Improve the quality of service through secure routing networks secured in the mail

  • Authors

    • Aseil Nadhum Kadhum babil
    2023-10-04
    https://doi.org/10.14419/ijet.v12i2.32367
  • A mobile ad hoc network (MANET) is a stand-alone system with mobile nodes.  Nodes can move around at will. Communication is subject to security breaches without a centralized, secure infrastructure, and the nodes are the biggest offenders. Since security has become one of the most important issues for data transfer via wired and wireless networks, many security-enhanced solutions have been created to enhance the security of data transmission over public networks. The goal of this project is to make routing safer. Proactive routing, as is well known, involves finding alternative routes and requiring packets to choose one at random from their immediate neighbors. Sending hello packets allows us to maintain track of each node's neighbors.  The delivery path is then selected from nearby nodes, with the prior hop which is retained as the history node having been arbitrarily excluded. To randomize delivery channels, the proactive routing protocols DSDV and RDSDV were contrasted for various node counts. The Simulation employs this project. The rapid development of mobile computing appli-cations and distant systems has raised awareness of quality of service (QoS) for mobile ad hoc networks (MANETs). In the MANET sce-nario, security is a key component of Qos provisioning. Attacks on the system could result in problems with direction, asset reservations, or even the collapse of the QoS structure if no security tool is used. In this study, two new plans will be provided from the perspectives of two alternative techniques to manage the updating of the organizational idea and allay the worries caused by interface annoyances in order to handle the security challenges of MANET Qos and the actual commitments of this investigation.

     

  • References

    1. Hackmann, G., Sun, F., Castaneda, N., Lu, C., & Dyke, S. (2012). A holistic approach to decentralized structural damage localization using wireless sensor networks. Computer Communications, 36(1), 29-41. ‏ https://doi.org/10.1016/j.comcom.2012.01.010.
    2. Park, P., Ergen, S. C., Fischione, C., Lu, C., & Johansson, K. H. (2017). Wireless network design for control systems: A survey. IEEE Communications Surveys & Tutorials, 20(2), 978-1013. ‏ https://doi.org/10.1109/COMST.2017.2780114.
    3. Adjih, C., Minet, P., Muhlethaler, P., Baccelli, E., & Plesse, T. (2008). Quality of service support, security and OSPF interconnection in a MANET using OLSR. Journal of Telecommunications and Information Technology, (2), 70-76. ‏
    4. Sridhar, S., & Baskaran, R. (2015). Efficient Routing in Mobile Adhoc Networks Emphasizing Quality of Service by Trust & Energy based AODV. Journal of Communications Software and Systems, 11(1), 1-7. ‏ https://doi.org/10.24138/jcomss.v11i1.111.
    5. Karakus, M., & Durresi, A. (2017). Quality of service (QoS) in software defined networking (SDN): A survey. Journal of Network and Computer Applications, 80, 200-218. ‏ https://doi.org/10.1016/j.jnca.2016.12.019.
    6. Singh, B., Rana, H., Verma, A., Duhan, A., & Zayed, M. (2016, February). SRR loaded microstrip patch antenna for Bluetooth, HIPERLAN/WLAN and WIMAX. In 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 34-37). IEEE. https://doi.org/10.1109/SPIN.2016.7566658.
    7. Coutras, C. (2015). Priority Levels in a HIPERLAN Based Forwarding Mechanism for Intermittent Connectivity. ICN 2015, 13. ‏8-. Z. Hass & R. Pearlmann, "Zone routing Protocol"(1999), IETF Internet Draft.
    8. Akin, E., & Korkmaz, T. (2019, January). Comparison of routing algorithms with static and dynamic link cost in SDN. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1-8). IEEE. ‏ https://doi.org/10.1109/CCNC.2019.8651815.
    9. Asif, M., Khan, S., Ahmad, R., Sohail, M., & Singh, D. (2017). Quality of service of routing protocols in wireless sensor networks: A review. IEEE Access, 5, 1846-1871. https://doi.org/10.1109/ACCESS.2017.2654356.
    10. Jiwon Park, Sangman Moht & Ilyong Chung (2008),” Multipath AODV Routing Protocol in Mobile Ad Hoc Networks with SINR-Based Route Selection”, International Symposium on Wireless Communication Systems, IEEE, pp:682-688. https://doi.org/10.1109/ISWCS.2008.4726143.
    11. Hammoudeh, M., & Newman, R. (2015). Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Information Fusion, 22, 3-15. https://doi.org/10.1016/j.inffus.2013.02.005.
    12. Faheem, M., Tuna, G., & Gungor, V. C. (2017). QERP: Quality-of-service (QoS) aware evolutionary routing protocol for underwater wireless sensor networks. IEEE Systems Journal, 12(3), 2066-2073. ‏ https://doi.org/10.1109/JSYST.2017.2673759.
    13. Shrivastava, A. K., Vidwans, A., & Saxena, A. (2013, September). Comparison of AOMDV Routing Protocol under IEEE802. 11 and TDMA Mac Layer Protocol. In 2013 5th International Conference and Computational Intelligence and Communication Networks (pp. 117-122). IEEE. https://doi.org/10.1109/CICN.2013.35.
    14. Kanakala, S., Ananthula, V. R., & Vempaty, P. (2014). Energy-efficient cluster-based routing protocol in mobile ad hoc networks using network coding. Journal of Computer Networks and Communications, 2014.‏ https://doi.org/10.1155/2014/351020.
    15. Wang, Z., Bulut, E., & Szymanski, B. K. (2009, June). Energy efficient collision aware multipath routing for wireless sensor networks. In 2009 IEEE International Conference on Communications (pp. 1-5). IEEE.‏ https://doi.org/10.1109/ICC.2009.5198989.
    16. Saied, Y. B., Olivereau, A., Zeghlache, D., & Laurent, M. (2013). Trust management system design for the Internet of Things: A con-text-aware and multi-service approach. Computers & Security, 39, 351-365.‏ https://doi.org/10.1016/j.cose.2013.09.001.
    17. Krishna, P. V., Saritha, V., Vedha, G., Bhiwal, A., & Chawla, A. S. (2012). Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks. IET communications, 6(1), 76-83.‏ https://doi.org/10.1049/iet-com.2010.0763.
    18. Ni, M., Zhong, Z., & Zhao, D. (2011). MPBC: A mobility prediction-based clustering scheme for ad hoc networks. IEEE Transactions on Vehicular Technology, 60(9), 4549-4559. ‏ https://doi.org/10.1109/TVT.2011.2172473.
    19. Lu, B. (2005). Quality of service (qos) security in mobile ad hoc networks. Texas A&M University.‏
    20. Benamar, K. A. D. R. I. (2007). The adaptation of security mechanisms for Ad hoc Networks. Unpublished Master Thesis, University of Abou Bekr Belkaid, Algeria.
  • Downloads

  • How to Cite

    Nadhum Kadhum, A. (2023). Improve the quality of service through secure routing networks secured in the mail. International Journal of Engineering & Technology, 12(2), 31-37. https://doi.org/10.14419/ijet.v12i2.32367