An Optimized Secure Routing with Randomize and Forward Strategy in Multi-Hop Wireless Ad Hoc Networks
Main Article Content
Abstract
A wireless ad hoc network is also known as IBSS- Independent Basic Service Set, is a computer network in which the communication links are wireless. It is an IP routing protocol optimized for MANETs and WANETs. The proactive link state protocol use hello and topology control (TC) messages to discover and then disseminate link state information throughout the WANET. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths. Hence, the main goal of this research work is to improve the secrecy performance in multi-hop wireless ad hoc network with respect to two different cases such as the colluding and non-colluding eavesdroppers with Randomize and Forward (RF) relay strategy using Optimized Link State Routing Protocol (OLSR) which is specifically designed from the viewpoint of physical layer security. The relay strategy in the wireless ad hoc networks, deals with the secure connection path between the source and destination through the intermediate relay nodes and also the intermediate relay selection. The RF strategy is an optimized version of traditional link state protocol such as the Optimized Link State Routing (OLSR) protocol helps in the relay selection with the concept of the Multipoint Relay (MPRs) nodes to efficiently disseminate link state updates across the network. The Dijkstra’s algorithm (K Shortest path routing) selection is adopted for both colluding eavesdroppers case and the non-colluding eavesdroppers case in order to find the highest secure connection probability (SCP) shortest path between any given source-to-destination pair in a distributed way in order to improve the detection accuracy using the heterogeneous passion point process. The proposed research work presents a new approach to measure the secure routing in multi-hop wireless ad hoc networks in wireless networks with the steps namely the Network Model, Mobility Modeling, Secure Routing Randomize-and-Forward using Optimized Link State Routing (RFOLSR) Protocol and Secure shortest path routing detection algorithm. The RFOLSR protocol used to select the multiple shortest paths and secure protocol used to transfer a message to destination without packet drops. Through extensive simulations and verification the proposed mechanism achieves significantly better detection accuracy than conventional methods such as decode and forward (DF) strategy based detection.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.