首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:OPTIMIZED MULTICAST ROUTING SCHEME FOR MOBILE AD HOC NETWORKS
  • 本地全文:下载
  • 作者:DR.A.RAJARAM ; S.GOPINATH
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2014
  • 卷号:59
  • 期号:1
  • 出版社:Journal of Theoretical and Applied
  • 摘要:Mobile Ad hoc Network is the indivisible part of wireless network. In the past few years, the popularity of MANET grows unlimitedly. Due to the presence of mobility and infrastructure less topology, the vulnerability of ad hoc networks is introduced unconditionally. So the failures of link, path and node may occur which leads to lack of communication between the users. Sometimes the malicious attackers arise to make more damage to network connectivity and produce false information among the mobile nodes. To overcome this issue, several approaches are developed to make more efficient routing. But they have not focused on failures of node, link and path as well as malicious activities at a time. We proposed Optimized Multicast Routing Scheme (OMRS) to attain balance between the above said issues. In first phase of this scheme, we develop the detection and avoidance of malicious attacks is implemented with the predetermined trust value of node characteristics. We have also introduced the characteristics of malicious attacks in linear network systems. In second phase, stability ratio of link, path and node is determined to maintain threshold value which ensures the resilience to the path failures. By implementing these solutions, we have achieved better stability and node connectivity towards the ultimate goal of multicast routing scheme. We implement our proposed scheme within Network Simulator (NS2.34) tool environment. By using the extensive simulation results, the proposed scheme achieves better delivery ratio, detection ratio, probability of failure occurrence and less communication overhead, end to end delay than the ODMRP, BDP.
  • 关键词:Multicast; Stability Ratio; Malicious Attackers; Detection Ratio; Delivery Ratio; Communication Overhead; End To End Delay; Threshold Value; Node Familiarity And Node Proposal.
国家哲学社会科学文献中心版权所有