Title: Rank propagated secured path selection technique for mobile ad hoc networks

Authors: V. Hemamalini; G. Zayaraz; V. Vijayalakshmi

Addresses: Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry 103642, India ' Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry 103642, India ' Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry 103642, India

Abstract: Ad hoc networks are open, infrastructure-less networks that can be established in an on demand fashion. Yet the chance for vulnerability is high for the reason that these networks do not have a central administration. Many research processes have been proposed for secure transmission and routing in these networks. Initiating from received signal strength (RSS), angle of arrival (AOA), time of arrival (TOA) and leading through trust based mechanisms and belief propagation methods, these mechanisms put forward the implication of the networks and securing their paths despite the reign of application. Adverse factors further include trust factor, external physical factors and many more; distance and mobility are one among them. Henceforth we propose a rank predicted selective routing (RPSR) method that authenticates the application of specific nodes at a particular range whose outward edges cannot be reused, minimising latency and overhead in transmissions. The paper also provides a comparative analysis of the various existing routing techniques with the proposed relative path selection which is dependent upon trust factor.

Keywords: received signal strength; RSS; angle of arrival; AOA; time of arrival; TOA; belief propagation; trust management; digital signature-based IP; latency.

DOI: 10.1504/IJKESDP.2016.084598

International Journal of Knowledge Engineering and Soft Data Paradigms, 2016 Vol.5 No.3/4, pp.205 - 221

Received: 10 Jun 2016
Accepted: 26 Oct 2016

Published online: 17 Jun 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article