Title: Cross-layered-based adaptive secured routing and data transmission in MANET

Authors: Jai Kumar Vinayagam; C.H. Balaswamy; K. Soundararajan

Addresses: JNTUA, Ananthapuramu, A.P., India ' Department of Electronics and Communication Engineering, Gudlavalleru Engineering College, Gudlavalleru, A.P., India ' Department of Electronics and Communication Engineering, T.K.R. Engineering College, Hyderabad, India

Abstract: Mobile ad hoc network (MANET) is a self-organising network consisting of a group of nodes connected to each other wirelessly. Due to the self sustaining nature of MANET, it has been used in various applications and provides good communication. However, because of certain features of MANET such as wireless medium, highly dynamic topology, limited resources, etc., the network is easily prone to various attacks which hamper the communication efficiency. The nodes are attacked mainly during the routing process and the data packets are dropped or its authenticity is compromised mostly during the data transmission process. Hence, it is critical to ensure that routing and data transmission process is performed in a secure manner to ensure security of the network. In this paper, we propose to develop a cross-layered-based adaptive secured routing and data transmission technique in MANET. Initially, the multipath routing is performed securely by encrypting every message transmission, to guarantee routing security. Then the highly secured data is transmitted through secure routes to ensure data security. Then the network is examined for intrusions. In this way, network is safeguarded from attacks and hence enhancing network operations.

Keywords: mobile ad hoc network; MANET; cross-layer; adaptive; routing; data; security.

DOI: 10.1504/IJMNDI.2019.098240

International Journal of Mobile Network Design and Innovation, 2019 Vol.9 No.1, pp.37 - 45

Received: 23 Dec 2017
Accepted: 14 Jul 2018

Published online: 06 Mar 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article