Developed QoS Using S-EA3ACK Algorithm for MANETs
Keywords:
MANET, QOD, EAACK, EA3ACK, S-EA3ACK, CryptographyAbstract
In recent research year the growing technology that allows to the users to access information and services anywhere regardless of their geographic location called as MANET. Mobile Adhoc Network (MANET) is the significant technologies among various un-wired communication technologies where all the mobile nodes are mobile and which can be connected to random dynamically using wireless link in the random manner. It can provide Quality of Service (QoS) requirements in real update transmission for wireless application. But it stream including critical mission application like military use or emergency recovery. In this research paper the propose efficient Secure Quality Oriented Distributed (S-QOD) Secure Enhanced Adaptive 3 Acknowledgements (S-EA3ACK). Implement a new intrusion detection system for on-demand wireless networks. SQOD can improve a best performance of output quality (QoS) to reduce transmission delay, transmission time and also increase network communication throughput for Enhanced Adaptive 3 ACK’s (S-EA3ACK) using EAACK (DSA) with MAJE4 symmetric cryptography specially designed for MANET through Network Simulator-2.34 (NS2) to implement it.
How to cite this article:
Thamizhmaran K. Developed QoS using S-EA3ACK Algorithm for MANETs. J Adv Res Electro Engi Tech 2020; 7(3&4): 1-5.
DOI: https://doi.org/10.24321/2456.1428.202002
References
[2] Y. Hu, et al. “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networksâ€, in Proc. 4th IEEE Workshop Mobile Computer System Application, 2002, pp.3–13.
[3] I. Jawhar, et al. “Quality of Service Routing in Mobile Ad Hoc Networksâ€, Network Theory and Applications, Springer, 2004.
[4] T. Reddy, et al. “Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of Issues and Solutionsâ€, Ad Hoc Networks, 2006, Vol. 4, No. 1, pp.83-124.
[5] K. Liu, et al. “An acknowledgment-based approach for the detection of routing misbehaviour in MANETsâ€,IEEE Trans., 2007, Vol. 6, No. 5, pp.536–550.
[6] Z. Shen, et al. “Security and QoS Self-Optimization in Mobile Ad Hoc Networksâ€, IEEE Trans. Mobile Computing, 2008, vol. 7, pp. 1138-1151.
[7] H. Wu, et al. “QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networksâ€, Ad Hoc Networks, 2009, Vol. 5, No. 2, pp.600-612.
[8] K.Thamizhmaran, et al. “Secure Routing Protocol in MANET – A Surveyâ€, International Journal of Advance Research in Technologsâ€, 2012, Vol. 3, No. 3, pp.9-14.
[9] K.Thamizhmaran, et al. “Authentication and Intrusion Detection in MANETâ€, International Journal of Advance Research in Technology, 2012, Vol. 3, No. 3, pp.15-21.
[10] Shakshuki, et al. “EAACK - A Secure Intrusion Detection System for MANETsâ€, IEEE Trans.,2013, Vol. 60, No. 3, pp.1089-1098.
[11] Prabu, K. and Subramani, A. “Energy efficient routing in MANET through edge node selection using ESPR algorithmâ€, Int. J. Mobile Network Design and Innovation,2014, Vol. 5, No. 3, pp.166–175.