be
sent in the uniquely selected conventions. This review gives
the basic data about the security issues in manet and late
methodology proposed to vanquish those issues. This shows
the best number of works used cryptographic hash exercises,
and that the trust check abilities to give directing security in
MANET. This has a couple of future direction to ensure that
midpoint can't advance controlling information that is
clashing with information consumed from various midpoint,
and to give a couple of significant affirmations, including a
couple of confirmations that are not given by current secure
MANET conventions
5. REFERENCES
[1] P. S. Kiran, “Protocol architecture for mobile ad hoc
networks,” in Proc. IEEE Int. Ad. Comput. Conf., 2009,
pp. 2112–2117.
[2]
A. Chandra, “Ontology for manet security threats,” in
Proc. 2nd Nat. Conf. Netw. Eng., 2005, pp. 171–117.
[3]
A. K. Rai, R. R. Tewari, and S. K. Upadhyay, “Different
types of attacks on integrated manet-internet
communication,” Int. J. Comput. Sci. Secur., vol. 4, no.
3, pp. 265–274, 2010.
[4]
D. Smith, J. Wetherall, S. Woodhead, and A. Adekunle,
“A clusterbased approach to consensus based
distributed task allocation,” in Proc. 22nd Euromicro
Int. Conf. Parallel, Distrib. Netw.-Based Process., 2014,
pp. 428–431.
@ IJTSRD
|
Unique Paper ID – IJTSRD35877
|
[5]
Anand, Anjali, HimanshuAggarwal, and Rinkle Rani.
"Partially distributed dynamic model for secure and
reliable routing in mobile ad hoc networks." Journal
of Communications and Networks 18.6 (2016): 938947.
[6]
Borkar, Gautam M., and A. R. Mahajan. "A secure and
trust based on-demand multipath routing scheme for
self-organized mobile ad-hoc networks”2017.
[7]
Hurley-Smith, Darren, Jodie Wetherall, and Andrew
Adekunle. "SUPERMAN: Security using pre-existing
routing for mobile ad hoc networks." IEEE
Transactions on Mobile Computing16.10 (2017):
2927-2940.Networks 23.8 (2017): 2455-2472.
[8]
Garg, Mukesh Kumar, Neeta Singh, and
PoonamVerma. "Fuzzy rule-based approach for
design and analysis of a Trust-based Secure Routing
Protocol for MANETs." Procedia computer science
132 (2018): 653-658.
[9]
Gaurav, Akshat, and Awadhesh Kumar Singh. "Light
weight approach for secure backbone construction for
MANETs." Journal of King Saud University-Computer
and Information Sciences (2018).
[10]
Chintalapalli, Ram Mohan, and Venugopal Reddy
Ananthula. "M-LionWhale: multiobjectiveoptimisation
model for secure routing in mobile ad-hoc network."
IET Communications 12.12 (2018): 1406-1415.\
[11]
Santosh Kumar Das and Sachin Tripathi, “Intelligent
energy-aware efficient routing for MANET”, Wireless
Networks, Springer, 2017, Pages 1-21
[12]
Jipeng Zhou, Haisheng Tan, Yuhui Deng, Lin Cui and
Deng Deng Liu, “Ant colony-based energy control
routing protocol for mobile ad hoc networks under
different node mobility models”, EURASIP Journal on
Wireless Communications and Networking, Springer,
Volume 2016, Issue 105, 2016, Pages 1-8
[13]
Santosh Kumar Das and Sachin Tripathi, “Energy
efficient secured routing protocol for MANETs”,
Wireless Networks, Springer, Volume 23, Issue 4, May
2017, Pages 1001–1009
Volume – 5 | Issue – 1
|
November-December 2020
Page 276